Latest
![A digital padlock on a blue digital background.](https://cdn.mos.cms.futurecdn.net/cx5grhZaQenj2jCrCzkbJK-320-80.jpg)
The future of cyber security regulation: what to look out for with NIS2
By Steve Bradford published
2023 saw the introduction of NIS2 - With a deadline of 17 October 2024, time is ticking for EU Member States to prepare.
![Amazon](https://cdn.mos.cms.futurecdn.net/rcjZyaopUjWia6p6L7FnRU-320-80.jpg)
How to enhance website performance during busy periods
By Suhaib Zaheer published
Reducing friction during busy periods, such as highly anticipated qualification results days, is non-negotiable when avoiding inefficiencies in user experience
![An abstract image of digital security.](https://cdn.mos.cms.futurecdn.net/S2k99RTyJJhGbDwQRHUsyg-320-80.jpg)
Tactics to strengthen fraud prevention against generative AI
By Kris Nagel published
Generative AI makes it easier to create highly convincing content. How should businesses respond?
![Person using a chatbot via mobile smart phone application](https://cdn.mos.cms.futurecdn.net/pBRZ4snxJk6bLsQMf9ZGH6-320-80.jpg)
Want to take advantage of AI? Focus on the foundations
By Michael Chalmers published
Developing a solid AI strategy can reap significant business benefits - here's how.
![Digital Transformation](https://cdn.mos.cms.futurecdn.net/kHc8mjYzHYzUGZArBsdxHa-320-80.jpg)
Fix it, even if it 'ain't broke': the price of legacy technology
By Nia Batten published
Postponing legacy tech modernization to save money could cost you more in the long term.
![Business planning](https://cdn.mos.cms.futurecdn.net/WufFxk6vkxRfn4euCWSRim-320-80.jpg)
How to overcome connected planning challenges
By Guy Armstrong published
Disparate department-by-department planning has become a thing of the past. A connected, integrated approach is being used by more businesses.
![A computer being guarded by cybersecurity.](https://cdn.mos.cms.futurecdn.net/uTLwBhC26YCauAq8Swffd8-320-80.jpg)
Should businesses follow Google’s footsteps in cybersecurity?
By Raghu Nandakumara published
Is Google's bold move to strengthen cybersecurity by limiting internet access the right way forward?
![Servers](https://cdn.mos.cms.futurecdn.net/8f4c849c8e568bdc06e6eb2a63210748-320-80.jpg)
It’s time to bust four HPC storage management myths
By Jeff Whitaker published
Jeff Whitaker at Panasas explores the misconceptions around manageability, reliability, and complexity in HPC storage.
Are you a pro? Subscribe to our newsletter
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!