NEWS
Why identity, not perimeter, is the new battleground for UK Cybersecurity

By James Gillies, Head of Cyber Security at Logicalis UK&I.

Read More
NEWS
Why AI Agents stumble at the starting line and how to get them on their feet

By Kirsty Biddiscombe, EMEA Business Lead AI, ML & Data Analytics, NetApp.

Read More
NEWS
How enterprises can deploy agentic AI workforces without data limitations

By Justin Borgman, CEO Starburst.

Read More
NEWS
Enterprise AI success in 2026 hinges on a problem you probably haven't named yet

By Vijay Narayan, EVP and Americas MLEU Business Unit Head at Cognizant.

Read More
NEWS
THE CHALLENGES OF LONG-TERM DATA STORAGE AND THE TECHNOLOGIES THAT CAN ENABLE IT

By Federica Monsone, CEO and founder, A3 Communications - the data storage industry PR agency.

Read More
NEWS
Preparing Cryptography for the Quantum Era: Why Waiting Is the Biggest Risk

By Michael Fasulo, Senior Director of Portfolio Marketing, Commvault.

Read More
NEWS
The Complexity Tax of Cloud Transformation

By Richard Harbridge, Microsoft MVP and Technology & Ecosystem Strategist at ShareGate.

Read More

Videos

Edgar Van Essen, Managing Director, CCO and Partner for Switch Datacenters, outlines a dramatic decline in water use, new cooperative stakeholder models including green residual heat exchange networks, and a...
Data Centre World Frankfurt 2026
Nirav Shah, Founder & Director of Technical Excellence at Infrassist, explains that 24x7 IT monitoring and defence is essential for SMBs as an often distributed workforce needs protection around the clock, not...

News

As internet usage evolves, ISPs are exploring eSIM technology as a way to diversify services and respond to changing mobile connectivity demands.
New solution brings visibility, governance, and real-time protection to the rapidly expanding universe of non-human identities.
New global research shows strong investment intent, yet weaknesses in day‑to‑day security and growing AI and third‑party risk are leaving many businesses exposed.
Sophos' latest report highlights the escalating identity security challenges, with high breach rates and costly recoveries.