Trustis protects mobile and cloud services with Thales

Thales hardware security modules provide on-demand digital certificates to government agencies on UK G-Cloud.

Read More
Centrify delivers secure access controls for Red Hat storage

Centrify Corporation says that Centrify DirectControl has added enhanced support for Red Hat Storage, delivering Active Directory-based authentication and single sign-on for users accessing file shares on Red Hat Storage. Enterprises can now benefit from additional secure access to data stored on...

Read More
Outsourcery announces new Survivable Branch Appliance Integration service for enterprise telephony resilience

Proposition set to improve enterprise resilience in the face of a WAN outage and ensure critical...

Read More
Colt heads east with launch of enterprise class cloud services in Asia

European customers able to deploy scalable IT services quickly and easily to support business...

Read More
iomart Group launches 2013 Sports Campaign

iomart Group plc has launched its annual youth sports initiative Host Your Kit with the new...

Read More
Wireless for Nottingham University

Campus-wide Wi-Fi network to promote new ways of working for students and staff.

Read More
(ISC)²® introduces expert-level cyber forensics certification

(ISC)²® (“ISC-squared”), the world’s largest not-for-profit information...

Read More
Art’ or ‘Science’? security professionals split

49 percent of US respondents say ‘art,’ while 58 percent of UK respondents say...

Read More
Infoblox expands security offerings

Infoblox Inc. has introduced new solutions to help global businesses, government agencies and...

Read More
Red Hat continues driving applications to Open Hybrid Clouds

Red Hat continues to demonstrate its leadership in fulfilling enterprise application needs in the...

Read More

Videos

Andy, Data & AI Director at Pax8, explores what the agentic inflection point means in practice and how AI is moving beyond experimentation into real-world application. He breaks down the 'empty box' approach...
Jason Feist, Seagate SVP, Go-to-Market, discusses Seagate Technology’s next-generation Mozaic™ 4+ platform, said to be the industry’s only heat-assisted magnetic recording (HAMR)–based storage platform...
Aleksandar Grbić, Global Data Center Solutions Manager, Hitachi Energy, discusses how the electricity grid must evolve to handle soaring demand from AI data centres. Grid integration and grid resilience have...
Phylip Morgan, Senior Vice President, Marketplace & Channel Expansion at Pax8, explores the shift from Managed Service Providers to Managed Intelligence Providers and what it means for the future of the...

Expert Opinions

In an exclusive conversation with Devang Mehta of Infrassist, the focus is on how MSPs can move beyond reactive firefighting and build for sustainable growth. Mehta explains how MSPs must rethink how they...
Even in 2026, insecure code often stems from time pressure and simple mistakes rather than intent. This guide outlines five common software security pitfalls, how to identify them, and how to fix them before...
By Robert Hannigan, Chairman of International Business at BlueVoyant.
By Sean Tilley, Senior Director of Sales EMEA at 11:11 Systems.