NEWS
The Magnificent Seven: How to modernise your security operations

The main issues we see arise with cybersecurity strategies seem to link to efforts that arise when businesses look to modernise these operations – they have too few people, too many security tools and too little insight on where the attacks are coming from and how they are be carried out. By...

Read More
NEWS
Deflecting DDoS – Key Tactics in the Battle Against IoT-Powered Attacks

What makes a DDoS successful? I asked myself that question at the end of August when the central bank of Spain, Banco d’Espana, was hit by a DDoS attack that took its website temporarily offline. The bank issued a statement acknowledging the attack and stating that “no damage” had been done...

Read More
NEWS
GDPR and mitigating cyber-risk

For digital businesses across all industries and markets, there are a number of risks which freelancers and contractors may face as a result of the new regulations. Here, Janthana Kaenprakhamroy, founder of on-demand insurance provider Tapoly, discusses the ins and outs of GDPR and the risks...

Read More
Is it time for a cyber hygiene check-up?

By Katie Curtin-Mestre, VP of Product and Content Marketing, CyberArk.

Read More
Top Ten Tips to Ensure GDPR Success

By Mike Puglia Chief Strategy Officer at Kaseya.

Read More
Iron Rain: What Defines a Cyber Insurgency?

By Tom Kellermann, Chief Cybersecurity Officer, and Rick McElroy, Security Strategist at Carbon...

Read More
Three common GDPR misconceptions

By Jan van Vliet, VP and GM EMEA at Digital Guardian.

Read More
The devil is in the data

By Dileep Pisharody, Partner at Rosling King.

Read More
Industry poll gives significant insights into businesses’ ‘GDPR readiness’

By Scott Snively, data intelligence specialist, ASG Technologies.

Read More

Videos

Claire Keelan, UK MD at Onnec, is warning that the UK will fall short of its AI ambitions and data centre expansion targets, unless it tackles the growing workforce shortage by tapping into underused talent...
In this interview, Lorenzo Romano, CEO of GCX, explores the shift from traditional Service Level Agreements to Experience Level Agreements and what it means for MSPs delivering managed connectivity. He...
In this interview, Phil Skelton, Senior Director of International Sales at eSentire, explores why modern defence demands multi-signal MDR that correlates identity, endpoint, cloud, network, and vulnerability...
In this in-depth conversation, Roy Azoulay, Co-founder and CIO of Cynomi, and Phil Bindley, Field CISO at Intercity Technology, explore how MSPs and MSSPs can turn regulatory compliance, AI governance, and...

News

The unveiling of CrowdStrike's 2026 Global Threat Report highlights a surge in AI-enabled threats, shrinking defenders' response time.
Red Hat unveils its Digital Sovereignty Readiness Assessment tool to gauge organisational digital control and foster a global standard for digital sovereignty.
AI is being used alongside existing DevOps practices, with reported impacts on testing processes and role responsibilities, while governance gaps and cloud and energy costs remain considerations.
Veeam has launched Agent Commander, a solution designed to combine data resilience with AI security, providing organisations with visibility and control over AI systems and associated risks.