NEWS
Cyber risk management – bringing security intelligence to the Board

Data breaches are costly. According to a recent Ponemon Institute study, the average breach costs an organisation $3.86 million. A separate study found that, although the share price of breach-affected companies shows its sharpest drop 14 days after the breach is made public, there is still a...

Read More
NEWS
Apps: the gateway to your private data

Cybercrime is no longer monopolised by elite criminals and no longer consigned to the dark web alone. Recent investigations indicate that hackers have become much braver and are now operating in the open, using popular apps to conduct illegal dealings. Criminals are now using consumer applications...

Read More
NEWS
The state of IT security

The IT security landscape has changed over the last few years. Historically organisations focused their efforts largely around protecting against cyber attacks, focusing on how they could prevent a data breach, protect their data and systems. A large part of this approach centred on perimeter...

Read More
NEWS
The Insider Threat: Why Employee Engagement is a Critical Element of Cybersecurity

Beth Hood is a former advisor to the government on protective security. She now runs Verosa – a leadership development consultancy specialising in employee engagement.

Read More
NEWS
Why CDPs have the edge over DMPs when it comes to ROI

When budgets shrink, spending scrutiny grows — every penny is expected to fuel the highest...

Read More
NEWS
Where does the responsibility for cloud breaches lie?

The Cloud Security Alliance (CSA) has released a survey which discusses who should be taking...

Read More
NEWS
IT weaknesses - the barrier to enterprises becoming security-first

Enterprises are increasingly recognising the benefits of embracing a cloud infrastructure to...

Read More
NEWS
From preparation to implementation: How to fully adopt automation in 2019

The last 12 months have seen a shift in how enterprises view automation and its benefits to their...

Read More
NEWS
Where does responsibility for cloud breaches lie?

The Cloud Security Alliance (CSA) has released a survey which discusses who should be taking...

Read More
NEWS
It’s time for our notion of the endpoint to change

It’s no secret that IT has evolved and, as a result, so has our approach to cybersecurity. For...

Read More
NEWS
How cloud and mobility are disrupting 30 years of network and security history

The internet is disrupting industries and business models, fundamentally changing the way we live...

Read More
NEWS
What’s the key to secure digital transformation?

Marc Vanmaele, CEO of TrustBuilder explains how banks and financial organisations can best balance...

Read More

Videos

In this conversation, ESET UK Country Manager, Matt Knell, discusses why MSPs must move beyond basic endpoint protection and adopt a layered, proactive security approach. He shares practical insights on MDR...
Alex Walsh, Regional VP of Channel Sales, EMEA North at Keepit, discusses the company’s channel-first strategy, broad SaaS data protection, and how MSPs can differentiate amid consolidation and cyber risks,...
In this interview, Eric Mink, VP of AI Adoption, shares how MSPs can turn AI curiosity into structured, billable services. He explores commercialisation strategies, vertical specialisation, and building...
Eva Diego, the new CEO of Hyphen, an international architectural practice working with many of the world’s leading brands and digital infrastructure developers, explains how global demand for critical...

News

Apptio's 2026 Technology Investment Management Report finds that organisations manage increasing scrutiny of tech budgets, success in 2026 will depend on aligning investments with business value.
Orange Business and Cisco launch Post-Quantum Cryptography solutions to fortify network security against future quantum threats.
GTIA introduces elected leaders for the UK & Ireland Community, promoting new initiatives and advancing community goals.
SentinelOne expands its AI Security Platform with new DSPM features to help secure AI systems amid increasing regulatory requirements.