Logo
NEWS
Protecting mission-critical networks from next-generation threats
  • Published in

By Fernando Rionegro, Vice President, Cloud and Network Services, Europe at Nokia.

Read More
NEWS
WAN acceleration: when to romance your data
  • Published in

By Graham Jarvis, Freelance Lead Journalist - Business and Technology, Trudy Darwin Communications

Read More
NEWS
Big tech and data gatekeeping: why we need an open AI environment
  • Published in

By Giedrius Steimantas, Engineering Manager, Oxylabs

Read More
NEWS
The rise of AI-driven cyber threats: what mid-market businesses should know

By Adriaan Bekker, CISO & Microsoft Services Director, Softwerx.

Read More

Videos

In this interview, Dave Baggett, SVP/GM Security Suite at Kaseya, discusses how MSPs can tackle rising complexity, manage vendor sprawl, and stay ahead of high-impact incidents. We explore Kaseya’s unified...
James Netherwood, Head of Research Middle East, Capacity and Datacloud, discusses the upcoming Capacity Middle East event and the launch of Datacloud Middle East. The events unite over 3,500 executives from...
Work AI leader Glean has launched the Work AI Institute, a first-of-its-kind research initiative - supported by faculty from Stanford, Harvard, Berkeley, Notre Dame, and others - dedicated to decoding what...
Joshua Clay, Senior Director Solutions Engineering at Dynatrace, discusses the findings of the company’s ‘The State of Observability Report 2025’, which reveals that while AI adoption is accelerating,...

News

Teradata introduces Enterprise AgentStack, an AI platform designed for efficient and secure deployment across hybrid environments.
Orion Entrance Control has launched Orion DataGuard, an AI-enabled security screening room aimed at supporting physical access control in modern data centres.
The UK insurer NFU Mutual will migrate its systems to the Guidewire Cloud Platform and adopt enhanced data management and digital tools.
With AI adoption accelerating, cloud security faces unprecedented challenges. This article explores some of the key factors complicating contemporary cybersecurity strategies.