The iceberg of cyber security

Today’s top cyber trends, new threat actor techniques, motivations, and behaviours

Latest Stories
The impact of the Qilin Ransomware attack on the NHS
Security and Observability
The impact of the Qilin Ransomware attack on the NHS

Four lessons learned, and how to shore up

The iceberg of cyber security
Google Cloud Platform
The iceberg of cyber security

Today’s top cyber trends, new threat actor techniques, motivations, and behaviours

Fuel innovation with data and AI
Amazon Web Services
Fuel innovation with data and AI

Make more informed decisions, improve operations, and differentiate with GenAI

Elastic AI for NHS patient care
Security and Observability
Elastic AI for NHS patient care

Improved patient care, clinical trial recruitment, service planning, and clinical research

Ready to harness the power of AI?
AI and Copilot
Ready to harness the power of AI?

Key insights from Microsoft and LinkedIn to shape your approach

Using technology to be a climate innovator
Business Performance
Using technology to be a climate innovator

Three steps (and benefits) for making the transition

To build or to buy, that is the question
Cloud Security
To build or to buy, that is the question

What does it cost to run an in-house Security Operations Centre (SOC)?

Enhance employee experience with the right devices
Remote Working
Enhance employee experience with the right devices

Five practices to bridge the physical and digital divide

All data is good data, right?
Business Performance
All data is good data, right?

How good, complete data can help you better protect your organisation

Recap on the AWS Summit 2024
Amazon Web Services
Recap on the AWS Summit 2024

Stay at the forefront of cloud innovation and enrich your knowledge

AI and Information Management Report 2024
AI and Copilot
AI and Information Management Report 2024

Discover the data problem that's stalling AI success

Outside-in cyber security
Network security
Outside-in cyber security

The odds that any given organisation will be targeted are skyrocketing

LLM safety assessment
Security and Observability
LLM safety assessment

The definitive guide on avoiding risk and abuses

6 advantages of AI-driven security
Security and Observability
6 advantages of AI-driven security

Out with legacy SIEM, in with limitless visibility and advanced analytics

The job of a good cloud backup solution
AI and Copilot
The job of a good cloud backup solution

It may not be the obvious.

The steps to secure AI adoption
AI and Copilot
The steps to secure AI adoption

Set your organisation up for Copilot for M365 success

Google NEXT recap session
Google Cloud Platform
Google NEXT recap session

Catch all the key announcements and insights from the recent conference.

AWS Security Foundations For Dummies
Seamless security
AWS Security Foundations For Dummies

Everything you need to know to protect your AWS environment.

AI and your customer experience
AI and Copilot
AI and your customer experience

How to deliver fast, accurate answers to customers and handle cases more efficiently.

The importance of building a healthy workplace culture
Collaboration Tools and Remote Workplace
The importance of building a healthy workplace culture

Join Zoom's Work Transformation Summit EMEA to find out

The top 30 gotchas of M365
Collaboration Tools and Remote Workplace
The top 30 gotchas of M365

What do you really need to know to optimise or implement it?

Get intelligent apps to market faster
Business Performance
Get intelligent apps to market faster

Discover the business value and ROI of cloud-native app development.

How passwords can be vulnerabilities
Password Protection - LastPass
How passwords can be vulnerabilities

Clamp down on password reuse, weak passwords and other questionable behaviors.

InTheCloud Podcast Episode 4
SIEM
InTheCloud Podcast Episode 4

LogRhythm Axon's Joanne Wong outlines promises made means promises kept

Our Cloud Community provides a hub of ‘free to air’ information - unbiased opinions, issue related content, plus comments from experts and peers for you to enrich your knowledge of cloud environments and topics. If you’re looking for something specific, we’ll also show you who can help.

Some, but not all, of our featured content is sponsored (we need to eat!), but we’ll make it clear when it is and we’ll always maintain editorial control.

We hope you like our community and want to be part of what we are trying to achieve – a flow of information without any pressure to engage and the ability to choose the frequency and type of content you receive. If you want to have your say, we have an editorial team who will be happy to review opinion based content and publish to the community.

It’s still not perfect, we’re still evolving and welcome your feedback, but hope you’ll stay for the ride!

Our Promise is
  • To make you aware of commercially and technologically disruptive technologies for you to form your own view
  • To bring you the latest innovations from established players, market leaders and niche technologies
  • To offer a selection of the hot topics from the technology week
  • To give you a platform to voice and share your views with peers
  • To allow you to choose your preferences – how often you wish to be contacted by us and how.
  • To be transparent.  Make it clear when our content is informative and when one of our sponsors is promoting a topic
  • We won’t employ sales teams
  • We won’t charge a subscription fee. Ever.

Sam Redwood, Community Editor

Our Community
Our Community
Our Community

Learn about our community, what you’ll find, how we’ll help and our promise to you.

Read More
Choose what you want to see

Let us know what you’re interested in and the issues that matter to you.

Sign Up
Have you seen...
Modern Cloud Platforms

Increase business agility to reduce cost, risk and resource demands while delivering stronger revenue, support, reliability and operational efficiency.

Learn More
Connected Workplace

Empower teams to work together more effectively and securely while removing geographic limitations.

Learn More
Seamless Security

Safeguard sensitive data, ensure business continuity, achieve legal and regulatory compliance and protect critical business systems with cloud security applications.

Learn More
Business Performance

Streamline business processes, improve organisational workflows and efficiencies. Drive project deliverables.

Learn More