NEWS
The importance of storing data closer to home

There are three key components when we talk about the concept of privacy: Laws, customs and expectations. The importance of each part of this trifecta will vary across geographic regions, generations, and groups. But in order to meet these diverse expectations, companies processing personal...

Read More
NEWS
Why Insider Threats Are Harder to Detect in Cloud Environments

The adoption of cloud computing by businesses is progressing at an incredible rate. The cloud allows organizations to decrease their operating expenses by allowing them to outsource their infrastructure needs to cloud service providers (CSPs). The competitive market for CSPs has also driven them to...

Read More
NEWS
The rise of digital transformation at the edge

With or without realising, we’ve encountered the benefits of digital transformation in various parts of our lives – from everyday tasks such as shopping, working and socialising with friends and family, to how we stream films, and pay for things using our phone or watch. By Hubert Da Costa,...

Read More
NEWS
Introducing security to the DevOps cycle

Keeping your software delivery in peak condition. By Jeff Keyes at Plutora.

Read More
NEWS
Securing our infrastructure: 3 steps OEMs need to take in the IoT age

Often when we think about cybersecurity, especially about the impacts of breaches, our minds turn...

Read More
NEWS
When Identity Meets Data: A Solution for Unstructured Data

Today’s business world is driven by data, enabling employees, contractors, partners and vendors...

Read More
NEWS
Cloud era technology needs cloud era security

The huge popularity of cloud services has seen organisations outsource applications, data and...

Read More
NEWS
Assessing the delicate cybersecurity “fire triangle”

A physical roaring fire and a digital cyberattack might not have much in common – but these very...

Read More
NEWS
How cloud service providers can plug the data privacy skills gap

Last May marked a seismic shift in global privacy and information rights with the implementation of...

Read More
NEWS
Are businesses going into reverse on cybersecurity?

The time needed by UK organisations to recover from a data breach is increasing. Senior decision...

Read More
NEWS
Businesses can’t fight what they cannot see

It doesn’t take a rocket scientist to work out that if security teams don’t have full...

Read More
NEWS
Privacy + development = securer applications

Privacy and security are essential not only to bring peace of mind to users but also to comply with...

Read More

Videos

In this discussion, David Primor, CEO of Cynomi, and Dennis Boone, President of SlashBlue, explore why third-party risk management is rapidly becoming essential for MSPs and MSSPs. They share real-world...
Thiri Shwesin Aung, founder and CEO of Nyxium, discusses how she and co-founder, Paul Seurin, have built an agentic AI platform that helps energy and infrastructure developers decide where projects are most...
Ryan Parker, Phononic's President & COO, discusses the data centre thermal management challenge, the company’s GPU HBM cooling solution and introduces the idea of Thermal Fabric, a real-time thermal control...
Mark Banfield, Chief Revenue Officer at TeamViewer, discusses how the company is using its Tia (TeamViewer Intelligent Assistant) and a ‘shift left’ approach to move IT support from reactive to more...

News

Kao Data partners with Discover Tech, aiming to provide immersive tech sector experiences for young people and support greater diversity in the technology sector.
Barracuda research reveals how attackers leverage device code authentication for persistent access, highlighting the need for improved security measures.
Westcon-Comstor has integrated its value-added services into the Microsoft Marketplace, aiming to support partner operations and improve scalability.
Guardz outlines how AI is influencing cybersecurity, with the report highlighting identity-related issues and vulnerabilities affecting MSPs, based on findings from its latest threat report.