NEWS
Preventing fraud during the peak of consumer digital adoption

By Brett Beranek, Vice-President & General Manager, Security & Biometrics Line of Business at Nuance Communications.

Read More
NEWS
Meet The Three Amigos of Data: Governance, Privacy and Security

By Michael Queenan, co-founder and CEO of Nephos Technologies.

Read More
NEWS
Demystifying the security industry’s latest term: XDR

By Tawnya Lancaster, Lead Product Marketing Manager, AT&T Cybersecurity.

Read More
NEWS
Navigating shark-infested waters

Why businesses need a bigger boat for tackling IaC security By Robert Haynes, SCA & Open Source...

Read More
NEWS
Delivering an effective cybersecurity strategy

Cybersecurity continues to be a major challenge for companies, with as many as four in ten...

Read More
NEWS
How Zero trust security makes the everywhere workplace possible

Zero trust security clearly offers the most efficient and cost-effective way to secure the...

Read More
NEWS
A three-pronged approach to government security

The increase of ransomware attacks over recent years has cast a spotlight on the need for...

Read More
NEWS
Authentication best practice within a Zero Trust strategy

For CISOs around the world it seems at every turn, they are being told to implement Zero Trust....

Read More
NEWS
Navigating the SASE Maze

SASE is causing a buzz right now, and for good reason. By Jonathan Lee, Senior Product Manager,...

Read More

Videos

Phylip Morgan, Senior Vice President, Marketplace & Channel Expansion at Pax8, explores the shift from Managed Service Providers to Managed Intelligence Providers and what it means for the future of the...
Ryan Parker, Phononic's President & COO, discusses the data centre thermal management challenge, the company’s GPU HBM cooling solution and introduces the idea of Thermal Fabric, a real-time thermal control...
Data Centre World 2026
Data Centre World 2026

News

Qatar’s Doha IX and DE-CIX have expanded their collaboration to improve connectivity between local and international internet exchange networks.
The new CIS Companion Guides provide security guidance for emerging AI environments, including LLMs and MCP integrations.
ProxySmart provides a technical clarification of its mobile proxy architecture, outlining system design, functional boundaries, and the distinction between data-path proxy routing and messaging or...
Cisco has announced its Sovereign Critical Infrastructure portfolio targeting organisations in Europe, the Middle East, and Africa.