NEWS
Vertiv to provide Energy Savings as a Service to Telef?nica

Telecom giant partners with Vertiv to increase efficiency and support innovation.

Read More
A2Dominion selects PowerObjects

PowerObjects has been selected by UK residential property group, A2Dominion, as a key partner in the delivery of a multi-million pound business change programme.

Read More
SoftBank Robotics Europe selects Cognizant

Cognizant has been selected by SoftBank Robotics Europe, a leader in humanoid robotics, to provide Quality Engineering and Assurance (QE&A) services for the artificial intelligence (AI) systems in the popular Pepper and NAO robots.

Read More
Eneco chooses Greenbyte for data management

Dutch-based utility Eneco has chosen Greenbyte’s modern software system Breeze for wind farm monitoring, analysis and reporting.

Read More
Fortinet delivers third generation of network security

FortiOS 6.0 delivers more than 200 new capabilities across Security Fabric to automate security...

Read More
Three Group IoT services globally with Cisco Jasper Control Center

Three Group enables enterprise customers worldwide to launch, manage and monetize IoT services...

Read More
Splunk agrees to acquire Phantom

Splunk Inc. is to acquire Phantom Cyber Corporation, a leader in Security Orchestration,...

Read More
Redstor expands portfolio with Archiving-as-a-Service

Redstor has unveiled a unique archiving service as the latest addition to its complete data...

Read More
Orchestrator offers peace of mind

Orchestration solution enables enterprises to mitigate the risk caused by outdated and untested...

Read More
NEWS
du selects Fortinet

UAE-based telecommunications service provider du – from Emirates Integrated Telecommunications...

Read More
Packet expands presence to Interxion’s Marseille Campus

Expansion brings Packet’s edge cloud computing and connectivity services closer to customers in...

Read More
NEWS
CrowdStrike Global Threat Report reveals the biggest cyber crime and targeted intrusion trends

Following the trickle-down effect of advanced ‘military-grade’ tools, report uncovers...

Read More

Videos

Alex Adamopoulos, Chairman and CEO of Emergn, discusses the results of the company’s new research, which reveals that enterprise leaders now expect measurable returns from AI investments within months, not...
Jason Feist, Seagate SVP, Go-to-Market, discusses Seagate Technology’s next-generation Mozaic™ 4+ platform, said to be the industry’s only heat-assisted magnetic recording (HAMR)–based storage platform...
Antoine Jebara, Co-Founder and GM of Channel & Alliances at JumpCloud, explores how managed service providers can move beyond transactional roles to become true business partners. He dives into practical...
Omer Wilson, Chief Marketing Officer of the Start Campus, explains why Start Campus and EDP have signed a strategic partnership marking their shared intention to accelerate next-generation, renewable-powered...

Expert Opinions

Even in 2026, insecure code often stems from time pressure and simple mistakes rather than intent. This guide outlines five common software security pitfalls, how to identify them, and how to fix them before...
By Graham Jarvis, Freelance Business and Technology Journalist
By Anna Marie Clifton, Director of Product, AI and Agents, at Zapier.
By Matt Evans, CEO at Apx Data Centre Solutions.