BLOG

How to solve the IT Skills Gap in Enterprise Storage

By Eric Herzog, Chief Marketing Officer at Infinidat.

Read More

BLOG

People, Process and Technology: Three Pillars of Enterprise-wide IT Automation Adoption

By Richard Henshall, Director, Ansible product management at Red Hat.

Read More

NEWS

40% of mobile users are running a device with known vulnerabilities

Apple security leader analyzes 15 million endpoints to better understand the biggest security trends impacting the modern workplace.

Read More

BLOG

Will AI help the zero carbon agenda?

By Dan Llewellyn, Director of Technology at xDesign.

Read More

NEWS

Web application attacks intensify

Leading edge platform provider identifies new attack patterns and ways for organisations to best protect digital assets, in inaugural issue of quarterly threat report.

Read More

NEWS

Report uncovers 222% surge in email attacks during 2023

Biannual report reveals malware data gathered from July – December; highlights the rise of generative AI systems to create malware and orchestrate attacks.

Read More

Latest Video

Hybrid working 2.0 is here – don’t panic!

Neil Patel, Director, European Marketing & Business Development, and Alan Jones, Consumer Solutions & Marketing Manager, UK&I, both at D-Link Europe Ltd, discuss the practicalities of hybrid working, with particular reference to ways in which the home office can be upgraded to ensure an optimised, secure IT environment which, in turn, will lead to an optimised employee experience.

Read more
WalkMe celebrates Digital Adoption Platform (DAP) Professionals Day with new survey data.
Tricentis report reveals AI-augmented DevOps tools will save teams over an estimated 40 hours per...
On top of a lack of training, just 17% of organisations are providing AI policies for employees.
Cybereason has published the results of their third annual ransomware study, commissioned to better...
New research from Pluralsight reveals that despite accelerating AI adoption, the majority of...
Cloud and cross-domain attacks, credential and RMM tool abuse persists.