Red Hat improves IT flexibility

Red Hat OpenStack Platform 12 introduces containerized services and improves overall platform security.

Read More
DevOps and security teams must work together

CyberArk says that DevOps and security professionals have worrying knowledge gaps about where privileged accounts and secrets exist across the IT infrastructure, according to the first findings to be released from CyberArk’s Advanced Threat Landscape 2018 report. When offered several...

Read More
Subscription model for secure app services

A10 Networks has introduced A10 FlexPool, a software subscription model that provides enterprises and service providers with the ability to simplify the consumption of app services. The A10 FlexPool aggregated capacity model allows customers to flexibly allocate and re-distribute capacity...

Read More
Italtel deploys green data centre for the University of Pisa

New facility supports teaching and research activities and meets strict sustainability criteria.

Read More
Digital dissatisfaction

Advanced report shows one in three employees don’t believe their bosses are fit to lead their...

Read More
Performance minitoring for digital business

Creates seamless link between end user experience and network performance management.

Read More
OpenStack private cloud revenue to overtake its public cloud revenue in 2018

Growth of OpenStack private cloud will overtake public cloud revenue for service providers sooner...

Read More
Asperitas and Ecoracks close deal

Asperitas and Ecoracks datacenter have announced a deal for the first Immersed Computing...

Read More
NEWS
Bromium helps London’s Metropolitan Police

Metropolitan Police Cybercrime Unit, FALCON, to use Bromium to conduct cyber forensics to identify...

Read More
UiPath and Celonis team

Companies combine Robotic Process Automation with Process Mining to accelerate the initialisation,...

Read More
NEWS
Passwords cause BYOD risk

Systems left exposed to the threat of compromised credentials, potentially resulting in...

Read More

Videos

Martin Jakobsen, Founder and Director of Cybanetix, explains how his team takes a “paranoid” security approach, using AI, automation, and analyst training to proactively detect threats. He discusses why...
Michael Downs, VP, global sales at SecurEnvoy, discusses the importance of Multi-Factor Authentication (MFA) as a crucial part of any effective cybersecurity strategy.
Softcat’s Dean Gardner (Technology Director) and Adam Harding (Head of OCTO) unpack the findings of the organisation's latest Business Tech Report. From agentic AI and ransomware resilience to sustainability...
Alex Walsh, Regional VP of Channel Sales, EMEA North at Keepit, discusses the company’s channel-first strategy, broad SaaS data protection, and how MSPs can differentiate amid consolidation and cyber risks,...

Expert Opinions

By Jon Healy, Regional Strategic Operations Officer, EMEA, at Salute.
By Linda Kerr, director of marketing, managed services at WatchGuard Technologies.
By Fernando Rionegro, Vice President, Cloud and Network Services, Europe at Nokia.
By Graham Jarvis, Freelance Lead Journalist - Business and Technology, Trudy Darwin Communications