NEWS
Five steps to effectively manage a cyber-attack

By Vijay Bharti, Vice President & Head of Security Services, Happiest Minds.

Read More
Are we too work-obsessed to be secure?

By Per Stritich, Vice President EMEA, OneLogin.

Read More
NEWS
Malware is not the answer

By Kasey Cross, Sr. Product Manager, LightCyber.

Read More
Battling the botnet armies

Jeff Harris, VP, Solutions Marketing at Ixia looks at the growing armies of botnets, and how their...

Read More
Cyber criminals are turning to the weakest link: SMEs

By Chris Dye, VP Alliances, Glasswall Solutions.

Read More
‘Have IT your way’: How network security should be like ordering a burger

Joe DiPietro at AlgoSec explores how businesses can improve the IT security/application delivery...

Read More

Videos

Tal Barmeir, Co-founder & CEO Blinq.io, discusses her career in the IT industry, sharing some valuable insights when it comes to entrepreneurship and start-ups, alongside her belief that equality needs to be...
Chris McKie, VP, Product Marketing Networking, Security & Risk Management Solutions, Kaseya, discusses the findings of the company’s recently published 2024 MSP Benchmark Report, with automation,...
Jo Debecker, Managing Partner and Global Head of Wipro FullStride Cloud, discusses the ways in which the sustainability agenda is shaping the data centre landscape, with cloud and AI seen as both challenges...
Leah Goldfarb, Environmental Impact Officer at Platform.sh, explains the importance of being able to identify truly green data centres as organisation’s develop their own sustainability objectives and also...

News

Just 30% of European employees say they have all the necessary technology to collaborate seamlessly with other colleagues.
The Purple Guys completed 10 strategic acquisitions and more than tripled both revenue and EBITDA over the course of its partnership with Kian, creating a scaled MSP platform serving SMB clients across the...
GTT Communications has published the results of a new study that shows current SD-WAN deployments are mainly driven by the need to optimize network connections to cloud-based applications (86%) and improve...
Over the last year, the attacks that gained momentum are account compromise in the cloud and targeted attacks on premises.