Esther Kezia Thorpe
Esther is a freelance media analyst, podcaster, and one-third of Media Voices. She has previously worked as a content marketing lead for Dennis Publishing and the Media Briefing. She writes frequently on topics such as subscriptions and tech developments for industry sites such as Digital Content Next and What’s New in Publishing. She is co-founder of the Publisher Podcast Awards and Publisher Podcast Summit; the first conference and awards dedicated to celebrating and elevating publisher podcasts.
Latest articles by Esther Kezia Thorpe
![AI](https://cdn.mos.cms.futurecdn.net/ZAzZ7ZyceEeAfPe99SheQm-320-80.jpg)
AI the most critical technology for CIOs in the next 5 years
By Esther Kezia Thorpe published
Analysis 60% of CIOs believe artificial intelligence and machine learning are the top critical future technologies
![Open data](https://cdn.mos.cms.futurecdn.net/VzsCtuUx3ydvdxE8b58EFh-320-80.jpg)
Five steps to big data project success
By Zach Cooper, Esther Kezia Thorpe, IT Pro published
In-depth How organisations can get an end-to-end view of their data pipelines
![Bigstock, cloud](https://cdn.mos.cms.futurecdn.net/xHcfoZZjBuZw8VBQh7Pjn9-320-80.jpg)
How to get ready for your cloud transformation
By Esther Kezia Thorpe published
In-depth Five decisions IT teams should consider before migrating to the cloud
![Security shield with glowing technology circle around the outside and a red and green hue surrounding](https://cdn.mos.cms.futurecdn.net/BENcskEUhdHEihXZCf85tW-320-80.jpg)
Four ways organisations are combating cyber attacks
By Zach Cooper, Esther Kezia Thorpe published
In-depth AI, machine learning, technical integration and flexible tools are leading the way
![networking](https://cdn.mos.cms.futurecdn.net/v9wTpwfpubneGGwSry5uen-320-80.jpg)
Four tips for effective business collaboration
By Esther Kezia Thorpe, Grace Halverson, Zach Cooper published
Opinion Collaboration is about more than just removing office walls
![null](https://cdn.mos.cms.futurecdn.net/biBncjxdJtCDMMM6w3fc3f-320-80.jpg)
Our 5-minute guide to distributed caching
By Esther Kezia Thorpe published
In-depth What is distributed caching and when is it used?
![Mockup image with padlocks to symbolise a cyber security vulnerability](https://cdn.mos.cms.futurecdn.net/Pz3CFWeJxcZh89pBoB28YV-320-80.jpg)
Under 50% of IT leaders are confident in their data security
By Esther Kezia Thorpe published
In-depth Increased regulation and high-profile data breaches are causing concern among leaders across all departments
![Four upside down lightbulbs turned off, and one the right way up and illuminated](https://cdn.mos.cms.futurecdn.net/MHRSgyXqEY293U9yfPbfxN-320-80.jpg)
How to reduce the impact of the skills gap in your business
By Esther Kezia Thorpe published
In-depth Demand for IT skills is only expected to grow. Here's how you can anticipate and deal with the skills shortage
![City office buildings image with overlay of security padlocks and network showing a data breach](https://cdn.mos.cms.futurecdn.net/yYxHUwcY2MsnytrYVfxr88-320-80.jpg)
50% of cyber attacks now use island hopping
By Esther Kezia Thorpe published
News Financial, retail and manufacturing businesses are in the firing line of this increasingly popular cyber attack method
![FInger reaching out to touch a button with cogs on it, blue tech automation theme](https://cdn.mos.cms.futurecdn.net/2QiayoKJaW7L9kaZRPwUML-320-80.jpg)
How automation can help digital transformation
By Esther Kezia Thorpe published
In-depth Incorporating automated procedures into your digital transformation plan will reap benefits in the future
![Server on fire](https://cdn.mos.cms.futurecdn.net/2Do5WUjPdephYspPte76eC-320-80.jpg)
Why cloud should be part of your disaster recovery strategy
By Keri Allan, Esther Kezia Thorpe published
In-depth Cloud-based solutions can help support businesses of all sizes through unplanned downtime
![Brain, network, network intelligence, AI, computing, connected, artificial intelligence, machine learning](https://cdn.mos.cms.futurecdn.net/54ZAB9Gefmzwm2NneQR8UX-320-80.jpg)
What is Network Intelligence?
