Logo
NEWS
Protecting mission-critical networks from next-generation threats
  • Published in

By Fernando Rionegro, Vice President, Cloud and Network Services, Europe at Nokia.

Read More
NEWS
WAN acceleration: when to romance your data
  • Published in

By Graham Jarvis, Freelance Lead Journalist - Business and Technology, Trudy Darwin Communications

Read More
NEWS
Big tech and data gatekeeping: why we need an open AI environment
  • Published in

By Giedrius Steimantas, Engineering Manager, Oxylabs

Read More
NEWS
The rise of AI-driven cyber threats: what mid-market businesses should know

By Adriaan Bekker, CISO & Microsoft Services Director, Softwerx.

Read More

Videos

Dan Evans, Associate Director at Lichfields, discusses the results of the company’s recent data centre study, which finds that, for developers, Scotland offers something few regions or countries can match -...
James Netherwood, Head of Research Middle East, Capacity and Datacloud, discusses the upcoming Capacity Middle East event and the launch of Datacloud Middle East. The events unite over 3,500 executives from...
Alex Walsh, Regional VP of Channel Sales, EMEA North at Keepit, discusses the company’s channel-first strategy, broad SaaS data protection, and how MSPs can differentiate amid consolidation and cyber risks,...
Work AI leader Glean has launched the Work AI Institute, a first-of-its-kind research initiative - supported by faculty from Stanford, Harvard, Berkeley, Notre Dame, and others - dedicated to decoding what...

News

11:11 Systems has announced its 2025 UK and Europe Partner Award recipients, recognising partners involved in application modernisation and data management projects.
Dynatrace announces upgrades designed to elevate AI-driven observability, with impacts on IT operations and customer success.
The UK insurer NFU Mutual will migrate its systems to the Guidewire Cloud Platform and adopt enhanced data management and digital tools.
With AI adoption accelerating, cloud security faces unprecedented challenges. This article explores some of the key factors complicating contemporary cybersecurity strategies.