
Agentic commerce and the challenge for retailers’ security teams
Agentic commerce is redefining retail traffic and security. As AI agents proliferate, retailers must move beyond bot detection to intent-based, behavioural defence strategies.

Agentic commerce is redefining retail traffic and security. As AI agents proliferate, retailers must move beyond bot detection to intent-based, behavioural defence strategies.

Small and mid-sized businesses can strengthen cyber security using Retrieval-Augmented Generation, gaining AI-driven insights, compliance assurance and enterprise-grade protection without the cost or complexity.

Modern enterprises face disruptions that traditional disaster recovery can no longer address. This article explores why resilience must evolve into a proactive, business-aligned capability for continuity.

Network outages expose how fragile digital operations have become. NIS2 turns resilience into a legal requirement, making redundancy, continuity planning, and multi-layered protection essential for modern businesses.

Justin Kuruvilla, Chief Cyber Security Strategist at Risk Ledger, explores how DORA’s true potential lies beyond compliance—building resilience through collaboration, visibility, and systemic risk understanding.

Threat intelligence is only valuable when actionable. Kerri Shafer-Page of Arctic Wolf explains how automation, visibility, and external expertise turn data into effective cybersecurity defence.

Matthew Albans, CTO at Roke, warns organisations that quantum computers could soon break current encryption. Early preparation with post-quantum cryptography is essential to stay secure.

Pierre du Rostu, CEO of AXA Digital Commercial Platform, explores how integrated, tech-driven risk management can help companies navigate the growing challenges of climate, conflict, and cyber threats.

Tom Grissen, CEO of Daon, warns that poorly implemented biometrics create dangerous security gaps. Discover why layered, intelligent biometric defences are vital against AI-powered cyber threats.

AI is no longer just a defensive tool. Cybercriminals are operationalising AI to accelerate attacks, making adaptive, human-centred defence strategies more critical than ever.

LevelBlue’s Sean Shirley analyses a live AsyncRAT fileless malware attack, showing how trusted tools, memory-resident loaders and persistence tactics evade defences – and what organisations must do to respond.

John Smith, CTO EMEA at Veracode, highlights why UK government software remains a hacker’s playground, exploring security debt, AI risks, and the need for urgent cyber resilience.

Kevin Curran of Ulster University warns that “harvest now, decrypt later” quantum threats could expose today’s encrypted data tomorrow. Businesses must prepare now for the post-quantum era.

Quantum computing is no longer science fiction. Discover how small businesses can prepare today, from cybersecurity to optimisation, and gain competitive advantage in tomorrow’s digital landscape.

AI offers transformative business insights, but processing sensitive data creates risks. Confidential computing safeguards data in use, ensuring privacy, regulatory compliance, and secure AI-driven operations.

Shadow AI is on the rise as employees use unsanctioned GenAI tools at work. Discover how IT leaders can turn hidden risks into opportunities for productivity and trust.

BYOD boosts flexibility but heightens risk. Learn how IT leaders can secure personal devices, protect corporate data, and build trust while enabling modern, mobile workplaces.

The EU AI Act enforces transparency, risk mitigation, and ethical AI use from 2025—prompting companies to rethink deployment, security, and long-term compliance strategies.

Agentic AI is powerful, but without identity-centred security strategies, it introduces major risks. Learn how to integrate AI agents securely into your organisation’s infrastructure.

Third-party risk management must evolve beyond compliance to become a proactive, intelligence-led discipline—bridging silos, embracing real-time visibility, and addressing human, technological, and process-based gaps.

AI demands speed and innovation, but without hybrid cloud visibility and security, risks escalate. Discover why deep observability is key to secure transformation.

Clientless ZTNA enables secure access to unmanaged IoT and OT devices, reducing malware risk and lateral movement while supporting third-party and BYOD network access.

The 2025 Cyber Breaches Survey exposes the UK’s widening cybersecurity gaps—underscoring urgent leadership, cultural, and supply chain vulnerabilities that demand immediate, coordinated action.

Hackers are evolving, leveraging AI and malware-as-a-service to target organisations. Matt Berzinski of Ping Identity explores how businesses can turn the tables on cybercriminals.

Talon Outdoor is bringing advertising’s oldest medium, Out of Home, into the 21st century.

A digital transformation driving unprecedented growth for Poland’s most famous chocolate brand.

Lloyds of London’s Rebecca Bunyan on learning to let go to achieve a successful career.

