NEWS
Navigating shark-infested waters

Why businesses need a bigger boat for tackling IaC security By Robert Haynes, SCA & Open Source Evangelist, Checkmarx.

Read More
NEWS
Delivering an effective cybersecurity strategy

Cybersecurity continues to be a major challenge for companies, with as many as four in ten businesses (39%) reporting cyber security breaches or attacks in the last 12 months. By Richard Slater, Head of Managed Services at Amido.

Read More
NEWS
How Zero trust security makes the everywhere workplace possible

Zero trust security clearly offers the most efficient and cost-effective way to secure the...

Read More
NEWS
A three-pronged approach to government security

The increase of ransomware attacks over recent years has cast a spotlight on the need for...

Read More
NEWS
Authentication best practice within a Zero Trust strategy

For CISOs around the world it seems at every turn, they are being told to implement Zero Trust....

Read More
NEWS
Navigating the SASE Maze

SASE is causing a buzz right now, and for good reason. By Jonathan Lee, Senior Product Manager,...

Read More
NEWS
Out of the Frying Pan and into the Firewall

Why the Kitchen and Enterprise IT Have More in Common Than it Seems. By Sharon Mandell is Senior...

Read More
NEWS
Security by design – is it just a pipe dream?

Nigel Thorpe, technical director at SecureAge Technology questions whether security by design will...

Read More
NEWS
Don’t pay the ransom: how to recover from a ransomware attack

Everyone is petrified of ransomware attacks right now, and with good reason. The attacks have...

Read More

Videos

Mike Nagus, CEO of LiNova, a battery tech company, talks backup power infrastructure, UPS and battery technologies – comparing and contrasting traditional approaches and solutions with some of the emerging...
Nigel Hedges, Application and Technical Specialist at Fluke Networks explains that, as fibre density increases and performance margins tighten; driven by AI, cloud, and next-generation digital infrastructure,...
In this interview, Phil Skelton, Senior Director of International Sales at eSentire, explores why modern defence demands multi-signal MDR that correlates identity, endpoint, cloud, network, and vulnerability...
In this conversation, Bill Andrews, President and CEO of ExaGrid, discusses how Tiered Backup Storage is helping MSPs improve performance, strengthen ransomware protection, and scale efficiently. He explains...

News

ANSecurity enhances cyber resilience for a UK racing and leisure organisation, ensuring security without interrupting operations at heritage venues.
Vertiv has introduced the Avocent MergePoint Unity 2, a KVM switch designed to support IT management across different environments with a focus on operational efficiency and security.
Hyland has expanded its enterprise content management (ECM) portfolio with new updates aimed at enhancing AI capabilities, automation, and management of unstructured data.
Logicalis' annual report highlights the ascent of AI in organisations, underlining the need for robust governance frameworks to align with technological advancements.