NEWS
How the evolution of tokenization can be utilised to better protect data

Traditionally, methods of data protection have focused on locking up their sensitive information away until it was deprotected to be used. While this may work for data that serves no current purpose, simply locking away the data greatly reduces its value, especially if the risks of loss of business...

Read More
NEWS
Securing the cloud: how to address new security risks and future-proof operations post-COVID-19

How can organisations overcome today’s cyber security challenges to protect systems and data within and across multiple cloud environments – and underpin new ways of working since COVID-19? By Phil Aitchison, Chief Operating Officer, Big Data & Security UK&I at Atos.

Read More
NEWS
Are increasing data breaches leaving consumers desensitised?

Cyberattacks are on the rise, with novel cybersecurity risks emerging as companies are currently forced to do business in unprecedented ways. By Stefanie Wood Ellis, AntiFraud Product & Marketing Director, OpSec Security.

Read More
NEWS
Cloud-based multi-factor authentication: the starting point for security, compliance and user experience

Banks and businesses are constantly under pressure to keep their data, customers, and employees secure. This has heightened in the last few months, as the global pandemic has seen cybercriminals ramp up activity. The number of phishing websites increasing by 350% since the start of the year, and...

Read More
NEWS
What to look for in a Next-Gen PAM solution

By Alan Radford, PAM Field Strategist, One Identity.

Read More
NEWS
Five factors that form how Security Awareness training programs are developing

By Elena Molchanova, Head of Security Awareness Marketing, Kaspersky.

Read More
NEWS
What’s next for cybersecurity?

A recent HP panel discussion sought to provide some answers to this question – topics covered...

Read More
NEWS
The attack that changed the world of cyber security for ever

You may be surprised to learn that one of the first computer viruses to bring millions of computers...

Read More
NEWS
Zero Trust Network Access (ZTNA) vs VPNs: The new era of securing your workforce during crisis

By Salvatore Sinno, Chief Security Architect and Director of Cybersecurity Innovation, Unisys.

Read More
NEWS
Trend EDR: Protecting endpoints proactively

How IT managers protect corporate networks from targeted attacks By Chris Connell, Deputy Vice...

Read More

Videos

In this interview, Eric Mink, VP of AI Adoption, shares how MSPs can turn AI curiosity into structured, billable services. He explores commercialisation strategies, vertical specialisation, and building...
In this conversation, ESET UK Country Manager, Matt Knell, discusses why MSPs must move beyond basic endpoint protection and adopt a layered, proactive security approach. He shares practical insights on MDR...
Erin McLean, CMO at Cynomi, explains how MSPs can use embedded CISO intelligence to manage enterprise-wide cybersecurity programs. She discusses translating technical controls into business outcomes, engaging...
Steven Heinsius, Vice President of Product Management & Marketing EMEA, explains what sets the new Cisco 360 program apart for MSPs. He highlights how it enables outcome-driven managed services and shares...

News

atNorth announces its eleventh Nordic data centre in Stockholm, featuring heat reuse and supporting local employment.
DigiCert's Q4 2025 RADAR Brief underscores the continuous pressure on internet infrastructure from growing cyber threats and escalating online activity.
Westcon-Comstor launches Tech Insights, a programme for channel partners to assess IT environments and identify potential risks.
NinjaOne roundtables highlighted how MSPs can leverage automation, AI, and security to simplify workflows and scale their business.