Why DNS filtering is crucial to your data protection strategy

26 February 2026

James Griffin, CEO, CyberSentriq

James Griffin, CEO, CyberSentriq

It’s easy to overlook, but DNS filtering quietly protects your organisation from countless threats every day. Stopping attacks before they reach your network strengthens your entire data protection framework from the ground up.

The key to completely securing company networks is to prevent infiltration of threats at the source. By utilising the Domain Name System (DNS), organisations can prevent access to dangerous locations masquerading as legitimate resources.

Find out more
The hidden cost crisis in networking — and how to escape it

26 February 2026

Chris Noon. Director of Solution Engineering, International for Alkira

Chris Noon. Director of Solution Engineering, International for Alkira

The networking landscape of 2026 is unrecognizable from the predictable cycles of the past decade. If your latest hardware refresh quote left you with a sense of sticker shock, you aren’t alone. Across the industry, the cost of physical infrastructure is surging, driven by a perfect storm of AI-driven component shortages, geopolitical friction, and a volatile tariff environment.

For IT leaders, the math no longer adds up. While budgets remain under intense scrutiny, the cost of the "boxes" required to run a modern business is climbing at an alarming rate. We are witnessing a structural shift in the economics of networking—one that requires a fundamental rethink of how we build and consume infrastructure.

Find out more
Two years on, what are the lessons from the British Library cyberattack?

20 February 2026

Kashif Nazir, Technical Manager, Cloudhouse

Kashif Nazir, Technical Manager, Cloudhouse

On 28 October 2023, staff arriving at the British Library discovered a catastrophe unfolding. Key systems were encrypted, servers were offline, and digital catalogues had vanished. By mid-morning, the crisis management plan was invoked and the National Cyber Security Centre was engaged. One of the world's most prestigious cultural institutions – custodian of over 170 million items spanning three millennia – had fallen victim to a sophisticated ransomware attack.

More than two years after the attack, full restoration continues with some services still scheduled for recovery. This isn't just another cybersecurity cautionary tale. It's a story about what happens when decades of technical debt collide with modern threats and when structural vulnerabilities endemic across the sector finally come home to roost. Most importantly, it's a roadmap that every library, archive, museum, and university needs to study before facing their own reckoning.

Find out more
Cyber resilience in 2026: designing security for real-world behaviour

12 February 2026

Simon Seymour-Perry, CEO of Logica Security

Simon Seymour-Perry, CEO of Logica Security

One of the most persistent misconceptions in cyber security is the belief that human risk is primarily a people problem. In reality, it is a design problem and increasingly, boards, regulators, and threat actors alike recognise it as such.

Research consistently shows that the vast majority of cyber incidents involve human error. Yet most organisations continue to respond by increasing training, tightening policies, and adding layers of control. Despite decades of investment, why are incident levels still so stubbornly high?

Find out more
The invisible breach: how SaaS supply chains became cybersecurity’s new weak link

11 February 2026

Avinash Gupta, Head of COE (Centre of Excellence) at In2IT Technologies

Avinash Gupta, Head of COE (Centre of Excellence) at In2IT Technologies

Software-as-a-Service (SaaS) is no longer an IT choice; it’s the operating system of business itself. From Salesforce to Workday, Microsoft 365 to Slack, the SaaS layer now underpins collaboration, analytics, and decision-making.

Yet, while businesses enjoy the convenience, scalability, and cost-efficiency these platforms offer, many overlook the hidden web of interconnected risks beneath them. The growing sophistication of SaaS supply chain attacks - particularly those exploiting connectors and OAuth trust chains - has made this one of the most insidious and underestimated threats in cybersecurity today.

Find out more