NEWS
Securing cities in the cyber age

It now seems kind of quaint that cybercriminals go after computers. The kind of threats we now expect to have, have a much larger appetite. By Mike Nelson, VP of IoT Security, DigiCert.

Read More
NEWS
Four questions organisations need to ask after a cyber attack

Cyber attacks are inevitable, but it’s how an organisation deals with them that can make or break their business. Have they got all the answers, and do they fully understand the implications? Can they be sure the attack won’t happen again? Swift and comprehensive incident response is a...

Read More
NEWS
Why 5G will require next-generation security to combat real-time cyber threats

Rest assured, 5G is coming and it promises to be faster with less latency and better support for applications such as IoT than any of its predecessors. It will be strikingly faster than 4G, and this will be particularly obvious when downloading or streaming media. On average, 4G has a maximum...

Read More
NEWS
De-bunking the myths of AI cyber security

Artificial Intelligence is widely perceived as ‘the next big thing’ in cyber security. But with many providers attempting to jump on board and jostle to use the latest industry buzzword, services are being incorrectly marketed as ‘AI-based’, leading to much confusion. By Neil Kell,...

Read More
NEWS
Empowering developers through security

Businesses have been scrambling to leverage the power of the Internet of Things (IoT) for years....

Read More
NEWS
Keeping Data Safe in the Cloud – the Essential Checklist

Earlier this year a US software engineer hacked into a server holding the personal information of...

Read More
NEWS
Why cybersecurity must be viewed as more than an IT issue

The right security approach is vital to a successful digital transformation. By Stan Lowe, global...

Read More
NEWS
Enhancing enterprise security and improving performance through software code analysis

Enterprises across the globe write and re-write billions upon billions of lines of software code in...

Read More
NEWS
How Cognitive Bias Leads to Reasoning Errors in Cybersecurity

Forcepoint’s Dr Margaret Cunningham shares insight on how human bias can impact decision making...

Read More
NEWS
Cyber risk management – bringing security intelligence to the Board

Data breaches are costly. According to a recent Ponemon Institute study, the average breach costs...

Read More
NEWS
GDPR Compliance – Best Practice Security

When the General Data Protection Regulation (GDPR) came into effect in May 2018, businesses from...

Read More
NEWS
GDPR – one year on

How has GDPR changed the security and compliance landscape? Over the following pages, you’ll find...

Read More

Videos

Aleksandar Grbić, Global Data Center Solutions Manager, Hitachi Energy, discusses how the electricity grid must evolve to handle soaring demand from AI data centres. Grid integration and grid resilience have...
Oliver Simonnet, Lead Cybersecurity Researcher at CultureAI, discusses the findings of the company’s The State of Enterprise AI Usage: The Illusion of Control report, which reveals a growing gap between how...
In this interview, Francisco Ordillano, Founder (DE) & Founding Partner (UK) at CyberPlus, discusses why secure remote access has become a critical control point for modern organisations. He explores how...
Daniel Reeves, CEO of The Computer Clinic Bicester, shares how the business has evolved from its roots into a modern IT services provider supporting both consumers and organisations. He discusses shifting...

News

Fear of vendor lock-in is a top factor for moving to open source, up 68% this year compared to last year’s report.
CRN UK, a brand of The Channel Company, has included Johnny Carpenter, VP of Channels and Alliances EMEA, in the 2026 CRN® Channel Leaders EMEA list.
New research highlights the financial impact of OT downtime in UK critical infrastructure, alongside ongoing challenges in incident remediation.
Proton has launched Proton Workspace, a suite of business productivity tools, alongside Proton Meet, a video conferencing service with end-to-end encryption.