NEWS
From vision to impact: How women are transforming the technology industry for International Women in Engineering Day

International Women in Engineering Day provides an opportunity to celebrate the women driving...

Read More
NEWS
Empowering Businesses in 2025: How Upskilling Workforces Can Strengthen Cyber Defence

By Irvin Shillingford, Hornetsecurity’s Regional Manager for the UK, Benelux, and Nordic Regions.

Read More
NEWS
Navigating cloud security: what organisations need to know

By Nicholas Lynch, Principal Consultant at NetSPI.

Read More
NEWS
Foundational Data Governance is Imperative for AI Adoption and Compliance

By Manuel Sanchez, Information Security and Compliance Specialist, iManage.

Read More
NEWS
What you need to know about NIS2

The NIS2 Directive is transforming the cyber security landscape for critical infrastructure...

Read More
NEWS
Making Network Security Manageable Again

By David Brown, SVP International Business, FireMon.

Read More

Videos

DCW Asia 2025 - Part 1 of 3
Steven Heinsius, Vice President of Product Management & Marketing EMEA, explains what sets the new Cisco 360 program apart for MSPs. He highlights how it enables outcome-driven managed services and shares...
James Netherwood, Head of Research Middle East, Capacity and Datacloud, discusses the upcoming Capacity Middle East event and the launch of Datacloud Middle East. The events unite over 3,500 executives from...
Michael Downs, VP, global sales at SecurEnvoy, discusses the importance of Multi-Factor Authentication (MFA) as a crucial part of any effective cybersecurity strategy.

News

11:11 Systems has announced its 2025 UK and Europe Partner Award recipients, recognising partners involved in application modernisation and data management projects.
Derek Whigham has been appointed Non-Executive Director and Strategic Advisor at Acumen Cyber, marking an enhancement in their leadership team.
A recent survey uncovers the high stress levels experienced by UK IT and cyber professionals, highlighting the fear of job loss following a breach.
With AI adoption accelerating, cloud security faces unprecedented challenges. This article explores some of the key factors complicating contemporary cybersecurity strategies.