NEWS
Why AI is now table-stakes in cybersecurity

By Dr. Sven Krasser, Senior Vice President and Chief Scientist, CrowdStrike.

Read More
NEWS
Securing a path to the cloud for your business

By Stuart Green, Cloud Security Architect at Check Point Software Technologies.

Read More
NEWS
The future of cybersecurity: Edge, Cloud or both?

The cloud is the backbone of digital cybersecurity. By Walter Heck, CTO HeleCloud

Read More
NEWS
Extending data beyond the walls of your company

By Damien Brophy, Vice President EMEA at ThoughtSpot.

Read More
NEWS
Meet The Three Amigos of Data: Governance, Privacy and Security

By Michael Queenan, co-founder and CEO of Nephos Technologies.

Read More
NEWS
7 steps to achieving cloud security success

By Jim Fulton, Senior Director of SASE and Zero Trust.

Read More
NEWS
Demystifying the security industry’s latest term: XDR

By Tawnya Lancaster, Lead Product Marketing Manager, AT&T Cybersecurity.

Read More

Videos

In this discussion, David Primor, CEO of Cynomi, and Dennis Boone, President of SlashBlue, explore why third-party risk management is rapidly becoming essential for MSPs and MSSPs. They share real-world...
Drew Gravitt is Senior Director of Distributed Generation & Microgrid Sales at Mission Critical Group (MCG) explains how the demand for data centres is surging due to AI and digital services and how this is...
Mostyn Thomas, Senior Director of Security EMEA at Pax8, breaks down how ransomware is evolving, what the new Cyber Essentials standards mean in practice, why attackers are increasingly targeting supply...

News

PRD Technologies has partnered with GoCardless to support automated payment solutions for telecoms and MSPs, aiming to reduce billing-related issues and improve operational processes.
The new CIS Companion Guides provide security guidance for emerging AI environments, including LLMs and MCP integrations.
Cisco has announced its Sovereign Critical Infrastructure portfolio targeting organisations in Europe, the Middle East, and Africa.
ProxySmart provides a technical clarification of its mobile proxy architecture, outlining system design, functional boundaries, and the distinction between data-path proxy routing and messaging or...