NEWS
Building an AI governance pathway

By Iain Bowes, Head of Management Systems Assurance for TÜV SÜD Business Assurance, a global provider of auditing and certification services that help organisations to gain in-depth insights of how corporate systems affect business performance.

Read More
NEWS
Your security stack might be your biggest vulnerability

By Michael Vallas, Global Technical Principal, Goldilock Secure.

Read More
NEWS
Iranian cyber threats, geopolitics, and the new cyber reality

By Robert Hannigan, Chairman of International Business at BlueVoyant.

Read More
NEWS
Why Digital Transformation Strategies Fail in Delivery - Not Design

By Arun Manoharan, Global Head of Strategy Enablement, UBDS Digital.

Read More
NEWS
Building cyber resilience through backup consolidation

By Scott Ashenden, Head of Security and Infrastructure at Team Matrix.

Read More

Videos

Data Centre World 2026
Ryan Parker, Phononic's President & COO, discusses the data centre thermal management challenge, the company’s GPU HBM cooling solution and introduces the idea of Thermal Fabric, a real-time thermal control...
Mostyn Thomas, Senior Director of Security EMEA at Pax8, breaks down how ransomware is evolving, what the new Cyber Essentials standards mean in practice, why attackers are increasingly targeting supply...
Pete Hughes, Founder and Managing Director of Zalara Tech, shares how building a business in the age of AI shapes growth and delivery, and why success depends on understanding that AI is never a...

News

ServiceNow’s planned acquisition of Armis aims to expand its market position and add capabilities in real-time cyber asset protection and risk management across sectors.
Equinix has launched Fabric Intelligence, an AI-enabled networking solution designed to improve automation, performance, and adaptability for enterprise infrastructure.
AtlasEdge announces the new LEV002 data centre in Leverkusen, enhancing its presence and capacity in Germany's Rhineland region.
ProxySmart provides a technical clarification of its mobile proxy architecture, outlining system design, functional boundaries, and the distinction between data-path proxy routing and messaging or...