NEWS

Machine identities outnumber humans 40,000 to 1

Cloud defenders are gaining ground as the cloud landscape comes into focus, with 92% of organizations operating without risky human users.

Read More

NEWS

Generative and agentic AI set to transform customer service

With less than half of consumers happy with the service they receive and only 16% of agents satisfied with their roles, AI-led transformation can unlock significant commercial potential; but customers still want a ‘human factor’.

Read More

BLOG

Unstructured Data Storage Considerations for AI Innovation

By Stewart Hunwick, Field CTO for the Storage Platforms and Solutions Team, Dell Technologies.

Read More

NEWS

Channel partners eye cloud growth but must upskill to seize opportunities

Survey of nearly 900 Westcon-Comstor partners across eight countries reveals a desire to develop cloud capabilities amid strong customer demand.

Read More

BLOG

How can businesses avoid cybersecurity blind spots in 2025?

By Dr Yvonne Bernard, Hornetsecurity’s CTO.

Read More


Latest Video

Hybrid working 2.0 is here – don’t panic!

Neil Patel, Director, European Marketing & Business Development, and Alan Jones, Consumer Solutions & Marketing Manager, UK&I, both at D-Link Europe Ltd, discuss the practicalities of hybrid working, with particular reference to ways in which the home office can be upgraded to ensure an optimised, secure IT environment which, in turn, will lead to an optimised employee experience.

Read more
TechMarketView advises businesses to consider CSTOs to ensure the seamless integration of...
71% of “novices” perceive the threat of security incidents to be growing over time, compared...
Riverbed Global AI & Digital Experience Survey explores attitudes toward AI, the implementation...
OpenText has released the findings of its annual OpenText Cybersecurity Global Managed Security...
70 percent of companies in the UK have fallen victim to a cyberattack at least once in the past two...
More organisations should consider “true” immutability as part of their cybersecurity strategy.