NEWS
Why embracing an AI-powered multi-cloud approach is now critical

By Dirk Alshuth, Cloud Evangelist at emma – the cloud management platform.

Read More
NEWS
Why refurbished tech should be your next ESG move

By Peter Miller, Sales Manager at ETB Technologies.

Read More
NEWS
The EU's circularity movement: Becoming a truly sustainable business

By Matthew Ekholm, Digital Product Passport and Circularity Specialist at Protokol.

Read More
NEWS
Testing’s Evolution That Did More Harm Than Good

By Dan Laun, General Manager, Testing at Perforce.

Read More
NEWS
The balancing act of managing the modern workspace

By Matt Bailey, workplace analytics specialist at Matrix Booking explores how data-driven insights...

Read More

Videos

In this interview, Eric Mink, VP of AI Adoption, shares how MSPs can turn AI curiosity into structured, billable services. He explores commercialisation strategies, vertical specialisation, and building...
In this interview, Dave Baggett, SVP/GM Security Suite at Kaseya, discusses how MSPs can tackle rising complexity, manage vendor sprawl, and stay ahead of high-impact incidents. We explore Kaseya’s unified...
In this interview, Kristen Knight, newly appointed VP of Channel Sales at Portnox, discusses the launch of the company’s global partner programme and its cloud-native, passwordless approach to network access...
In this interview, Phil Skelton, Senior Director of International Sales at eSentire, explores why modern defence demands multi-signal MDR that correlates identity, endpoint, cloud, network, and vulnerability...

News

Motive introduces advanced AI enhancements to streamline driver qualification processes and compliance tracking, making operations more efficient.
Genetec launches a UK data centre for Security Center SaaS on Microsoft Azure, enhancing compliance and performance for UK customers.
An analysis of AI security in enterprises reveals concerning permission levels, impacting incident rates and governance controls.
This year’s Palo Alto Networks report outlines key trends in cyber threats and highlights insights into evolving attack tactics and defensive strategies.