NEWS
Five ways organisations can prepare their workforce for IoT

Gartner predicts that 25 billion connected things will be in use by 2021. This presents a huge opportunity for businesses to harness data, optimise their operations and deliver more personalised experiences to users. By Martin Ewings, Director of Specialist Markets, Experis.

Read More
NEWS
Going in deep - why collaboration is the key to cybersecurity

Fighting cybercrime is a never-ending arms race. If businesses want to get ahead of the bad guys, joining forces will help them fight to win. Having access to the latest information from peers and subject matter experts will typically help all organisations, large or small, deal with any threat...

Read More
NEWS
Securing cities in the cyber age

It now seems kind of quaint that cybercriminals go after computers. The kind of threats we now expect to have, have a much larger appetite. By Mike Nelson, VP of IoT Security, DigiCert.

Read More
NEWS
Four questions organisations need to ask after a cyber attack

Cyber attacks are inevitable, but it’s how an organisation deals with them that can make or break their business. Have they got all the answers, and do they fully understand the implications? Can they be sure the attack won’t happen again? Swift and comprehensive incident response is a...

Read More
NEWS
Why 5G will require next-generation security to combat real-time cyber threats

Rest assured, 5G is coming and it promises to be faster with less latency and better support for...

Read More
NEWS
De-bunking the myths of AI cyber security

Artificial Intelligence is widely perceived as ‘the next big thing’ in cyber security. But with...

Read More
NEWS
Empowering developers through security

Businesses have been scrambling to leverage the power of the Internet of Things (IoT) for years....

Read More
NEWS
Keeping Data Safe in the Cloud – the Essential Checklist

Earlier this year a US software engineer hacked into a server holding the personal information of...

Read More
NEWS
Why cybersecurity must be viewed as more than an IT issue

The right security approach is vital to a successful digital transformation. By Stan Lowe, global...

Read More
NEWS
Enhancing enterprise security and improving performance through software code analysis

Enterprises across the globe write and re-write billions upon billions of lines of software code in...

Read More
NEWS
How Cognitive Bias Leads to Reasoning Errors in Cybersecurity

Forcepoint’s Dr Margaret Cunningham shares insight on how human bias can impact decision making...

Read More
NEWS
Building digital transformation with security in mind

Enterprises face both external and internal threats to their data, network and IT assets....

Read More

Videos

Libby Duane Adams, Chief Advocacy Officer and Co-Founder at Alteryx, believes that businesses can’t afford to fall behind in their AI and data strategy – they must accelerate it to stay ahead of the curve...
Dr. Alyson Freeman; Customer & Innovation lead, Sustainability & ESG, Dell Technologies, discusses the sustainability challenges facing the data centre industry and some of the ways in which the facility...
Michael Crabb, SVP Commercial, Last Energy, talks through the energy start-up’s micro-scale nuclear power plant - a central component of the company's 20 MW modular power plant, which can be developed within...
Chris McKie, VP, Product Marketing Networking, Security & Risk Management Solutions, Kaseya, discusses the findings of the company’s recently published 2024 MSP Benchmark Report, with automation,...

News

The value of the graphic processor unit (GPU) sales in 2023 more than doubled the previous year’s figure according to refurbished technology specialists ETB Technologies.
Veeam enhances Kubernetes-native data protection with Kasten V7.0, expanding VM and cloud-native support for Red Hat OpenShift and Microsoft environments and boosting security capabilities to enhance...
Google Cloud enables CrowdStrike for Mandiant IR and MDR services.
Cato Networks has unveiled the findings of its inaugural Cato CTRL SASE Threat Report for Q1 2024. The report shows all organisations surveyed continue to run insecure protocols across their wide access...