Closing the loop on DevOps

By Elizabeth Lawler, vice president, DevOps security at CyberArk.

Read More
The evolution of robotics: meet your new colleague

By Volker Spanier, Head of Robotics Solutions for Epson Europe.

Read More
Tackling poor password hygiene habits head-on

Alvaro Hoyos, Chief Information Security Officer at OneLogin.

Read More
Proactive vs. Reactive: which is better for DDoS defence?

By Ronald Sens, EMEA Director for A10 Networks.

Read More
Considering the Cloud Apps you don’t know about

By James Smith - Head of Architecture & Innovation at Cloud Technology Solutions.

Read More
NEWS
The compliance conundrum

By Mark Baker, Field Product Manager, Canonical.

Read More
Disaster Recovery – Choosing the right provider for you

By Richard Stinton, Enterprise Solutions Architect at iland.

Read More
NEWS
Cloud eight years on

By Justin Augat, Head of Product Marketing, Virtustream.

Read More

Videos

Ofir Bloch, VP at WalkMe, discusses the results of WalkMe’s fifth annual State of Digital Adoption report, which reveals that over half (54%) of workers bypassed AI tools and completed tasks manually at...
Matt Wilkins, Global Director of Design and Engineering at Colt DCS, explains that data centre operators need ‘controlled flexibility’ now more than ever, as tightened regulatory environments, skills gaps,...
As AI tools evolve into a rapidly growing digital workforce, organisations are being forced to rethink how they secure them. In this conversation, Steve Wilson, Chief AI Officer at Exabeam, explains why AI...

News

Dell Technologies has introduced PowerMaxOS 10.4, with updates focused on performance improvements, enhanced security features, and expanded integration capabilities to support infrastructure environments.
Powered by Kaseya Intelligence, Kaseya’s platform said to combine the industry’s deepest real-world IT dataset with an execution layer that acts with accuracy.
Nearly half of European organisations spend up to €5 million a year on cloud – yet a quarter of capacity sits idle.
The disruption of Tycoon 2FA has led to notable shifts in the phishing ecosystem, with changes in attacker behaviour, tooling, and technique emerging as the landscape continues to evolve.