NEWS
Why Cloud Migration Alone Won’t Unlock AI Value

By Apurva Kadakia, Global Head, Cloud and Partnerships, Hexaware.

Read More
NEWS
The AI Boom Is Exposing a Delivery Gap

By Brian O’Hare, Service Director at BCS Consultancy.

Read More
NEWS
The secret to turning AI hype into real business results

Paul Swaddle, Product Manager at Serios Group and Lucy Batley, founder of AI consultancy Traction...

Read More
NEWS
Artificial Intelligence or human intelligence, which is the priority?

By Russell Gammon, Chief Innovation Officer at Tax Systems.

Read More
NEWS
Managing persistent exposure: why APT defence requires a strategic shift

By Lorri Janssen-Anessi, Director of External Cybersecurity Assessments, BlueVoyant

Read More

Videos

Mostyn Thomas, Senior Director of Security EMEA at Pax8, breaks down how ransomware is evolving, what the new Cyber Essentials standards mean in practice, why attackers are increasingly targeting supply...
Data Centre World 2026
Daniel Reeves, CEO of The Computer Clinic Bicester, shares how the business has evolved from its roots into a modern IT services provider supporting both consumers and organisations. He discusses shifting...
Matthew Martin, Managing Director of Quantum Design Oxford, discusses the critical role that quantum data centres will play in advancing the deployment of quantum technologies. He explains how quantum data...

News

CRN UK, a brand of The Channel Company, has included Johnny Carpenter, VP of Channels and Alliances EMEA, in the 2026 CRN® Channel Leaders EMEA list.
HPE has introduced new security innovations designed to help organizations scale distributed operations, reduce cyber risk, and maintain consistent governance as AI adoption accelerates across the enterprise.
The French State’s acquisition of Bull supports its strategy around technological sovereignty, with implications for high-performance computing and AI.
Proton has launched Proton Workspace, a suite of business productivity tools, alongside Proton Meet, a video conferencing service with end-to-end encryption.