Two years on, what are the lessons from the British Library cyberattack?

20 February 2026

Kashif Nazir, Technical Manager, Cloudhouse

Kashif Nazir, Technical Manager, Cloudhouse

On 28 October 2023, staff arriving at the British Library discovered a catastrophe unfolding. Key systems were encrypted, servers were offline, and digital catalogues had vanished. By mid-morning, the crisis management plan was invoked and the National Cyber Security Centre was engaged. One of the world's most prestigious cultural institutions – custodian of over 170 million items spanning three millennia – had fallen victim to a sophisticated ransomware attack.

More than two years after the attack, full restoration continues with some services still scheduled for recovery. This isn't just another cybersecurity cautionary tale. It's a story about what happens when decades of technical debt collide with modern threats and when structural vulnerabilities endemic across the sector finally come home to roost. Most importantly, it's a roadmap that every library, archive, museum, and university needs to study before facing their own reckoning.

Find out more
Cyber resilience in 2026: designing security for real-world behaviour

12 February 2026

Simon Seymour-Perry, CEO of Logica Security

Simon Seymour-Perry, CEO of Logica Security

One of the most persistent misconceptions in cyber security is the belief that human risk is primarily a people problem. In reality, it is a design problem and increasingly, boards, regulators, and threat actors alike recognise it as such.

Research consistently shows that the vast majority of cyber incidents involve human error. Yet most organisations continue to respond by increasing training, tightening policies, and adding layers of control. Despite decades of investment, why are incident levels still so stubbornly high?

Find out more
The invisible breach: how SaaS supply chains became cybersecurity’s new weak link

11 February 2026

Avinash Gupta, Head of COE (Centre of Excellence) at In2IT Technologies

Avinash Gupta, Head of COE (Centre of Excellence) at In2IT Technologies

Software-as-a-Service (SaaS) is no longer an IT choice; it’s the operating system of business itself. From Salesforce to Workday, Microsoft 365 to Slack, the SaaS layer now underpins collaboration, analytics, and decision-making.

Yet, while businesses enjoy the convenience, scalability, and cost-efficiency these platforms offer, many overlook the hidden web of interconnected risks beneath them. The growing sophistication of SaaS supply chain attacks - particularly those exploiting connectors and OAuth trust chains - has made this one of the most insidious and underestimated threats in cybersecurity today.

Find out more
Matching high AI data centre throughput with OEM alternative transceivers

16 January 2026

George Ashwin, Channel Director at AddOn Networks

George Ashwin, Channel Director at AddOn Networks

Artificial intelligence (AI), and the growing usage of IoT devices, edge and cloud computing applications continue to drive unprecedented changes to the UK data centre market. Industry research from August 2025 indicates that just under half of all new data centres being built within the country will be dedicated to AI, including infrastructure specifically designed to support the necessary training and workloads. These new facilities are characterised by specialist hardware, and significant power demands due to the sheer throughput of data.

Find out more
The cybersecurity blind spot at the top

09 January 2026

Glen Williams, CEO, Cyberfort

Glen Williams, CEO, Cyberfort

For years, cybersecurity has been filed under the responsibility of the IT department, as if resilience could be achieved through technical controls alone. Yet the greatest weakness facing UK enterprises today is not a new strain of malware but persistent overconfidence in the boardroom. Far too many senior leaders believe their organisations are fully protected, while the operational reality tells a different story. This disconnect leaves businesses exposed in ways they often discover only after an attack.

Find out more