Gated Content Introducing our new Group CTO Meet our new Group CTO, Richard Conway! In this video, Richard shares his vision for the future, insights on leadership, and his plans to drive innovation across Acora and our customer base. Join our Insights platform today to watch the... Watch now
Gated Content CIO Report 2023 As CIOs and IT and Security leaders’ roles rapidly become more diverse, evidence from our report expressed that cutting through the noise is a shared challenge for many professionals in the IT and Cyber space. Continuing to build on the priorities and shared challenges of the UK mid-market, explore our yearly report below. Read now
Data & AI Rethinking IT Strategy In The Age Of GenAI Reframing IT Strategy With AI With the acceleration of Generative AI (GenAI) capabilities and raising customer expectations to a new high, businesses are required to reshape their IT strategies and operational frameworks like never before. This change isn’t just a... Read now
Data & AI How to Use Data Platform Services for Growth Leveraging information and turning it into actionable insights is essential for achieving business milestones quickly, enhancing competitiveness, and boosting growth. However, according to VMware research, 70% of businesses continue to struggle to harness the value of their data. Issues such... Explore Resource
CIO Report 2021 Building on the success of 2020’s inaugural survey and Covid-19 naturally shaping both our survey questions and the results, we’ve attempted to look beyond the pandemic at the longer-term changes that will affect the CIO role in the future. Read now
CIO Report 2022 Building on the success of the 2021 survey, we reached out to CIOs and other IT leaders in organisations across the UK to get a sense of the challenges they’re facing such as hybrid working, and how they see things developing over the coming months. Read now
Cyber Security Building Layered Security & Proactive Threat Detection Build Layered Security & Proactively Manage Threat Detection Cyber threats can be categorised into opportunistic, material, and targeted attacks, each requiring different levels of preparedness. Opportunistic Attacks Random, large-scale attacks such as phishing emails that aim to exploit vulnerabilities without... Read now
Cyber Security The Rockstar Breach Wasn’t an Outlier: It Was a Warning Shot Attackers are changing their economics, and for some time now, predictions have been circulating that supply chains would become the dominant attack model for cyber criminals. What we’re seeing now is those predictions materialising, and quickly. The Rockstar Games breach didn’t just make headlines... Read now