ITPro
ITPro is a global business technology website providing the latest news, analysis, and business insight for IT decision-makers. Whether it's cyber security, cloud computing, IT infrastructure, or business strategy, we aim to equip leaders with the data they need to make informed IT investments.
For regular updates delivered to your inbox and social feeds, be sure to sign up to our daily newsletter and follow on us LinkedIn and Twitter.
Latest articles by ITPro

ITPro InfoComm 2024 Best of Show winners announced
By ITPro published
News We've sifted through the entries to award this year's accolades...

IT pros in the manufacturing sector, we want to hear from you!
By ITPro published
Supported Content Take our survey for the chance to win a £50 Amazon voucher

Security and compliance are holding back generative AI adoption - what can businesses do?
By ITPro published
Sponsored Generative AI promises a wealth of possibilities, but there are valid concerns surrounding regulation, security, and compliance

Shielding the future: Europe's cyber threat landscape report
By ITPro published
Webinar Get a better understanding of the cybersecurity risks at play

Adding reliability by subtracting networking complexity
By ITPro published
Webinar Discover a modern approach to enterprise networking

Chicanes and tunnels: The race to securely connect remote users
By ITPro published
Webinar Performant and reliable access across the globe

2023 Cybersecurity Insiders VPN risk report
By ITPro published
whitepaper Explore the complex world of today’s VPN management and understand its vulnerabilities to diverse cyberattacks

Untethered: How CIOs and CISOs are paving the way for the new hybrid workforce
By ITPro published
Whitepaper Effective techniques to transition from exposed legacy infrastructure to an effective zero trust strategy

Password auditing guide
By ITPro published
whitepaper Stay ahead of today’s threats and secure your future

The economics of penetration testing for web application security
By ITPro published
whitepaper Get the most value from your security solution

Password auditing: Purge weak passwords from your organization
By ITPro published
Supported Content Scan your Active Directory for password-related vulnerabilities

AMD retains its position as the partner of choice for the world’s fastest and most efficient HPC deployments
By ITPro published
Supported content AMD EPYC processors and AMD Instinct accelerators have been used to power a host of new supercomputers globally over the last year

AMD strikes deal to power Microsoft Azure OpenAI service workloads with Instinct MI300X accelerators
By ITPro published
Supported content Some of Microsoft’s most critical services, including Teams and Azure, will be underpinned by AMD technology

Why efficiency lies at the heart of business success
By ITPro published
Supported Content No detail is too small when it comes to improving business performance and sustainability goals

AI Code security report: Organizations must change their approach
By ITPro published
Whitepaper 56.4% say insecure AI suggestions are common — but few have changed processes to improve AI security

Gen AI Buyer’s Guide
By ITPro published
Whitepaper Protecting businesses from AI-generated code vulnerabilities

CISOs guide to gap analysis
By ITPro published
Whitepaper Identify areas of weakness within your AppSec program

Protect your attack vectors from emerging threats
By ITPro published
Webinar Discover an effective way to reduce your attack surface

How identity theft makes a mockery of traditional antivirus – and exposes your business to unnecessary risk
By ITPro published
Sponsored Pinning your business’s cyber resilience on traditional antivirus software is no longer a viable security strategy, here’s how identity-based attacks are rewriting cyber security.

Why embracing Endpoint Security and Identity Protection could be the most important security decision you take in 2024 and beyond
By ITPro published
Leaders can use EPP and IDP to combine disparate security solutions in the cloud and shore up the most common routes for attack

Modern adversaries and evasion techniques
By ITPro published
whitepaper Why legacy AV is an easy target

Stay one step ahead of identity thieves
By ITPro published
whitepaper How identity protection and advanced threat intelligence fortify the top entry point for adversaries

How identity threat protection solves modern business challenges
By ITPro published
whitepaper Reduce risk for supply chain, M&A, remote work and other threats