BLOG

Keeping Data Safe Beyond Cyber-Security Month

By Graham Jarvis, Freelance Business and Technology Journalist, Lead Journalist, Business and Technology, Trudy Darwin Communications.

Read More

BLOG

Data streaming in the spotlight

With Richard Jones, VP EMEA, Confluent.

Read More

NEWS

More than three-quarters of UK office workers don’t use AI

70% of UK decision-makers place strong trust in AI technologies, but the vast majority (83%) are unsure how AI can improve efficiency.

Read More

NEWS

Half of all employees are Shadow AI users

Software AG has found that half of all employees are using Shadow AI (i.e. non-company issued AI tools). This finding is according to a new study from Software AG on the AI habits of 6,000 knowledge workers.

Read More

BLOG

Optimising IT environments with unified networking

By Jonathan Wright, Director of Products and Operations at GCX.

Read More

NEWS

AI impersonation is now the hardest cyberattack vector to defend against

Advanced forms of social engineering are on the rise, though obvious gaps like weak passwords are becoming easier to plug.

Read More

Latest Video

Hybrid working 2.0 is here – don’t panic!

Neil Patel, Director, European Marketing & Business Development, and Alan Jones, Consumer Solutions & Marketing Manager, UK&I, both at D-Link Europe Ltd, discuss the practicalities of hybrid working, with particular reference to ways in which the home office can be upgraded to ensure an optimised, secure IT environment which, in turn, will lead to an optimised employee experience.

Read more
Despite significant concerns with the accuracy and security of AI, 70% of financial services...
Cloudera study underscores the rapid rise of AI adoption, while identifying the common use cases...
In an era of increased tech spending, especially in AI, experts emphasize the critical role of...
Dell’Oro Group forecasts coherent optical transceiver shipments to grow at a double-digit...
76% of the UK’s Industrial complex has become subject to monthly, weekly and even daily cyber...
ISACA research shows automating threat detection/response and endpoint security are the most...