NEWS
A Cautionary Tale from the Frontlines of Cybersecurity

By Nadeem Azhar, CEO of PC.Solutions.Net.

Read More
NEWS
How the CrowdStrike outage redefined feature delivery
  • Posted on 14th August 2025 in by Aaron Sandhu

By Joe Byrne, Global Field CTO at LaunchDarkly

Read More
NEWS
Technology alone can’t mitigate supply chain risk, but strategic partnerships can

By Lorenzo Romano, CEO of GCX Managed Services.

Read More
NEWS
Why AI still isn’t delivering and how to fix it

By Kirsty Biddiscombe, EMEA Business Lead for AI, ML & Data Analytics, NetApp.

Read More
NEWS
The single way to manage multi-tenants

By Troels Rasmussen, GM of Security, N-able.

Read More
NEWS
Beyond Encryption: The New Face of Ransomware Threats

By Lorri Janssen-Anessi, Director of External Cyber Assessments at BlueVoyant.

Read More
NEWS
Protecting Data in the Cloud – It’s the Wild West Out There

In the rush to embrace cloud-first strategies, data security has become dangerously misunderstood,...

Read More
NEWS
From Gimmick to Game Changer - Vibe Coding Myths Debunked

By Michael Hunger, VP of Product Innovation, Neo4j.

Read More

Videos

Data Centre World Madrid 2025
Chris Gilmour, CTO of Axians UK, explains how Axians, the ICT brand of VINCI Energies, and Nokia are deepening their strategic collaboration to drive the next phase of communications infrastructure and mobile...
Dan Schiappa, President of Technology and Services at Arctic Wolf, discusses the results of the company’s 2025 AI report, which reveals that AI is rapidly becoming a cornerstone of modern cybersecurity, but...

News

Skillsoft partners with edX to enrich its platform with university courses, bridging skills gaps in the evolving workforce.
CrowdStrike unveils Falcon AIDR, a unified platform to secure AI interactions, marking a new era in enterprise AI security.
MetaCompliance expands its foothold in Europe by acquiring Nordic leader Junglemap, enhancing its capacity to offer advanced security and compliance solutions.
Trellix unveils innovations in cybersecurity, bolstering the convergence of OT-IT environments and enhancing perimeter defence against sophisticated threats.