ITPro
ITPro is a global business technology website providing the latest news, analysis, and business insight for IT decision-makers. Whether it's cyber security, cloud computing, IT infrastructure, or business strategy, we aim to equip leaders with the data they need to make informed IT investments.
For regular updates delivered to your inbox and social feeds, be sure to sign up to our daily newsletter and follow on us LinkedIn and Twitter.
Latest articles by ITPro
ITPro InfoComm 2024 Best of Show winners announced
By ITPro published
News We've sifted through the entries to award this year's accolades...
IT pros in the manufacturing sector, we want to hear from you!
By ITPro published
Supported Content Take our survey for the chance to win a £50 Amazon voucher
Security and compliance are holding back generative AI adoption - what can businesses do?
By ITPro published
Sponsored Generative AI promises a wealth of possibilities, but there are valid concerns surrounding regulation, security, and compliance
Shielding the future: Europe's cyber threat landscape report
By ITPro published
Webinar Get a better understanding of the cybersecurity risks at play
Adding reliability by subtracting networking complexity
By ITPro published
Webinar Discover a modern approach to enterprise networking
Chicanes and tunnels: The race to securely connect remote users
By ITPro published
Webinar Performant and reliable access across the globe
2023 Cybersecurity Insiders VPN risk report
By ITPro published
whitepaper Explore the complex world of today’s VPN management and understand its vulnerabilities to diverse cyberattacks
Untethered: How CIOs and CISOs are paving the way for the new hybrid workforce
By ITPro published
Whitepaper Effective techniques to transition from exposed legacy infrastructure to an effective zero trust strategy
Password auditing guide
By ITPro published
whitepaper Stay ahead of today’s threats and secure your future
The economics of penetration testing for web application security
By ITPro published
whitepaper Get the most value from your security solution
Password auditing: Purge weak passwords from your organization
By ITPro published
Supported Content Scan your Active Directory for password-related vulnerabilities
AMD retains its position as the partner of choice for the world’s fastest and most efficient HPC deployments
By ITPro published
Supported content AMD EPYC processors and AMD Instinct accelerators have been used to power a host of new supercomputers globally over the last year
AMD strikes deal to power Microsoft Azure OpenAI service workloads with Instinct MI300X accelerators
By ITPro published
Supported content Some of Microsoft’s most critical services, including Teams and Azure, will be underpinned by AMD technology
Why efficiency lies at the heart of business success
By ITPro published
Supported Content No detail is too small when it comes to improving business performance and sustainability goals
AI Code security report: Organizations must change their approach
By ITPro published
Whitepaper 56.4% say insecure AI suggestions are common — but few have changed processes to improve AI security
Gen AI Buyer’s Guide
By ITPro published
Whitepaper Protecting businesses from AI-generated code vulnerabilities
CISOs guide to gap analysis
By ITPro published
Whitepaper Identify areas of weakness within your AppSec program
Protect your attack vectors from emerging threats
By ITPro published
Webinar Discover an effective way to reduce your attack surface
How identity theft makes a mockery of traditional antivirus – and exposes your business to unnecessary risk
By ITPro published
Sponsored Pinning your business’s cyber resilience on traditional antivirus software is no longer a viable security strategy, here’s how identity-based attacks are rewriting cyber security.
Why embracing Endpoint Security and Identity Protection could be the most important security decision you take in 2024 and beyond
By ITPro published
Leaders can use EPP and IDP to combine disparate security solutions in the cloud and shore up the most common routes for attack
Modern adversaries and evasion techniques
By ITPro published
whitepaper Why legacy AV is an easy target
Stay one step ahead of identity thieves
By ITPro published
whitepaper How identity protection and advanced threat intelligence fortify the top entry point for adversaries
How identity threat protection solves modern business challenges
By ITPro published
whitepaper Reduce risk for supply chain, M&A, remote work and other threats