What to do when hit by ransomware

When faced with an attack, it’s not uncommon for business owners to panic.  However, whilst it may be too late to take on the advice about backing up and protecting your data, there are steps that can be made to ensure that the damage is as limited as possible. Here, Nigel Crockford,...

Read More
Closing the loop on DevOps

By Elizabeth Lawler, vice president, DevOps security at CyberArk.

Read More
NEWS
How big data is predicting the future

By Fox Holt, Vice President of Delphy.

Read More
The evolution of robotics: meet your new colleague

By Volker Spanier, Head of Robotics Solutions for Epson Europe.

Read More
Tackling poor password hygiene habits head-on

Alvaro Hoyos, Chief Information Security Officer at OneLogin.

Read More
Proactive vs. Reactive: which is better for DDoS defence?

By Ronald Sens, EMEA Director for A10 Networks.

Read More
Considering the Cloud Apps you don’t know about

By James Smith - Head of Architecture & Innovation at Cloud Technology Solutions.

Read More
NEWS
The compliance conundrum

By Mark Baker, Field Product Manager, Canonical.

Read More

Videos

Daniel Reeves, CEO of The Computer Clinic Bicester, shares how the business has evolved from its roots into a modern IT services provider supporting both consumers and organisations. He discusses shifting...
Phylip Morgan, Senior Vice President, Marketplace & Channel Expansion at Pax8, explores the shift from Managed Service Providers to Managed Intelligence Providers and what it means for the future of the...

News

PHP remains widely used in the open source ecosystem, while some organisations report challenges in hiring developers with PHP expertise.
Tenable Research has identified a vulnerability in a Microsoft GitHub repository that could affect its CI/CD infrastructure.
CrowdStrike has expanded its Cloud Detection and Response capabilities with integration into Google Cloud, providing real-time protection for hybrid and multi-cloud environments.
Obrela's latest report sheds light on a more sophisticated cyber threat environment, highlighting an increase in targeted attacks and a shift in sector targets for 2025.