NEWS
Cloud and cybersecurity misalignment

The majority (70 percent) of cybersecurity professionals working in large organizations across Europe and the Middle East say that a rush to the cloud is not taking full account of the security risks. This is highlighted by a new cloud security study conducted for Palo Alto Networks.

Read More
Cloudian acquires Infinity Storage

Platform slashes storage TCO by 70 per cent compared to traditional NAS systems.

Read More
Improved visibility into physical and virtual infrastructure

Support added for leading all-flash arrays from Dell EMC, HPE Nimble Storage, INFINIDAT and IBM.

Read More
Protect Plus S300 offers 'extra-compact', standalone UPS

The most compact 3-phase UPS on the market for critical applications from 10 to 200 kVA.

Read More
Royal Brompton and Harefield NHS Trust goes cloud-first

Royal Brompton and Harefield NHS Trust has joined forces with ANS Group in order to transform and...

Read More
NEWS
Almost two thirds of finance organisations are preparing for a blockchain revolution

Nearly two thirds (65%) of finance organisations are already prepared or preparing for an...

Read More
NEWS
Verizon and Colt demonstrate two-way inter carrier SDN network orchestration

The companies have successfully showcased near-real-time bandwidth changes in each other’s...

Read More
GridGain strengthens management team

GridGain Systems is expanding its management team to keep pace with surging demand for its...

Read More
NEWS
Cloud outages - a stumbling block for Cloud adoption?

Organisations need to evaluate their data protection and business continuity options to ensure they...

Read More
NEWS
Digitialisation stagnating

Just 5% of board members in non-tech organisations have digital competencies.

Read More
NEWS
Rush to the Cloud bypasses security

The majority (68 percent) of cybersecurity professionals working in large organisations in the UK...

Read More
NEWS
AWS adoption is broad in EMEA but security and compliance is lagging behind

Sumo Logic reveals YoY EMEA trends within each tier of the modern application stack.

Read More

Videos

Luca Simonelli, Senior Vice President Channel & Global Alliances at GCX, explains the move toward converging underlay and overlay models, and how this is shaping unified networking and security delivery. He...
Jason Feist, Seagate SVP, Go-to-Market, discusses Seagate Technology’s next-generation Mozaic™ 4+ platform, said to be the industry’s only heat-assisted magnetic recording (HAMR)–based storage platform...
Oliver Simonnet, Lead Cybersecurity Researcher at CultureAI, discusses the findings of the company’s The State of Enterprise AI Usage: The Illusion of Control report, which reveals a growing gap between how...
Laura Allwood, now a fully qualified Project Manager at Arcadis, outlines her journey from Apprentice Project Manager to her current role - along the way obtaining a degree in Construction Management and...

Expert Opinions

By Roy Azoulay, Co-founder, Chief Information & AI Officer at Cynomi.
Even in 2026, insecure code often stems from time pressure and simple mistakes rather than intent. This guide outlines five common software security pitfalls, how to identify them, and how to fix them before...
By Robert Hannigan, Chairman of International Business at BlueVoyant.