NEWS
Why AI is now table-stakes in cybersecurity

By Dr. Sven Krasser, Senior Vice President and Chief Scientist, CrowdStrike.

Read More
NEWS
Securing a path to the cloud for your business

By Stuart Green, Cloud Security Architect at Check Point Software Technologies.

Read More
NEWS
The future of cybersecurity: Edge, Cloud or both?

The cloud is the backbone of digital cybersecurity. By Walter Heck, CTO HeleCloud

Read More
NEWS
Extending data beyond the walls of your company

By Damien Brophy, Vice President EMEA at ThoughtSpot.

Read More
NEWS
Meet The Three Amigos of Data: Governance, Privacy and Security

By Michael Queenan, co-founder and CEO of Nephos Technologies.

Read More
NEWS
7 steps to achieving cloud security success

By Jim Fulton, Senior Director of SASE and Zero Trust.

Read More
NEWS
Demystifying the security industry’s latest term: XDR

By Tawnya Lancaster, Lead Product Marketing Manager, AT&T Cybersecurity.

Read More

Videos

James Netherwood, Head of Research Middle East, Capacity and Datacloud, discusses the upcoming Capacity Middle East event and the launch of Datacloud Middle East. The events unite over 3,500 executives from...
DCW Asia 2025 - Part 2 of 3
In this interview, Dave Baggett, SVP/GM Security Suite at Kaseya, discusses how MSPs can tackle rising complexity, manage vendor sprawl, and stay ahead of high-impact incidents. We explore Kaseya’s unified...
Michael Downs, VP, global sales at SecurEnvoy, discusses the importance of Multi-Factor Authentication (MFA) as a crucial part of any effective cybersecurity strategy.

News

TELUS and RingCentral integrate AI features into Business Connect to support business communications and customer interactions.
A recent survey uncovers the high stress levels experienced by UK IT and cyber professionals, highlighting the fear of job loss following a breach.
Leadership update: Mark Powell promoted to Managing Director at Weatherite Air Conditioning Limited.
With AI adoption accelerating, cloud security faces unprecedented challenges. This article explores some of the key factors complicating contemporary cybersecurity strategies.