The $18bn video conferencing market is just beginning. Who will win the war for the meeting rooms of the future?

The global video conferencing market, growing by 5% a year despite economic uncertainty, is proving its strength. However,…

Second-hand ransomware. How copying code lowers the barrier to entry to cybercrime

If cybercrime had its own GitHub, Nitrogen ransomware and LukaLocker would be its popular forks. An increasing number…

ReVault: Five serious security vulnerabilities in over 100 Dell laptop models

Cisco Talos has disclosed five serious vulnerabilities in the Dell ControlVault3 firmware and associated Windows APIs. Collectively named…

AI is building a new startup elite. Eight leaders worth more than $500bn

The ecosystem of technology startups is undergoing a fundamental transformation. The new determinant of value is no longer…

AI in cyber security, or how to save $1.76m and reduce attack response by 108 days

Every IT leader and security director knows this scenario all too well: the endless stream of security alerts,…

The end of ‘nice bosses’. Why your team needs honesty, not empty empathy

In the tech industry, where the battle for talent is a daily reality and remote and hybrid working…

Technological arms race – who is using and who is fighting deepfake?

The rise of deepfake fraud is accelerating, forcing companies into a technological arms race. As artificial intelligence becomes…

Post Quantum Cryptography: Business implications of algorithm choice

Today's digital economy rests on an invisible but fundamental pillar: public key cryptography. Algorithms such as RSA and…

AI in coding – the end of the honeymoon and pragmatic reality

Artificial intelligence is increasingly making its way boldly into developers' workbenches, but initial enthusiasm is giving way to…

The 40 professions most likely to be affected by generative AI. Translators, teachers, analysts – who’s next?

A new report by researchers from Microsoft Research and OpenAI analyses the real-world impact of generative AI on…

IT’s hidden enemy. How is automation overcoming technology debt?

IT departments find themselves in the eye of the cyclone. Growing macroeconomic pressures, the explosion of remote and…

OT cyber security at the target of ransomware. How one mistake leads to production paralysis

The convergence of information technology (IT) and operational technology (OT) is accelerating, but its implementation is still fraught…

3 forces that have changed the role of the CIO forever

Over the past ten years, the role of the CIO has undergone a fundamental transformation. From being the…

AI as a hacker? Researchers have investigated its capabilities and the results are worrying

Large language models can no longer just write lines and code, but can autonomously plan and execute complex…

Data intelligence engines – how Data Fabric, Hyperautomation and MLOps are turning theory into practice

For years, data intelligence remained an ambitious concept, hampered by data chaos and the difficulty of implementing analytics…

More than Zoom. The video conferencing market is growing by 10% a year. Who is making money from it?

Video conferencing, once a niche tool for global corporations, has become a cornerstone of business communication over the…

$30 billion in 3 months. Microsoft goes all out in the fight for AI

Microsoft has signalled that it is prepared to spend unprecedented amounts to dominate the era of artificial intelligence.…

A hidden feature in Nvidia chips? China speaks of ‘back doors’ and demands explanations

China's cybersecurity regulator (CAC) has summoned Nvidia for talks on the H20 chip, raising concerns about its security.…

Meta is earning crores from AI. There’s just one problem, and it’s costing billions

Meta Platforms is impressing with its financial performance, with revenue forecasts for the third quarter well ahead of…

An investment that pays off – implementing Zero Trust architecture

Traditional security models are no longer effective. The 'castle and moat' concept - assuming that everything inside the…

A valuable employee is a critical employee. Why do managers ignore him?

Companies declare that they value employees who challenge the status quo. However, new research shows that managers, acting…