NEWS
A cybersecurity Q and A with CrowdStrike

Zeki Turedi, Field CTO Europe, CrowdStrike

Read More
NEWS
Multicloud: Two truths and a lie

By Drew Firment, Chief Cloud Strategist at Pluralsight.

Read More
NEWS
IT Leaders: 3 Ways to Structure Successful AI Operating Models
  • Published in

By Anthony Mullen, VP Analyst at Gartner.

Read More
NEWS
Communicating to succeed: IT decision-makers need soft skills

By Eric Johnson, Chief Information Officer, Momentive.

Read More
NEWS
The under-appreciated value of Purple Teaming

By Max Corbridge, Senior Security Consultant, JUMPSEC.

Read More
NEWS
Earth Day 2023: Let’s Talk Sustainability

In 2023, sustainability is a topic on everyone’s mind. Temperatures are rising, the ice caps are...

Read More
NEWS
Strategic Value Driving Mainstream Adoption of Mixed Reality

By Yan Simard, Chief Executive Officer at Kognitiv Spark.

Read More

Videos

Omer Wilson, Chief Marketing Officer of the Start Campus, explains why Start Campus and EDP have signed a strategic partnership marking their shared intention to accelerate next-generation, renewable-powered...
Laura Allwood, now a fully qualified Project Manager at Arcadis, outlines her journey from Apprentice Project Manager to her current role - along the way obtaining a degree in Construction Management and...
Phil Cullerton, VP Services EMEA at Vertiv, explains why services will define the future of the data centre. The future of the data centre is not just about who builds fastest, it is about who operates best....

News

LevelBlue has partnered with SentinelOne to deliver AI-driven security solutions, aimed at enhancing detection and response capabilities.
Argos99, launched by Fenix24, is a SaaS platform designed to support cyber resiliency and operational readiness for enterprises.
The National Geographic Society is collaborating with AWS to digitise and centralise its media archives, enhancing preservation and storytelling capabilities.
The latest TCG specification aims to strengthen device security with post-quantum cryptography algorithms to defend against quantum attacks.