Gated Content Introducing our new Group CTO Meet our new Group CTO, Richard Conway! In this video, Richard shares his vision for the future, insights on leadership, and his plans to drive innovation across Acora and our customer base. Join our Insights platform today to watch the... Watch now
Data & AI AI Needs Data, But Is Your Data Ready For AI? Stanford University’s 2025 AI Index Report reveals that a staggering 78% of businesses embraced AI in 2024. That’s a 55% increase in just one year. Driven by more affordable artificial intelligence (AI) models and their game-changing potential, businesses are increasingly... Read now
Data & AI Rethinking IT Strategy In The Age Of GenAI Reframing IT Strategy With AI With the acceleration of Generative AI (GenAI) capabilities and raising customer expectations to a new high, businesses are required to reshape their IT strategies and operational frameworks like never before. This change isn’t just a... Read now
Data & AI The New Blueprint for Agentic AI: Mastering the Leap From GPT to Guided Agents Moving Beyond Generative AI to Agentic Systems Enter the new era of artificial intelligence (AI): Agentic AI, where systems not only generate content based on prompts but also make decisions, learn and autonomously execute tasks. While GenAI generates text, images,... Explore Resource
Gated Content The Ultimate Guide to SLA’s & XLA’s An Experience Led Approach is one of the IT industry’s hottest topics – and one we’ve been talking about here at Acora for longer than most. In this guide, we’ve set out some of the background to the XLA, how it differs from and adds to SLA metrics and adoption dimensions of our own Experience Led Approach™, built in by design. Read now
Cyber Security Threat Insight & The Evolving CISO Role Following on from our CISO Predictions released in December, our Director of Cyber Security Sales, James Fernley, shares what is on his mind ahead of 2025. From Insider Threats, to the prevalence of Ransomware, to the evolving role of a... Watch now
Cyber Security Building Layered Security & Proactive Threat Detection Build Layered Security & Proactively Manage Threat Detection Cyber threats can be categorised into opportunistic, material, and targeted attacks, each requiring different levels of preparedness. Opportunistic Attacks Random, large-scale attacks such as phishing emails that aim to exploit vulnerabilities without... Read now
Gated Content Successful IT & Cyber Projects Guide Cyber Security and IT projects often fail due to unclear objectives, unrealistic schedules, inadequate resources, poor project management, and stakeholder disengagement. With 75% of business and IT executives thinking their software projects will fail, we dissect why so many projects are at risk of failing and how to overcome these alarmingly high stats. Read now