Features
Latest features
![A 3D graphic of a smartphone lying on a reflective surface showing computer code, with a yellow shield lying slightly elevated above it](https://cdn.mos.cms.futurecdn.net/f2Zp8yHsNReXnv3BYgk7vb-320-80.jpg)
AI will change the face of cyber security - here’s how businesses can prepare
By ITPro published
AI promises to be a double-edged sword, bringing new threats and new solutions to businesses
![The words ‘What is HPC really for?’ overlaid on a lightly blurred, low saturation image of a server stack with wires coming out symmetrically to either side. Decorative: the word ‘HPC’ is in yellow, while other words are in white. The ITPro podcast logo is in the bottom right corner.](https://cdn.mos.cms.futurecdn.net/nsJYorhxTkK9uKe6bJvfNh-320-80.jpg)
What is HPC really for?
By Rory Bathgate published
ITPro Podcast High-performance computing HPC is often touted as an area of major tech breakthroughs – but what are these and who is leading the charge?
![Jen Easterly, director of the Cybersecurity and Infrastructure Security Agency, testifies before a House Homeland Security Subcommittee. She is sat at a committee table with three people sat behind her and portraits on the wall in the background.](https://cdn.mos.cms.futurecdn.net/TKbEgBma2NsJWh2H3qqkjW-320-80.jpg)
What is the Cybersecurity and Infrastructure Security Agency (CISA) and what does it do?
By Ross Kelly published
Explainer CISA plays a critical role in keeping US organizations safe from cyber attacks, providing vital advice and threat information
![What is a default gateway? A close-up shot of Ethernet cables plugged into a router](https://cdn.mos.cms.futurecdn.net/k9fj7k6X3CFL5BVySLpRyD-320-80.jpg)
What is a default gateway?
By Dale Walker, Richard Speed last updated
In-depth What is a default gateway, and how to find its address
![Hand holding SSD m2 in front of motherboard background](https://cdn.mos.cms.futurecdn.net/7S37jYKFFjSW5Zkh5CgxnD-320-80.jpg)
Can you use an SSD in a NAS?
By Darien Graham-Smith last updated
In-depth A quick guide on how to use an SSD in a NAS drive, and whether it's a good idea
![Mockup of a padlock covered in blue and red neon code denoting ransomware, malware, and security](https://cdn.mos.cms.futurecdn.net/L6DSTHdion3mCrSBkWnF9C-320-80.jpg)
How IT leaders can respond to the evolution of ransomware
By Peter Ray Allison published
With a proper strategy for response, communication, and recovery, leaders can respond for the evolution of ransomware and ensure staff are prepared for the worst
![](https://cdn.mos.cms.futurecdn.net/8jaVZpQM96Y2PNRsWdgpLd-320-80.jpg)
A complete guide to data encryption
By Connor Jones last updated
In-depth We explore the world of digital cryptography, and explain why it is an increasingly fundamental aspect of modern business
![](https://cdn.mos.cms.futurecdn.net/Gu5hWrw7D3BLoLu6E8Qp4g-320-80.jpg)
What is a rootkit?
By Rene Millman last updated
In-depth We look at this malicious tool and how to detect and remove it
![Light bulb with AI symbol inside surrounding other tech-related symbols, held in a man[s](https://cdn.mos.cms.futurecdn.net/tC8Ynz3TUNmWzsxqjE8NGf-320-80.jpg)
Have we seen the end of the ‘true’ MSP?
By Terry Storrar published
Industry Insights As MSPs evolve to offer comprehensive IT solutions the definition of a 'true' MSP has shifted, with success now requiring a mix of strategic partnerships, innovation, and a customer-centric approach
Get the ITPro. daily newsletter
Receive our latest news, industry updates, featured resources and more. Sign up today to receive our FREE report on AI cyber crime & security - newly updated for 2024.