Shadow IT lurks uncomfortably, for IT departments

The growth in ‘Shadow IT’ is leaving IT departments caught between a rock and a hard place, according to Simon Bain, CTO of search specialists, Simplexo, who suggests that the concerns existing around managing unsupported devices are equally matched by the need to bring IT expenditure...

Read More
New survey highlights worrying lack of guidance from employers on use of personal devices

A survey commissioned by the Information Commissioner’s Office (ICO) has shown many employers appear to have a ‘laissez faire’ attitude to allowing staff to use their personal laptop, tablet computer or smartphone for work business, which may be placing people’s personal...

Read More

Videos

In this conversation, ESET UK Country Manager, Matt Knell, discusses why MSPs must move beyond basic endpoint protection and adopt a layered, proactive security approach. He shares practical insights on MDR...
DCW Asia 2025 - Part 1 of 3
Erin McLean, CMO at Cynomi, explains how MSPs can use embedded CISO intelligence to manage enterprise-wide cybersecurity programs. She discusses translating technical controls into business outcomes, engaging...
In this interview, Lorenzo Romano, CEO of GCX, explores the shift from traditional Service Level Agreements to Experience Level Agreements and what it means for MSPs delivering managed connectivity. He...

Expert Opinions

By Federica Monsone, CEO and founder, A3 Communications - the data storage industry PR agency.
By Adhum Carter Wolde-Lule – Director at Prism Power Group.
By Kirsty Biddiscombe, EMEA Business Lead AI, ML & Data Analytics, NetApp.