NEWS

Cybersecurity teams excluded from AI onboarding

ISACA research shows automating threat detection/response and endpoint security are the most popular applications of AI for security operations.

Read More

BLOG

Making the unknown ‘known’ with AI-powered threat intelligence

Nadir Izrael, Co-Founder and CTO at Armis discusses the importance of critical infrastructure adopting new solutions to stay ahead of rising cyber threats.

Read More

BLOG

When it comes to data, what would set CIOs up for 2025?

It’s getting to the time of year when priorities suddenly come into sharp focus. Just a few months ago, 2024 was fresh and getting started. Now, the days and weeks are being ticked off the calendar at breakneck speed, and with 2025 within touching distance, many CIOs will be under pressure to deliver before the year is out.

Read More

BLOG

Achieving operational excellence with optimised IT

By Andrew Strevens, Chief Integration Officer for the new organisational Hampshire and IOW Healthcare NHS Foundation Trust, previously CEO of Solent NHS Trust.

Read More


BLOG

Zero Trust Architecture: The Key to Securing Hybrid Environments

By Asher Benbenisty, Director of Product Marketing at AlgoSec.

Read More

Zscaler has released the Zscaler ThreatLabz 2024 Phishing Report, which analyzes 2 billion blocked...
Apricorn research highlights encryption assurances being met as 96% mandate encryption on removable...
New Report: Don’t drown in data debt; champion your Data First culture reveals that a lack of...
According to the new AI Networks for AI Workloads report by Dell’Oro Group, spending on switches...
2025 predictions from Ranjan Singh, chief product officer at Kaseya.
Research reveals one in ten security professionals admit to having suffered a data breach as a...
Latest Video

Hybrid working 2.0 is here – don’t panic!

Neil Patel, Director, European Marketing & Business Development, and Alan Jones, Consumer Solutions & Marketing Manager, UK&I, both at D-Link Europe Ltd, discuss the practicalities of hybrid working, with particular reference to ways in which the home office can be upgraded to ensure an optimised, secure IT environment which, in turn, will lead to an optimised employee experience.

Read more