NEWS
Securing cities in the cyber age

It now seems kind of quaint that cybercriminals go after computers. The kind of threats we now expect to have, have a much larger appetite. By Mike Nelson, VP of IoT Security, DigiCert.

Read More
NEWS
Four questions organisations need to ask after a cyber attack

Cyber attacks are inevitable, but it’s how an organisation deals with them that can make or break their business. Have they got all the answers, and do they fully understand the implications? Can they be sure the attack won’t happen again? Swift and comprehensive incident response is a...

Read More
NEWS
Why 5G will require next-generation security to combat real-time cyber threats

Rest assured, 5G is coming and it promises to be faster with less latency and better support for applications such as IoT than any of its predecessors. It will be strikingly faster than 4G, and this will be particularly obvious when downloading or streaming media. On average, 4G has a maximum...

Read More
NEWS
De-bunking the myths of AI cyber security

Artificial Intelligence is widely perceived as ‘the next big thing’ in cyber security. But with many providers attempting to jump on board and jostle to use the latest industry buzzword, services are being incorrectly marketed as ‘AI-based’, leading to much confusion. By Neil Kell,...

Read More
NEWS
Empowering developers through security

Businesses have been scrambling to leverage the power of the Internet of Things (IoT) for years....

Read More
NEWS
Keeping Data Safe in the Cloud – the Essential Checklist

Earlier this year a US software engineer hacked into a server holding the personal information of...

Read More
NEWS
Why cybersecurity must be viewed as more than an IT issue

The right security approach is vital to a successful digital transformation. By Stan Lowe, global...

Read More
NEWS
Enhancing enterprise security and improving performance through software code analysis

Enterprises across the globe write and re-write billions upon billions of lines of software code in...

Read More
NEWS
How Cognitive Bias Leads to Reasoning Errors in Cybersecurity

Forcepoint’s Dr Margaret Cunningham shares insight on how human bias can impact decision making...

Read More
NEWS
Cyber risk management – bringing security intelligence to the Board

Data breaches are costly. According to a recent Ponemon Institute study, the average breach costs...

Read More
NEWS
GDPR Compliance – Best Practice Security

When the General Data Protection Regulation (GDPR) came into effect in May 2018, businesses from...

Read More
NEWS
GDPR – one year on

How has GDPR changed the security and compliance landscape? Over the following pages, you’ll find...

Read More

Videos

Michael Anderson, VP, Business Development at Abstract Security, discusses the launch of the company’s PAINT Partner Program (Partnerships, Alliances, and INTegrations), designed to empower resellers, MSPs,...
Katie Coulson, EVP & General Manager, Skanska Advanced Technology (SAT), talks about how Skanska approaches some of the most demanding construction projects in the data centre industry, thanks to its new...
Rob Finn, VP International Sales at Chainguard, discusses the company’s new Global Partner Program, offering flexible incentives, technical enablement, and go-to-market support to empower channel resellers...
Maxime Vermeir, Senior Director of AI Strategy at ABBYY, discusses the results from ABBYY’s State of Intelligent Automation: GenAI Confessions 2025 survey, which reveals challenges in implementing Generative...

News

Integrated power and control solutions will help data centres avoid costly downtime via intelligent power management. Companies will collaborate on highly integrated battery energy storage systems for...
6G@UT collaborates with Keysight Technologies to explore digital twins, reshaping wireless and autonomous systems.
Gcore introduces AI Cloud Stack, enabling CSPs and enterprises to deploy scalable, profitable AI infrastructure.
Pulsant has expanded its debt facilities, securing £187m to bolster UK growth and technological capabilities.