NEWS
Meeting future workload demands: the case for emerging memory technologies

By Federica Monsone, CEO, A3 Communications.

Read More
NEWS
Building Post-Quantum Resilience Into Enterprise Security

By Krishna Narayanaswamy, Chief Technology Officer (CTO) at Netskope.

Read More
NEWS
Phygital retail experiences need to combine technology with customer research

By Matt Sherwen, Managing Director of Sherwen Studios.

Read More
NEWS
The AI Triple Threat: Identity Security Is the First Line of Defence

By David Higgins, Senior Director, Field Technology Office, CyberArk.

Read More
NEWS
Paying a Premium for Cyber Insurance

Pulsant’s Natasha O’Brien explains why a resilient and sovereign digital infrastructure could...

Read More
NEWS
When Air-Gaps Need WAN Acceleration

By David Trossell, CEO and CTO of Bridgeworks.

Read More
NEWS
The importance of safeguarding data in the quantum era

By Carl Windsor, Chief Information Security Officer, Fortinet.

Read More

Videos

In this interview, Will Morey, Managing Director at Gamma, discusses the company’s Webex launch, including how a partner-led pre-launch shaped the offering, the influence of MSP demand, and how the platform...
Matthew Martin, Managing Director of Quantum Design Oxford, discusses the critical role that quantum data centres will play in advancing the deployment of quantum technologies. He explains how quantum data...
Data Centre World 2026
Andy, Data & AI Director at Pax8, explores what the agentic inflection point means in practice and how AI is moving beyond experimentation into real-world application. He breaks down the 'empty box' approach...

News

N-able enhances its Technology Alliance Program with Zensec's incident response and Atomatik's hyperautomation capabilities.
Lenovo introduces advancements to Lenovo 360, aiming to enhance predictability and growth for partners.
ACI Worldwide marks a decade in Limerick, reflecting its ongoing role in Europe’s digital payments infrastructure.
F5 and Forcepoint have formed an alliance to enhance AI security by combining data intelligence with runtime protection.