Latest Stories
[Watch now] Build your compliance-ready security stack
[Watch now] Build your compliance-ready security stack

From phishing threats to account breaches and audit failures, the risks are real – but so are the solutions.


A non-cheesy Christmas joke for you
A non-cheesy Christmas joke for you

Clue: You'll have to use your loaf. Right this way!

Think before you chat
Think before you chat

How AI tools could be leaking your company data.


Choose your path to Threat-Led Defence
Choose your path to Threat-Led Defence

Book your discovery call now.


The biggest challenges in cyber security
The biggest challenges in cyber security

The very tools meant to protect are now creating their own kind of risk.


Threat-Led Defence Video
Threat-Led Defence Video

When 'Good' looks THIS GOOD!


Culture change
Culture change

Is there a clear line between manipulation and influence, and should security leaders care?


What “Good Coverage” Actually Means
What “Good Coverage” Actually Means

(and why you probably don't have it yet).


Procedures: The missing link
Procedures: The missing link

Between techniques & reality


Have you also seen...
VIDEO: Staff aren't villains, but their use of AI opens the door

Rethinking insider threats in the age of AI.

VIDEO: What will it take to tackle AI-driven threats?

Improving your incident response in 2025.

Sleighing cybersecurity threats

How the North Pole is preparing for more AI mischief in 2026.

VIDEO: Is Compliance Enough?

Mind the Gap... Between Cybersecurity and Regulation

Wrap up of CyberSync 2025 and a look ahead to next year

8 sponsors | 4 expert speakers | 2 days, 250 security professionals | 2 evenings = 200+ channel partners

You're invited! Exclusive lunch in London with Elastic's CISO

Connect, discuss security trends, and gain insights that can help shape your approach to digital security.

VIDEO: Two sides of the same cyber breach

Unpatched: PR and cybersecurity.

You're invited! Networking for security professionals in London

A relaxed afternoon full of expert discussion, informal networking, and a look ahead at what’s possible.

VIDEO: Manipulator or Listener

Navigating Emotional Intelligence in Cyber Security

VIDEO: Sovereignty and Resilience on a Geopolitical Scale

The influence of US tech giants on EU data

VIDEO: Shadow AI

What Is It and Why Does It Matter? 

The hot trends in AI cyber security tools

How AI augments cybersecurity teams.

If you’re interested in business technology, you know the landscape is noisy. This community helps to cut through that noise by giving you ease of access to what matters: insights, innovations, and events to help you make decision-making easier.

Having started from zero in 2020, more than 70,000 professionals across the UK have joined us, with numbers growing fast in EMEA and the US. Why? Because it’s free, open, and built around you, our audience.

Our Promise is

Here’s what you get when you’re part of it:

  • The best of the best – innovations from established leaders and niche players side by side.
  • Your weekly hotlist – what’s trending in technology, without the sales patter.
  • A platform for your voice – share your experiences, compare notes, and hear from peers.

And the things we don’t do are just as important:

  • No subscription fees.
  • No sales teams chasing you.
  • No hidden agendas, we’ll always say when content is sponsored, and we keep editorial control.

You’re in charge. Choose the topics you care about, how often you hear from us, and the type of content you receive.

We’re here to make it easier for you to stay informed, stay connected, and stay ahead – without pressure, cost, or noise.

Come see why 70K+ of your peers are already here.

Sam Redwood, Community Editor