NEWS
One in five businesses have paid or would pay a ransom for their data
  • Posted on 23rd March 2022 in by Phil Alsop

Globally, IT leaders ranked malware, ransomware and phishing as the leading source of security attacks.

Read More
NEWS
Ransomware attacks rise increased by 52.89%
  • Posted on 23rd March 2022 in by Phil Alsop

Ransomware attacks increased by 52.89% compared to January, with the number of incidents rising from 121 in January to 185 in February.

Read More
NEWS
Only a third of CIOs cite cyber-risk mitigation as a performance measure
  • Posted on 21st March 2022 in by Phil Alsop

While 94% of CIOs acknowledge some form of serious threat over the next 12 months, only 27% list business continuity and resilience as a top-three priority during the next 12 months and barely a third cite risk mitigation as a measure of performance. These findings come from the fourth and...

Read More
NEWS
Technology Channel puts productivity and customer-centricity first
  • Posted on 21st March 2022 in by Phil Alsop

Agilitas Launches ‘CONNECT for Enhanced Experiences’ Report.

Read More
NEWS
Watch out for web-based attacks!

Menlo Security report reveals less than three in 10 organisations are equipped to combat the...

Read More
NEWS
Cloudflare and CrowdStrike expand partnership

Two leading cybersecurity companies join forces to make it easier than ever for businesses to...

Read More
NEWS
Security experts face record cyber threats

Organisations seek new ways to protect their expanding attack surface, maintain stability.

Read More
NEWS
Bot myths and fallacies leave two-thirds of businesses at higher risk of malicious attacks

New report from Netacea uncovers the bot myths believed by businesses —leaving them vulnerable.

Read More
NEWS
MSPs fast becoming a primary target for cybercriminals

Attacks on MSPs and their customers have almost doubled in the last 18 months—while security...

Read More
NEWS
Combatting supply chain security threats

Threat modelling visualization, code repository scanning and pipeline configuration analysis help...

Read More
NEWS
Cloud security report highlights multi-cloud problems and skills shortages

Misconfiguration is the number one cause of cloud-security incidents in 2021.

Read More
NEWS
Fully-managed Identity Threat Protection, Powered by Falcon Complete

Expands Falcon Complete into one of the most critical areas of enterprise risk – identity.

Read More
NEWS
Patchy patch mamagement?

Edgescan has published the findings of its 2022 Vulnerability Statistics Report, which for the 7th...

Read More
NEWS
Automation advantages hindered by security fears

93% of UK IT Managers cite delegating tasks comes with a degree of risk.

Read More
NEWS
Wolves selects Arctic Wolf

Arctic Wolf has formed a new global cybersecurity partnership with Premier League football club...

Read More

Videos

James Netherwood, Head of Research Middle East, Capacity and Datacloud, discusses the upcoming Capacity Middle East event and the launch of Datacloud Middle East. The events unite over 3,500 executives from...
Steven Heinsius, Vice President of Product Management & Marketing EMEA, explains what sets the new Cisco 360 program apart for MSPs. He highlights how it enables outcome-driven managed services and shares...
Softcat’s Dean Gardner (Technology Director) and Adam Harding (Head of OCTO) unpack the findings of the organisation's latest Business Tech Report. From agentic AI and ransomware resilience to sustainability...
Erin McLean, CMO at Cynomi, explains how MSPs can use embedded CISO intelligence to manage enterprise-wide cybersecurity programs. She discusses translating technical controls into business outcomes, engaging...

Expert Opinions

The Opportunities & Engineering Challenges Of Quantum Computing Within A Data Centre Environment – Taking learnings from other industries By Matthew Martin, Managing Director, Quantum Design Oxford.
By Manvinder Singh, VP of Product Management for AI at Redis.