What companies must know about Bring Your Own Device to work

By Don Jackson, CISSP, a Senior Security Researcher with the Counter Threat Unit (CTUTM) Research Team at Dell SecureWorks

Read More
Big Data Hoarding – the elephant in the room

Hoarding every bit of data is a serious affliction for 75% of organisations and a predicted 4,300%...

Read More
New Red Hat Storage Server capabilities deliver the foundation for Enterprise Open Hybrid Clouds

Red Hat is pleased to announce the availability of new Red Hat Storage Server 2.0 features and...

Read More
First dedicated online Lloyd George patient records service in primary care

Grove House Practice, the first GP surgery in the UK to computerise its entire Lloyd George patient...

Read More
Powerwave included onto ETL

The standalone, three-phase PowerWAVE 6000 (400 & 500kVA) UPS from Uninterruptible Power...

Read More
Chyro Media Asset Management selects Scality

Scality and Chyro, the leading provider of next generation digital asset management solutions, have...

Read More
DataCore Software launches “DataCore Ready”

DataCore Software has introduced the DataCore Ready Programme in response to growing worldwide...

Read More
APM Group launches guidance for navigating the CIF Code of Practice

Accreditation body sets out clear certification guidance for CSPs.

Read More
Yellow Pages dials up Tegile Systems

US-Yellow is an independent yellow page publisher with consumers referring to Yellow Pages more...

Read More

Videos

Oliver Simonnet, Lead Cybersecurity Researcher at CultureAI, discusses the findings of the company’s The State of Enterprise AI Usage: The Illusion of Control report, which reveals a growing gap between how...
Laura Allwood, now a fully qualified Project Manager at Arcadis, outlines her journey from Apprentice Project Manager to her current role - along the way obtaining a degree in Construction Management and...
Phylip Morgan, Senior Vice President, Marketplace & Channel Expansion at Pax8, explores the shift from Managed Service Providers to Managed Intelligence Providers and what it means for the future of the...

Expert Opinions

Even in 2026, insecure code often stems from time pressure and simple mistakes rather than intent. This guide outlines five common software security pitfalls, how to identify them, and how to fix them before...
By Anna Marie Clifton, Director of Product, AI and Agents, at Zapier.
By Brett Candon, VP International, Dropzone AI.