Latest
![Cybersecurity in action.](https://cdn.mos.cms.futurecdn.net/XUFsAjnAaCahJpBvL5yLYh-320-80.jpg)
Establishing the pathway to an effective digital identity system
By Dominic Forrest published
Digital identity schemes must deliver widespread accessibility and respect for privacy, trusted security and ease of use
![Person at laptop working.](https://cdn.mos.cms.futurecdn.net/9MD4NLNVuFTbHuVFzPBrRH-320-80.jpg)
Empowering remote workers through secure access
By Achi Lewis published
Unlock the future of remote work, exploring secure access as the key to success and wellbeing.
![A man controlling multiple apps against a city background.](https://cdn.mos.cms.futurecdn.net/GWhBkfpPBtyqgo5tnJvKXG-320-80.jpg)
Accelerating the energy transition with Edge Computing
By Eli Daccach published
The energy supply chain is currently in a state of transition, prompting critical industries like Oil & Gas and electrical utilities to face the challenge of decarbonizing their operations.
![Person using a phone and laptop in a cafe.](https://cdn.mos.cms.futurecdn.net/XBUfLVfDz3ovRsycMbUzJj-320-80.jpg)
FTTX monetization in the age of 5G
By Hitesh Morar published
FTTX has pushed the boundaries of what's possible for of high-speed, low-latency internet access, but with the 5G revolution it's essential to evaluate how it can be monetized.
![Depiction of Smart city with a grid of digital symbols overlaid](https://cdn.mos.cms.futurecdn.net/iYZw5VCtBCGT4QqeBQhfaG-320-80.jpg)
Edge Computing - the foundation of ‘cognitive cities’
By Anthony Sayers published
Anthony Sayers, Edge Ambassador at Lenovo discusses how the next generation of smart cities creates a place that thinks for itself.
![An abstract image of a database](https://cdn.mos.cms.futurecdn.net/4CKb3s4EgrMAtAiiK6w6Bc-320-80.jpg)
5 reasons why the database is dead
By Ajay Kulkarni published
Five reasons why the traditional concept of a database is "dead" and why this transformation is significant.
![Cybersecurity in action.](https://cdn.mos.cms.futurecdn.net/XUFsAjnAaCahJpBvL5yLYh-320-80.jpg)
Generative AI's impact on phishing attacks
By Max Heinemeyer published
AI may be the best option to defend against generative AI-powered phishing attacks.
![A padlock icon next to a person working on a laptop.](https://cdn.mos.cms.futurecdn.net/BWBeAxrLrBFHHdNreUhfgW-320-80.jpg)
How to keep your IoT devices secure
By Richard Staynings published
Investment in IoT is booming, but is there a correlation between the this and cybercrime?
Are you a pro? Subscribe to our newsletter
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!