Digital identity startup Incode is one of technology’s newest unicorns

Andy Bell, CTO of Edenhouse Solutions, says effective change management underpins a successful transformation

Zscaler’s Nathan Howe on why he believes the ebbs and flows of computing history can help us tackle the problems of tomorrow

Bain & Company is helping organisations plan for 2030. Ted Shelton, Expert Partner, Automation and Digital Innovation, talks us through why executives need to embrace automation or risk their business getting left behind.

In this episode, Duncan Cousins and Henrik Nilsson from Apptio debate ‘quantum computing’, ‘digital evangelist’, ‘DevOps’ and more.

Agentic commerce is redefining retail traffic and security. As AI agents proliferate, retailers must move beyond bot detection to intent-based, behavioural defence strategies.

Small and mid-sized businesses can strengthen cyber security using Retrieval-Augmented Generation, gaining AI-driven insights, compliance assurance and enterprise-grade protection without the cost or complexity.

Modern enterprises face disruptions that traditional disaster recovery can no longer address. This article explores why resilience must evolve into a proactive, business-aligned capability for continuity.

Network outages expose how fragile digital operations have become. NIS2 turns resilience into a legal requirement, making redundancy, continuity planning, and multi-layered protection essential for modern businesses.

Justin Kuruvilla, Chief Cyber Security Strategist at Risk Ledger, explores how DORA’s true potential lies beyond compliance—building resilience through collaboration, visibility, and systemic risk understanding.

Threat intelligence is only valuable when actionable. Kerri Shafer-Page of Arctic Wolf explains how automation, visibility, and external expertise turn data into effective cybersecurity defence.

Matthew Albans, CTO at Roke, warns organisations that quantum computers could soon break current encryption. Early preparation with post-quantum cryptography is essential to stay secure.

Pierre du Rostu, CEO of AXA Digital Commercial Platform, explores how integrated, tech-driven risk management can help companies navigate the growing challenges of climate, conflict, and cyber threats.

Tom Grissen, CEO of Daon, warns that poorly implemented biometrics create dangerous security gaps. Discover why layered, intelligent biometric defences are vital against AI-powered cyber threats.

AI is no longer just a defensive tool. Cybercriminals are operationalising AI to accelerate attacks, making adaptive, human-centred defence strategies more critical than ever.

LevelBlue’s Sean Shirley analyses a live AsyncRAT fileless malware attack, showing how trusted tools, memory-resident loaders and persistence tactics evade defences – and what organisations must do to respond.

John Smith, CTO EMEA at Veracode, highlights why UK government software remains a hacker’s playground, exploring security debt, AI risks, and the need for urgent cyber resilience.

Kevin Curran of Ulster University warns that “harvest now, decrypt later” quantum threats could expose today’s encrypted data tomorrow. Businesses must prepare now for the post-quantum era.

Quantum computing is no longer science fiction. Discover how small businesses can prepare today, from cybersecurity to optimisation, and gain competitive advantage in tomorrow’s digital landscape.

AI offers transformative business insights, but processing sensitive data creates risks. Confidential computing safeguards data in use, ensuring privacy, regulatory compliance, and secure AI-driven operations.

Shadow AI is on the rise as employees use unsanctioned GenAI tools at work. Discover how IT leaders can turn hidden risks into opportunities for productivity and trust.

BYOD boosts flexibility but heightens risk. Learn how IT leaders can secure personal devices, protect corporate data, and build trust while enabling modern, mobile workplaces.

The EU AI Act enforces transparency, risk mitigation, and ethical AI use from 2025—prompting companies to rethink deployment, security, and long-term compliance strategies.

Agentic AI is powerful, but without identity-centred security strategies, it introduces major risks. Learn how to integrate AI agents securely into your organisation’s infrastructure.

Third-party risk management must evolve beyond compliance to become a proactive, intelligence-led discipline—bridging silos, embracing real-time visibility, and addressing human, technological, and process-based gaps.

AI demands speed and innovation, but without hybrid cloud visibility and security, risks escalate. Discover why deep observability is key to secure transformation.

Clientless ZTNA enables secure access to unmanaged IoT and OT devices, reducing malware risk and lateral movement while supporting third-party and BYOD network access.

The 2025 Cyber Breaches Survey exposes the UK’s widening cybersecurity gaps—underscoring urgent leadership, cultural, and supply chain vulnerabilities that demand immediate, coordinated action.

Hackers are evolving, leveraging AI and malware-as-a-service to target organisations. Matt Berzinski of Ping Identity explores how businesses can turn the tables on cybercriminals.