To co-locate or not to co-locate?

03 March 2026

As UK enterprises rethink where their infrastructure should live, the old build-versus-buy debate is giving way to a far more complex set of choices around power, regulation, sustainability and flexibility.

For years, the question facing UK IT leaders seemed deceptively simple: build your own data centre or rent space in someone else’s. In 2026, that binary choice has quietly collapsed.

Find out more

Ransomware attacks: building a human firewall to defend against the rising threat

03 March 2026

Irvin Shillingford, Regional Manager Northern Europe, Hornetsecurity

Irvin Shillingford, Regional Manager Northern Europe, Hornetsecurity

2025 saw a surge in cyberattacks across nearly every industry ranging from car manufacturing to luxury fashion, few sectors have escaped unscathed. Last year marked a critical turning point, with our annual Ransomware Impact Report identifying the first rise in ransomware attacks in three years. This signals the end of a period of decline and the beginning of a renewed, intensified wave of cybercrime.

Find out more

AI hosting: the colocation vs. cloud dilemma for your next project

02 March 2026

Organisations running AI workloads, like banks training fraud detection models, hospitals testing diagnostic tools, or manufacturers using predictive analytics, all face the same problem: hosting them is costly and resource-intensive.

They require dedicated GPUs running non-stop, vast amounts of data moving in and out, and far more power and cooling than a typical IT system.

Find out more
Wireless Broadband Alliance releases framework for secure private 5G networks

02 March 2026

The Wireless Broadband Alliance (WBA), the global industry body dedicated to advancing Wi-Fi interoperability, has published the report “Enterprise Security for Private 5G Networks.”

This comprehensive guide outlines a unified security framework and best practices to help enterprises seamlessly integrate Private 5G into their existing IT and Wi-Fi environments while safeguarding against cyber threats. Central to the report is a converged Zero-Trust model built on open standards and shared policies, promoting secure, resilient, and interoperable enterprise networks.

Find out more