NEWS
Understanding threat attribution in cybersecurity

The TrendAI framework offers a structured approach to threat attribution, emphasising evidence over labels.

Read More
NEWS
Alteryx report highlights barriers and opportunities in AI adoption

AI adoption faces trust and data challenges despite rising investments, with only a quarter of pilots moving into production successfully.

Read More
NEWS
AI success lies in strong knowledge foundations, iManage study reveals

iManage's latest report highlights the crucial role of knowledge maturity in effective AI integration and business success.

Read More
NEWS
Portnox heightens zero trust with console-based application support

Portnox expands its Zero Trust Network Access solution by including console-based applications, removing passwords from critical access points.

Read More
NEWS
The dual disconnect: addressing AI maturity gaps in enterprises

JumpCloud's latest report sheds light on the disparity between perceived and actual AI readiness...

Read More
NEWS
Dynatrace expands AI observability with AWS integrations

Dynatrace surpasses $1 billion in AWS Marketplace sales, enhancing AI observability and cloud...

Read More
NEWS
The security implications of AI skills in organisations

AI skills provide operational benefits but introduce new risks, particularly in security-intensive...

Read More
NEWS
AI in 2026: ensuring safe and accountable use

In advance of Safer Internet Day, Sean Tilley, Senior Sales Director EMEA at 11:11 Systems, found...

Read More
NEWS
SonicWall's 2026 Partner Awards showcase UK and EMEA leadership

The 2026 SonicWall Partner Awards highlight the achievements of partners and distributors across...

Read More
NEWS
Veeam Software welcomes Piero Gallucci as Regional VP for UK & Ireland

Veeam Software appoints Piero Gallucci as Regional VP for UK and Ireland, aiming to strengthen its...

Read More
NEWS
Renaissance partners with TP-Link for enhanced networking solutions in Ireland

Renaissance teams up with TP-Link to expand networking solutions, utilising TP-Link's Omada...

Read More
NEWS
Pure Storage unveils enhanced partner programme with new 'Ambassador' tier

Pure Storage updates its partner programme, focusing on expertise, specialisation, and operational...

Read More
NEWS
Businesses struggle with security amidst AI threats

Enterprises face challenges in scaling security and tackling AI threats due to talent shortages and...

Read More
NEWS
BSIMM16: navigating software security amidst AI, regulation, and supply chain challenges

Exploring BSIMM16's insights on AI-driven security challenges, regulatory pressures, and evolving...

Read More
NEWS
AI: moving from experimentation to organisational integration

AI is universally deployed but full integration remains rare. This report examines the barriers and...

Read More

Videos

Data Centre World 2026
Matthew Martin, Managing Director of Quantum Design Oxford, discusses the critical role that quantum data centres will play in advancing the deployment of quantum technologies. He explains how quantum data...
Jason Feist, Seagate SVP, Go-to-Market, discusses Seagate Technology’s next-generation Mozaic™ 4+ platform, said to be the industry’s only heat-assisted magnetic recording (HAMR)–based storage platform...
Luca Simonelli, Senior Vice President Channel & Global Alliances at GCX, explains the move toward converging underlay and overlay models, and how this is shaping unified networking and security delivery. He...

Expert Opinions

Even in 2026, insecure code often stems from time pressure and simple mistakes rather than intent. This guide outlines five common software security pitfalls, how to identify them, and how to fix them before...
By Mihir Nandkeolyar, Director Business Development Global Data Centre Solutions, Johnson Controls.
By Michael Vallas, Global Technical Principal, Goldilock Secure.
By Brett Candon, VP International, Dropzone AI.