BLOG

The single way to manage multi-tenants

By Troels Rasmussen, GM of Security, N-able.

Read More

BLOG

Beyond Encryption: The New Face of Ransomware Threats

By Lorri Janssen-Anessi, Director of External Cyber Assessments at BlueVoyant.

Read More



BLOG

Protecting Data in the Cloud – It’s the Wild West Out There

In the rush to embrace cloud-first strategies, data security has become dangerously misunderstood, and the result is a fragmented, chaotic environment that’s starting to feel like the Wild West.

Read More

VIDEO

Unlocking more personalised customer experiences with AI, RCS, and integrated omnichannel strategies

Sophie Cheng, Sinch’s SVP of Product Marketing, discusses the findings of the company’s recent report, the state of customer communications, which explores how brands are adapting their engagement strategies as customer expectations rise, and AI adoption accelerates globally. She explains that the businesses that lead are putting the customer at the heart of their communication strategies, letting them choose how and where they want to connect and using AI, and channels like RCS, to make...

Read More

Only 14% of security & risk management (SRM) leaders can effectively secure organisational data...
The web intelligence industry has decisively turned to artificial intelligence as the main method...
ISACA launches framework and new portfolio of resources to provide enterprises with the tools to...
Nearly 50% of organisations have experienced a security breach in the last two years.
71% of business leaders say their workforces are not ready to successfully leverage AI.
Observability programme maturity is uneven across data quality, data pipelines, and AI/ML models,...
Latest Video

Hybrid working 2.0 is here – don’t panic!

Neil Patel, Director, European Marketing & Business Development, and Alan Jones, Consumer Solutions & Marketing Manager, UK&I, both at D-Link Europe Ltd, discuss the practicalities of hybrid working, with particular reference to ways in which the home office can be upgraded to ensure an optimised, secure IT environment which, in turn, will lead to an optimised employee experience.

Read more