Dora Compliance Checklist Prepare for DORA compliance! The enforcement date for DORA regulation is fast approaching – January 17, 2025. Financial institutions across the EU must be prepared for the upcoming changes, using tools like a DORA compliance checklist, as the act seeks to improve the digital resilience of financial entities against cyber threats. Read now
Cyber Security Threat Insight & The Evolving CISO Role Following on from our CISO Predictions released in December, our Director of Cyber Security Sales, James Fernley, shares what is on his mind ahead of 2025. From Insider Threats, to the prevalence of Ransomware, to the evolving role of a... Watch now
Data & AI Rethinking IT Strategy In The Age Of GenAI Reframing IT Strategy With AI With the acceleration of Generative AI (GenAI) capabilities and raising customer expectations to a new high, businesses are required to reshape their IT strategies and operational frameworks like never before. This change isn’t just a... Read now
Data & AI How to Use Data Platform Services for Growth Leveraging information and turning it into actionable insights is essential for achieving business milestones quickly, enhancing competitiveness, and boosting growth. However, according to VMware research, 70% of businesses continue to struggle to harness the value of their data. Issues such... Explore Resource
Cyber Security How AI tools are Changing the Nature of Cyber Attacks AI’s Role in Modern Cyber Attacks Artificial intelligence (AI) cyber attacks are the top concern for 80% of Chief Information Security Officers (CISOs) polled by BCG in 2025. Cyber criminals use AI to orchestrate increasingly sophisticated and targeted attacks, making... Read now
Gated Content Our Group CTO’s 2025 AI Predictions Could Your AI Model Be Your Biggest Security Risk? Our Group CTO Richard Conway shares his own AI predictions for the year ahead. As businesses rapidly understand how they can adopt AI, the risk of intellectual property theft is skyrocketing.... Watch now
Gated Content Successful IT & Cyber Projects Guide Cyber Security and IT projects often fail due to unclear objectives, unrealistic schedules, inadequate resources, poor project management, and stakeholder disengagement. With 75% of business and IT executives thinking their software projects will fail, we dissect why so many projects are at risk of failing and how to overcome these alarmingly high stats. Read now
Gated Content Keeping up with endpoint threats Ever-growing cyber threats are a concern for everyone. But for IT leaders, the pressure has been ramped up to a new level. Tackling this can feel overwhelming, but it doesn’t need to be. Let’s go back to basics and start with endpoint protection. Read now