Quantum Security: Inside the Race to Reinvent Encryption
Apple iPad Pro M5 Leads Apple’s Mighty M5-Powered Lineup
Passkeys Adoption: Password-Free Security Goes Mainstream
AI Phishing as a Service (PhaaS): When Crime Turns Corporate
AI Safety in Practice: Startups with Women at the Helm
Supply Chain Attacks 2.0: When Your Smart Devices Turn Rogue
Beyond the Stars: Women Engineers Who Are Making Space More Ethical

Sponsored Content

How Marketers Are Navigating Data Protection and Privacy: Insights from Hugh Dixon

Hugh Dixon on Marketing in the Age of Data Privacy

Responsible AI: People, Progress, and Principles: As AI continues to shape how we live, work, and connect, the need for thoughtful, inclusive, and ethical innovation has never been more urgent. This ongoing series explores how AI is being shaped—and reshaped—by individuals and organisations who believe innovation must go hand-in-hand with integrity. From tackling systemic bias…

,

Fellou AI Browser: Smarter Browsing with AI Agents

Fellou AI Browser

AI browsers are everywhere. Each new entry promises to change how we search, work, and browse. Fellou AI Browser is the latest to make that claim. But is Fellou truly different, or is it just another AI layer over Chrome or Edge? Fellou AI Browser was officially released on 11 May 2025 by Fellou Technologies,…

Zero Trust Security Meets AR in Surespan’s Remote Operations

Zero Trust Security

Zero Trust Security is no longer optional for organizations operating in high-risk, distributed environments. For Surespan, a UK-based access and safety solutions manufacturer, this became clear as its technicians increasingly relied on digital tools while working on rooftops, construction zones, and remote industrial sites worldwide. These environments demanded secure, real-time access to critical data and…

Apple Siri Settlement: Who Can Claim the $95 Million Payout?

Apple Siri Settlement

In one of the most high-profile privacy cases in recent years, Apple has agreed to a $95 million settlement to resolve allegations that Siri recorded users without their consent. The Apple Siri settlement stems from claims that the voice assistant “accidentally recorded” users, capturing private conversations and sharing them with third-party contractors. You may be…

Where Mobile Device Management Ends, Device Trust Begins

Mobile Device Management

In today’s mobile-first world, work doesn’t stop at the office door. People access company data from anywhere using phones, tablets, and laptops. To protect these devices, many organisations rely on Mobile Device Management (MDM). It’s the default security solution for managing mobile access. But while Mobile Device Management helps enforce policies and track devices, it…

ZTNA Reimagined: Samsung and Cisco’s Bold Play for BYOD Security

ZTNA Reimagined

Unmanaged Android phones, often the weakest link in BYOD environments, just got a security upgrade. Samsung and Cisco have teamed up to bring Zero Trust Network Access (ZTNA) to devices once considered ungovernable, marking a pivotal moment in mobile-first cybersecurity. As enterprises grapple with the risks of BYOD culture and remote access, Samsung and Cisco’s…

,

WWDC 2025: Visual Intelligence Turns Screen into Smart Spaces

WWDC 2025

Apple’s Worldwide Developers Conference (WWDC 2025) took place on 10 June, streamed live from Apple Park in Cupertino, California, and turned out to be less about flashy hardware and more about deliberate software refinement, powerful AI integrations, and a bold new design language. Held virtually and streamed globally, the keynote on 10 June drew developers,…

Circular Economy in IT: Smarter Hardware, Less Waste

Circular Economy in IT

Circular economy principles are transforming how enterprises build their IT infrastructure. In a sector long driven by fast cycles of buying and replacing, the shift towards modular hardware design and recycled materials in IT offers a path to true sustainability.  Today, many IT leaders are rethinking their strategies. They are moving away from linear models…

,

In Conversation: Tracie Crites on Making Tech Debt a Tactical Asset

Tracie Crites on Turning Tech Debt into a Strategic Advantage

Disaster Recovery in Real-Time: IT Crisis Management: The rise of IT crises can bring operations to a standstill in an instant, leaving companies scrambling to recover. Whether it’s mounting tech debt, a cyberattack, system failure, or natural disaster, the stakes are high and the margin for error is razor thin. The challenge is clear: how…

,

AI Carbon Footprint: Every Query Leaves a Mark on the Planet

AI Carbon Footprint

As artificial intelligence (AI) models grow ever more powerful, so does their hunger for energy. And that’s starting to raise an important question: how can we manage AI’s carbon footprint?  AI promises so much. It’s transforming healthcare, improving education, making transport smarter, and driving innovation in ways we couldn’t have imagined even a few years…