
Esther Kezia Thorpe
Esther is a freelance media analyst, podcaster, and one-third of Media Voices. She has previously worked as a content marketing lead for Dennis Publishing and the Media Briefing. She writes frequently on topics such as subscriptions and tech developments for industry sites such as Digital Content Next and What’s New in Publishing. She is co-founder of the Publisher Podcast Awards and Publisher Podcast Summit; the first conference and awards dedicated to celebrating and elevating publisher podcasts.
Cloud services market to grow 20% by 2029 following pandemic step change

cloud management
Cloud services market to grow 20% by 2029 following pandemic step change
Organisations are embracing the use of multiple clouds, but formal management is lagging
1 Dec 2022
Our 5-minute guide to hybrid cloud storage

cloud storage
Our 5-minute guide to hybrid cloud storage
What are the benefits and challenges of hybrid cloud storage?
13 Oct 2022
Five obstacles holding your hybrid cloud strategy back

hybrid cloud
Five obstacles holding your hybrid cloud strategy back
Overcoming these challenges is key to a successful cloud migration strategy
29 Sep 2022
How the cloud can add value to Big Data

cloud computing
How the cloud can add value to Big Data
Early adopters are already demonstrating how to get more from analytics via the cloud
12 Sep 2022
What are the different types of ransomware?

Security
What are the different types of ransomware?
Ransomware comes in more than one form, so here's what to look out for
17 Aug 2022
Three keys to successful data management

data management
Three keys to successful data management
Companies need to take a fresh look at data management to realise its true value
17 Mar 2022
Nine tips to improve your disaster recovery strategy

disaster recovery (DR)
Nine tips to improve your disaster recovery strategy
Whether you have a well-rehearsed DR plan in place or are just starting out, here's how to take your strategy to the next level
15 Feb 2022
Five giveaways that show an email is a phishing attack

Security
Five giveaways that show an email is a phishing attack
One of the biggest problems in cyber security is the phishing email
13 Jan 2022
Four ways to keep cloud costs under control

Cloud
Four ways to keep cloud costs under control
Individual cloud costs may look manageable, but can quickly spiral out of control. Read our tips to get a grip on cloud spending
16 Aug 2021
Six ways boards can step up support for cyber security

Business strategy
Six ways boards can step up support for cyber security
Security is an enterprise-wide risk management concern, not merely an IT issue
22 Jul 2021
How can you protect your business from crypto-ransomware?

Security
How can you protect your business from crypto-ransomware?
Here are some easy-to-apply rules to help keep your data - and your business operations - safe
20 Apr 2021
Our 5-minute guide to cloud-managed networking

cloud management
Our 5-minute guide to cloud-managed networking
Learn why cloud-managed networking is growing in popularity with businesses
8 Apr 2021
What is shadow IT?

Security
What is shadow IT?
Hardware and software that isn't authorised by IT departments can leave businesses vulnerable
29 Sep 2020
Five digital transformation tips for HR

digital transformation
Five digital transformation tips for HR
Digital transformation efforts can start from within your own department
22 Sep 2020
Three ways to protect PDF documents

document management systems (DMS)
Three ways to protect PDF documents
How can you safeguard your organisation's documents?
19 Aug 2020
Why it’s time to take your documents digital

document management systems (DMS)
Why it’s time to take your documents digital
Unlock the benefits of PDFs with top-class software
12 Aug 2020
How to choose an embedded analytics vendor

business intelligence (BI)
How to choose an embedded analytics vendor
The advantages of embedded analytics can only be achieved in partnership with the right vendor
4 Jun 2020
Five ways the office is evolving for the future

flexible working
Five ways the office is evolving for the future
Technology isn't the only factor driving our changing office spaces
4 May 2020
What does the future of work look like?

Careers & training
What does the future of work look like?
How remote working, automation and AI will affect the way we work
28 Apr 2020
What is Breach and Attack Simulation (BAS)?

penetration testing
What is Breach and Attack Simulation (BAS)?
Explaining the latest security tool helping organisations identify and rectify vulnerabilities in their cyber defences
29 Jan 2020
Our 5-minute guide to security awareness training

Security
Our 5-minute guide to security awareness training
How security awareness training can build resilience in your business and reduce the likelihood of a successful cyber attack
24 Jan 2020
Our 5-minute guide to enterprise cloud computing

Cloud
Our 5-minute guide to enterprise cloud computing
What is enterprise cloud computing, how is it used, and what are the business benefits?
15 Jan 2020
What is workload automation?

Business strategy
What is workload automation?
How does workload automation benefit organisations and what are the use cases?
24 Oct 2019
Data recovery: Why is it so important?

data recovery
Data recovery: Why is it so important?
We explain why your business needs to have a data recovery policy and how to manage data loss
9 Oct 2019
AI the most critical technology for CIOs in the next 5 years

chief information officer (CIO)
AI the most critical technology for CIOs in the next 5 years
60% of CIOs believe artificial intelligence and machine learning are the top critical future technologies
8 Oct 2019
5 things to consider when planning your Windows 10 migration

IT infrastructure
5 things to consider when planning your Windows 10 migration
Whatever stage your migration strategy is at, here are some tips to smooth the journey
27 Sep 2019
Five steps to big data project success

business intelligence (BI)
Five steps to big data project success
How organisations can get an end-to-end view of their data pipelines
24 Sep 2019
Four ways organisations are combating cyber attacks

endpoint security
Four ways organisations are combating cyber attacks
AI, machine learning, technical integration and flexible tools are leading the way
11 Sep 2019
Four tips for effective business collaboration

Business strategy
Four tips for effective business collaboration
Collaboration is about more than just removing office walls
27 Aug 2019
Our 5-minute guide to distributed caching

virtualisation
Our 5-minute guide to distributed caching
What is distributed caching and when is it used?
9 Aug 2019
Under 50% of IT leaders are confident in their data security

data breaches
Under 50% of IT leaders are confident in their data security
Increased regulation and high-profile data breaches are causing concern among leaders across all departments
31 Jul 2019
How to reduce the impact of the skills gap in your business

Careers & training
How to reduce the impact of the skills gap in your business
Demand for IT skills is only expected to grow. Here's how you can anticipate and deal with the skills shortage
22 Jul 2019
50% of cyber attacks now use island hopping

Security
50% of cyber attacks now use island hopping
Financial, retail and manufacturing businesses are in the firing line of this increasingly popular cyber attack method
3 Jul 2019
How automation can help digital transformation

automation
How automation can help digital transformation
Incorporating automated procedures into your digital transformation plan will reap benefits in the future
1 Jul 2019
Why cloud should be part of your disaster recovery strategy

disaster recovery (DR)
Why cloud should be part of your disaster recovery strategy
Cloud-based solutions can help support businesses of all sizes through unplanned downtime
7 Jun 2019
What is Network Intelligence?

Network & Internet
What is Network Intelligence?
A look at the technology enabling businesses to analyse data packets in real-time
3 Jun 2019