NEWS
Navigating shark-infested waters

Why businesses need a bigger boat for tackling IaC security By Robert Haynes, SCA & Open Source Evangelist, Checkmarx.

Read More
NEWS
Delivering an effective cybersecurity strategy

Cybersecurity continues to be a major challenge for companies, with as many as four in ten businesses (39%) reporting cyber security breaches or attacks in the last 12 months. By Richard Slater, Head of Managed Services at Amido.

Read More
NEWS
How Zero trust security makes the everywhere workplace possible

Zero trust security clearly offers the most efficient and cost-effective way to secure the...

Read More
NEWS
A three-pronged approach to government security

The increase of ransomware attacks over recent years has cast a spotlight on the need for...

Read More
NEWS
Authentication best practice within a Zero Trust strategy

For CISOs around the world it seems at every turn, they are being told to implement Zero Trust....

Read More
NEWS
Navigating the SASE Maze

SASE is causing a buzz right now, and for good reason. By Jonathan Lee, Senior Product Manager,...

Read More
NEWS
Out of the Frying Pan and into the Firewall

Why the Kitchen and Enterprise IT Have More in Common Than it Seems. By Sharon Mandell is Senior...

Read More
NEWS
Security by design – is it just a pipe dream?

Nigel Thorpe, technical director at SecureAge Technology questions whether security by design will...

Read More
NEWS
Don’t pay the ransom: how to recover from a ransomware attack

Everyone is petrified of ransomware attacks right now, and with good reason. The attacks have...

Read More

Videos

In this interview, Lorenzo Romano, CEO of GCX, explores the shift from traditional Service Level Agreements to Experience Level Agreements and what it means for MSPs delivering managed connectivity. He...
Dr. Peter de Bock, vice president, Data Center Energy and Cooling Technology, Eaton, discusses what the launch of the NVIDIA Rubin platform means for data centre power demand, explaining that it could be a...
In this in-depth conversation, Roy Azoulay, Co-founder and CIO of Cynomi, and Phil Bindley, Field CISO at Intercity Technology, explore how MSPs and MSSPs can turn regulatory compliance, AI governance, and...
Greg Jones, SVP of MSP Success at Kaseya, discussed the TruPeer initiative and its role in supporting MSPs. He also addressed SMB IT growth, AI adoption, sustainability, and the influence of Gen Y and Gen Z...

News

Hitachi partners with SIT to co-develop a Hybrid AC/DC Rack-Level Power Distribution Testbed, aimed at enhancing energy efficiency in Southeast Asian data centres.
Forescout Technologies has introduced VistaroAI, an AI-based cybersecurity platform designed to support organisations in managing digital threats and security workflows.
Sophos’ latest report highlights the rise of identity-related cyberattacks, emphasising the need for robust identity security measures.
Securonix collaborates with AWS to introduce Sam the AI SOC Analyst, a model designed to enhance SOC productivity and governance.