Latest
IT departments face five major challenges with hybrid environments
By Ronak Desai published
Five reasons why technologists urgently need application observability to overcome complexity within their hybrid IT environments.
Enabling cybersecurity businesses through proxies
By Vaidotas Šedys published
How is proxy use serving as the foundation for many of the current advancements in cybersecurity?
Navigating IoT device security challenges in healthcare
By Jon Taylor published
Jon Taylor at Versa Networks explains how healthcare organizations secure their medical devices.
Sustainable practices in B2B: Now is the time to act
By Sharon Curr published
Business goals and ecological targets don't need to be mutually exclusive: here's why.
The inadequacy of voice biometrics
By Dominic Forrest published
There are major concerns when it comes to voice biometrics, bringing into question its suitability for secure, large-scale transactions.
Mitigating Google Drive security risks with bulk remediation
By Adam Gavish published
Adam Gavish, CEO at DoControl discusses best practices for security professionals to bulk remediate data security.
The fallacy of low-code/no-code and generative AI
By Thierry Bonfante published
Looking to reduce technical debt? These tools will make things worse.
Stop blaming maintainers for open source risks
By Brian Fox published
Companies consuming open source have no idea what they're putting inside their software.
Are you a pro? Subscribe to our newsletter
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!