NEWS
The endpoint management challenge in higher education

By Andre Schindler, GM EMEA and SVP Global Sales at NinjaOne.

Read More
NEWS
Safeguarding Manufacturing: Navigating the Complexities of Cyber Resilience in Industry 4.0

By Oliver Feiler, Head of Global Alliances and Strategic Partnerships EMEA, Nozomi Networks and...

Read More
NEWS
Passwordless systems: the new way to authenticate? 

By David Higgins, EMEA Technical Director at CyberArk.

Read More
NEWS
AI, cybersecurity risk, and regulation – the new triad shaping data governance

By Manuel Sanchez, Information Security and Compliance Specialist, iManage.

Read More
NEWS
Process Over Top-Down Enforcement: How to Empower Employees to Prevent Data Leaks

Anita Mavridis, VP of Product at Zivver, and Sue Musumeci, Director of Quality & Clinical...

Read More
NEWS
Making the unknown ‘known’ with AI-powered threat intelligence

Nadir Izrael, Co-Founder and CTO at Armis discusses the importance of critical infrastructure...

Read More

Videos

Matthew Irish, General Manager, Digital Services at Apogee Corporation, explains how and why many companies still find the idea of digital transformation overwhelming with multi-year projects that cost a...
Maxime Vermeir, Senior Director of AI Strategy at ABBYY, discusses the results from ABBYY’s State of Intelligent Automation: GenAI Confessions 2025 survey, which reveals challenges in implementing Generative...
Mark Pestridge, Executive Vice President & General Manager for Telehouse Europe, discusses the company’s new Telehouse West Two data centre, purpose-built to support the rapid adoption of emerging...

News

Derive transforms its platform, adding Governance and Operations modules to enhance cyber risk management and decision-making.
Discover the features of Red Hat Developer Hub 1.8, designed to enhance developer productivity and streamline onboarding with AI integration and automation.
Sysdig unveils upgrades to Falco and Stratoshark, enhancing open source cloud threat analysis.
New research shows a dangerous complacency in UK cybersecurity strategies, leaving businesses exposed in a rapidly evolving threat landscape.