NEWS
Trusted Cloud: overcoming the tension between sovereignty and innovation

In a world where 80% of businesses depend on globalised supply chains and with an irreversible march towards the cloud, organisations and governments alike are faced with a dilemma. How can we protect our intellectual property at an international level? By Cédric Prévost, Orange Business...

Read More
NEWS
What it really means to become 'Cloud Native'

Dave Chapman, Head of Strategy and Professional Services at Cloudreach, looks at the accelerated shift to cloud computing in 2020, what it means to be a cloud native company, the cloud ripple effect and successful case studies.

Read More
NEWS
A legacy problem

Chris West, Head of Global Accounts at Keysource, the data centre and critical environment specialist, looks at the challenges global businesses are facing when it comes to provisioning critical infrastructure across a legacy estate.

Read More
NEWS
Your data centre may not be dead, but it's morphing

As interconnected services continue to proliferate, with increases in cloud providers, edge services and SaaS offerings, the rationale to stay only in a traditional data centre topology has limited advantages. This is not an overnight shift, but a change in thinking how we deliver services to our...

Read More
NEWS
Why organisations need SaaS Protection when moving to cloud services

As the Coronavirus pandemic continues to unfold, organisations across all industries have been...

Read More
NEWS
Covid-19 will accelerate the introduction of mega data centre campuses

The digital business case has been propelled forward five years. Since the COVID-19 crisis,...

Read More
NEWS
Securing the cloud: how to address new security risks and future-proof operations post-COVID-19

How can organisations overcome today’s cyber security challenges to protect systems and data...

Read More
NEWS
The hummus effect: Why blindly jumping to the public cloud can leave a bitter taste

Hummus is often considered a “superfood” and people are consuming it in large quantities....

Read More
NEWS
A seamless switch:

Moving to a new IT service provider with minimal disruption By Vikki Durden, Head of Operations...

Read More
NEWS
How a cloud-based infrastructure can accelerate IT Initiatives

There’s no doubt about it, we are living in a cloud enhanced world. No matter what is happening...

Read More
NEWS
Cloud vs on-prem: making the move

Companies are under severe pressure to transform in order to survive in today’s economy....

Read More
NEWS
Look up: Cloud skills are on the rise

In a matter of months, COVID-19 has completely upended decades of tradition and social dynamics of...

Read More

Videos

Robert Tanner, Locker & Vending Solutions Specialist at LapSafe, discusses the AI Smart Locker, which recently won ‘AI & Automation Project of the Year’ at the MSP Channel Awards. He explains how the...
Mark Banfield, Chief Revenue Officer at TeamViewer, discusses how the company is using its Tia (TeamViewer Intelligent Assistant) and a ‘shift left’ approach to move IT support from reactive to more...
Mostyn Thomas, Senior Director of Security EMEA at Pax8, breaks down how ransomware is evolving, what the new Cyber Essentials standards mean in practice, why attackers are increasingly targeting supply...
Andy, Data & AI Director at Pax8, explores what the agentic inflection point means in practice and how AI is moving beyond experimentation into real-world application. He breaks down the 'empty box' approach...

News

BT Business has launched a sovereign services portfolio designed to support organisations with UK-based control of cloud, AI, and connectivity services, with aims including improved data governance, secure AI...
Canopius has introduced a new product aimed at shielding businesses from the rising threat of cyber warfare amidst escalating global tensions.
European organisations confront a costly inefficiency in their cloud-first strategies, affecting AI deployment and infrastructure resilience.
Barracuda research reveals how attackers leverage device code authentication for persistent access, highlighting the need for improved security measures.