AI in the Enterprise
2d ago

The Future of Procurement Lies in AI, Experts Say

Data Management
3d ago

Data Juice: Doug Laney Gives 101 Ways to Squeeze Value From Data in New Book

Business Continuity
3d ago

How to Avoid Inheriting a Data Breach During a Merger/Acquisition

Business Continuity
3d ago

Does Zero Trust Mean Defence in Depth is Dead?

Unified Communications
3d ago

Intermedia: Cloud Migration is the Key to Enterprise Communications

Business Continuity
4d ago

90% of Organisations Have Fallen Victim to Cyber Attacks in 2022

Industry Leaders

Dr Eric Cole

Founder and CEO of Secure Anchor Consulting
  • Red Sift & Entrust: BIMI and Email Security

  • Darktrace: The Importance of Email Implementation

  • Proofpoint Episode 1: 2020s Biggest and Boldest Insider Threats

Richard Stiennon

Chief Research Analyst at IT-Harvest
  • Bugcrowd: Using Crowdsourcing to Detect Critical Vulnerabilities

  • GitGuardian: Secrets in the Source Code Need Protection

  • Beyond Identity: CIAM and Hitting a Balance Between Security and Customer Friction

Susan Walsh

Founder and MD of The Classification Guru
  • Solidatus & HSBC: From Months to Minutes - The Benefits of Automated Data Sharing

  • Yellowfin: Transforming Business with Analytical Data

  • ActionIQ: How the Data-Driven Revolution is Impacting CX

Chris Steffen

Researching Director at EMA
  • Siemplify: Trends in Remote Security Operations

  • Menlo Security: Emerging Trends in Cloud Security

  • Digital Transformation and Attack Surface Management

Solution Providers