NEWS
As GDPR approaches, retail data breaches remain unacceptably high

Two in five retailers across the globe have experienced a data breach in the past year, according to the 2017 Thales Data Threat Report, Retail Edition.

Read More
CIF enhances its Code of Practice to support GDPR compliance for CSPs

CIF provides the only certification for CSPs who want to better position themselves as GDPR ready.

Read More
NEWS
Cloud success is on the cards

Moonpig.com is the world’s largest online personalised greeting card retailer. Founded in 1999 it now has almost four million active customers and ships over 14 million cards per year. Moonpig is a subsidiary of Photobox Group.

Read More
Telehouse now offering Verisign DDoS Protection Services

Telehouse is now offering Verisign’s Distributed Denial of Service (DDoS) Protection Services to Telehouse customers through a reseller relationship with Telehouse’s parent company KDDI.

Read More
Massive variations in cloud adoption among county councils

There are significant variations in the way that county councils use and ensure the availability of...

Read More
Automating IP address management

SolarWinds has introduced the latest edition of SolarWinds® IP Address Manager (IPAM), which now...

Read More
Parallel copy for faster backup & recovery

2ndQuadrant is proud to announce the release of Barman 2.2. Barman is a Backup...

Read More
69% of UK boards neglect GDPR compliance

IT decision-makers report inadequate levels of sponsorship from the C-suite despite the General...

Read More
NEWS
Declining confidence in public sector IT operations

Splunk has unveiled the results of the 2017 Splunk Public Sector IT Operations Survey. The...

Read More
IBM expands global Cloud data centre presence

New data centres, including two in London, England; one in San Jose, California; and one in...

Read More
Pulsant expands Cloud Storage offering

Pulsant has selected two InfiniBox storage arrays from INFINIDAT to deliver storage...

Read More
NEWS
Which type of network tester do you need?

With some IT technicians unsure which network infrastructure testing equipment is the right...

Read More

Videos

Andy, Data & AI Director at Pax8, explores what the agentic inflection point means in practice and how AI is moving beyond experimentation into real-world application. He breaks down the 'empty box' approach...
Greg Gyves, Director of Global MSP & GSI at TeamViewer, explores the real operational pressures MSPs are dealing with. He highlights expanding service boundaries, rising complexity, and the constant push to do...
Cullen discusses the findings of the company’s recent 2026 SolarWinds State of Monitoring & Observability Report, examining how IT teams are navigating increasingly fragmented hybrid environments, and in...
Jason Feist, Seagate SVP, Go-to-Market, discusses Seagate Technology’s next-generation Mozaic™ 4+ platform, said to be the industry’s only heat-assisted magnetic recording (HAMR)–based storage platform...

Expert Opinions

Even in 2026, insecure code often stems from time pressure and simple mistakes rather than intent. This guide outlines five common software security pitfalls, how to identify them, and how to fix them before...
By Dan Bridges, Technical Director, Dropzone AI.