By Esther Kezia Thorpe published
In-depth A look at the technology enabling businesses to analyse data packets in real-time
![Graphic of a man with a megaphone with email icons and his team on a blue background](https://cdn.mos.cms.futurecdn.net/jKf84zHQEo9tTPdmvuC5Fg-320-80.jpg)
80% of businesses still use email to collaborate
By Esther Kezia Thorpe published
Analysis The decades-old format is still the most popular way to work across organisations, despite a wide availability of specialist tools
![Man in suit using touch screen for Managed Service Provider](https://cdn.mos.cms.futurecdn.net/GzQCJdJdfTf5yAmJ35Eptj-320-80.jpg)
Why should VARs consider becoming MSPs?
By Esther Kezia Thorpe published
In-depth The managed service model offers an opportunity for new revenues
![Ones and zeroes rushing through a city to represent data movement](https://cdn.mos.cms.futurecdn.net/j3K5Xpqhr57YmcMcFyguTW-320-80.jpg)
Why speedy backups are key for MSPs
By Esther Kezia Thorpe published
In-depth Ineffective tools mean many businesses are unable to carry out daily backups
![null](https://cdn.mos.cms.futurecdn.net/Va2hHGaUdpvV2XzP4cgfwN-320-80.jpg)
Three key pillars of threat visibility
By Esther Kezia Thorpe, Grace Halverson published
In-depth For a company to see what threats they’re up against, they need visibility into all the data available
![Man in suit using touch screen for Managed Service Provider](https://cdn.mos.cms.futurecdn.net/GzQCJdJdfTf5yAmJ35Eptj-320-80.jpg)
Essential marketing dos and don’ts for MSPs
By Esther Kezia Thorpe published
In-depth Tips to refine your marketing, from first contact to managing your online presence
![Virtual clouds with padlocks floating above an illustration of the earth](https://cdn.mos.cms.futurecdn.net/UVY9VDuJ5PRMXp27iAgSrf-320-80.jpg)
Our 5-minute guide to virtual private cloud
By Esther Kezia Thorpe published
In-depth Learn about the benefits and limitations of a virtual private cloud, and how it can be used in your business
![hand on a blue cityscape backdrop touching a hologram of the globe](https://cdn.mos.cms.futurecdn.net/3KNFR2onMRPTqMDYJJRixa-320-80.jpg)
The top IT business technologies in five charts
By Esther Kezia Thorpe published
In-depth Discover what fellow IT professionals consider the most important technologies to be in driving their business forwards
![Digital Economy](https://cdn.mos.cms.futurecdn.net/s6fKe6HU5mvSq3yXwK89Lo-320-80.jpg)
How ADCs can help your digital transformation
By Esther Kezia Thorpe published
In-depth Application delivery controllers can work with new app architectures as a key pillar of digital transformation
![null](https://cdn.mos.cms.futurecdn.net/jxurWJCRFCVQTgWzgpYjCh-320-80.jpg)
Four ways to secure sensitive data
By Esther Kezia Thorpe published
In-depth Read our tips to ensure that your business and customer data is kept as secure as possible
![group of people stand around a table with multiple clouds around them](https://cdn.mos.cms.futurecdn.net/6waAodNokucEKAmsWzh8xj-320-80.jpg)
Cloud and hybrid tech tops the priority list for businesses
By Esther Kezia Thorpe published
Analysis Automation and data analytics are also high on the list of top technologies that are important to IT professionals
![null](https://cdn.mos.cms.futurecdn.net/MujLaYJEbof7q9pUbHaMh6-320-80.jpg)
Documents: the security risk you hadn't thought of
By Esther Kezia Thorpe published
In-depth The consequences of data loss are becoming more and more serious
Get the ITPro. daily newsletter
Receive our latest news, industry updates, featured resources and more. Sign up today to receive our FREE report on AI cyber crime & security - newly updated for 2024.