NEWS
Cyber risk management – bringing security intelligence to the Board

Data breaches are costly. According to a recent Ponemon Institute study, the average breach costs an organisation $3.86 million. A separate study found that, although the share price of breach-affected companies shows its sharpest drop 14 days after the breach is made public, there is still a...

Read More
NEWS
Apps: the gateway to your private data

Cybercrime is no longer monopolised by elite criminals and no longer consigned to the dark web alone. Recent investigations indicate that hackers have become much braver and are now operating in the open, using popular apps to conduct illegal dealings. Criminals are now using consumer applications...

Read More
NEWS
The state of IT security

The IT security landscape has changed over the last few years. Historically organisations focused their efforts largely around protecting against cyber attacks, focusing on how they could prevent a data breach, protect their data and systems. A large part of this approach centred on perimeter...

Read More
NEWS
The Insider Threat: Why Employee Engagement is a Critical Element of Cybersecurity

Beth Hood is a former advisor to the government on protective security. She now runs Verosa – a leadership development consultancy specialising in employee engagement.

Read More
NEWS
Why CDPs have the edge over DMPs when it comes to ROI

When budgets shrink, spending scrutiny grows — every penny is expected to fuel the highest...

Read More
NEWS
Where does the responsibility for cloud breaches lie?

The Cloud Security Alliance (CSA) has released a survey which discusses who should be taking...

Read More
NEWS
IT weaknesses - the barrier to enterprises becoming security-first

Enterprises are increasingly recognising the benefits of embracing a cloud infrastructure to...

Read More
NEWS
From preparation to implementation: How to fully adopt automation in 2019

The last 12 months have seen a shift in how enterprises view automation and its benefits to their...

Read More
NEWS
Where does responsibility for cloud breaches lie?

The Cloud Security Alliance (CSA) has released a survey which discusses who should be taking...

Read More
NEWS
It’s time for our notion of the endpoint to change

It’s no secret that IT has evolved and, as a result, so has our approach to cybersecurity. For...

Read More
NEWS
How cloud and mobility are disrupting 30 years of network and security history

The internet is disrupting industries and business models, fundamentally changing the way we live...

Read More
NEWS
What’s the key to secure digital transformation?

Marc Vanmaele, CEO of TrustBuilder explains how banks and financial organisations can best balance...

Read More

Videos

Will Morey, Managing Director at Gamma, explains why PSTN migration is a scale problem for MSPs, not a technical one. He shows how structured journeys, partner support, and integrated platforms turn forced...
Erin McLean, CMO at Cynomi, explains how MSPs can use embedded CISO intelligence to manage enterprise-wide cybersecurity programs. She discusses translating technical controls into business outcomes, engaging...
Lenaik Andrieux, General Manager – Power Systems EMEA, India & Australia, Rehlko, explains how the acquisition of The Wilmott Group, a UK-based supplier of critical backup-power solutions, makes Rehlko one...
Softcat’s Dean Gardner (Technology Director) and Adam Harding (Head of OCTO) unpack the findings of the organisation's latest Business Tech Report. From agentic AI and ransomware resilience to sustainability...

News

Westcon-Comstor has signed a distribution agreement with Meter to make its networking-as-a-service platform available to partners across EMEA.
FireMon’s latest integration with Illumio merges microsegmentation and firewall policies, promoting Zero Trust implementation across hybrid environments.
ScienceLogic introduces Skylar Advisor, an AI-native tool providing proactive, evidence-backed guidance for IT operations.
Infosecurity Europe 2026 will introduce a Cyber Startup Programme, bringing early-stage cybersecurity companies to the event from 2–4 June at ExCeL London.