NEWS
AI's role in the evolving shared services sector

AI is increasingly being integrated into shared services, with organisations exploring its potential to support automation, improve processes, and contribute to strategic outcomes beyond efficiency.

Read More
NEWS
F5 launches AI security leaderboards for model risk assessment

F5 Labs introduces advanced threat intelligence resources, aiming to help enterprises assess AI security risks and evaluate AI models’ resilience.

Read More
NEWS
ServiceNow launches autonomous workforce and EmployeeWorks solutions

ServiceNow introduces AI innovations, Autonomous Workforce and EmployeeWorks, aiming to enhance enterprise productivity and governance.

Read More
NEWS
Navigating the silent accelerator: shifting enterprise IT risk

As automation expands, businesses face unforeseen internal risks within their IT landscapes, threatening digital transformation and operational resilience.

Read More
NEWS
Forescout and Netskop: enhancing zero trust security for modern enterprises

Forescout and Netskope partner to provide integrated Zero Trust security solutions, focusing on...

Read More
NEWS
2026 OSSRA report: evaluating the risks in AI-powered open source development

The latest OSSRA report reveals rising challenges in AI-driven open source development,...

Read More
NEWS
Alteryx One: scaling AI and automation for enterprises

Alteryx One aims to enable enterprises to scale AI and automation by providing governed, repeatable...

Read More
NEWS
Rethinking AI adoption: key strategies for telecoms

A new WBBA report highlights the untapped potential of AI in telecoms beyond internal efficiency,...

Read More
NEWS
The battle against identity-related cyber threats in 2026

Sophos’ latest report highlights the rise of identity-related cyberattacks, emphasising the need...

Read More
NEWS
Hyland announces updates to advance enterprise automation

Hyland has expanded its enterprise content management (ECM) portfolio with new updates aimed at...

Read More
NEWS
AI adoption: balancing innovation and governance in the UK

Logicalis' annual report highlights the ascent of AI in organisations, underlining the need for...

Read More
NEWS
Hitachi collaborates with SIT for hybrid power distribution testbed in Singapore

Hitachi partners with SIT to co-develop a Hybrid AC/DC Rack-Level Power Distribution Testbed, aimed...

Read More
NEWS
The growing divide: security struggles to keep up with software development

Veracode's latest report highlights the widening gap between rapid software development and slower...

Read More
NEWS
Agent Commander: Veeam's solution for AI security challenges

Veeam has launched Agent Commander, a solution designed to combine data resilience with AI...

Read More
NEWS
AI arms race: accelerated threat dynamics in 2026

The unveiling of CrowdStrike's 2026 Global Threat Report highlights a surge in AI-enabled threats,...

Read More

Videos

In this interview, Gal Yosef, Director of Solution Engineering at AlgoSec, discusses how AI is reshaping both cyber threats and defences, and why visibility, policy enforcement and operational discipline are...
Jason Feist, Seagate SVP, Go-to-Market, discusses Seagate Technology’s next-generation Mozaic™ 4+ platform, said to be the industry’s only heat-assisted magnetic recording (HAMR)–based storage platform...
Nancy Hammervik, Chief Channel Officer at GTIA, shares insights from 40 years in the tech channel. She explains how community, mentorship, and a “member-first” mindset drive real impact in the industry....
In this interview, Aaron Watts, Chief Channel Officer at usecure, explains why people, not just technology, are now the primary target for cyberattacks. He explores how MSPs can balance automation with...

Expert Opinions

By Graham Jarvis, Freelance Business and Technology Journalist
By Sujatha S Iyer, Head of AI Security at Zoho Corp.
By Matt Roberts, VP of Sales, OptiCool Technologies.
Even in 2026, insecure code often stems from time pressure and simple mistakes rather than intent. This guide outlines five common software security pitfalls, how to identify them, and how to fix them before...