27 February 2026
Andy Syrewicze, Security Evangelist, Hornetsecurity
Over the past few years, business leaders and Chief Information Security Officers (CISOs) have rapidly moved beyond cautiously experimenting with AI tools to managing extensive enterprise deployments across multiple sectors. The swift adoption and continuous AI upgrades are consistently generating a new threat landscape full of complexity.
The speed of innovation and the wide adoption of AI across entire organisations of all sizes present a complex new threat landscape. As we begin 2026, organisations must remain even more vigilant of AI usage. For senior executives and cybersecurity experts, the core issue is no longer debating whether businesses should continue their use of AI. Instead of dwelling solely on the technological shift, the primary focus must pivot to the effective management of the high risks and persistent cybersecurity gaps created by this ongoing technology revolution across the entire business landscape.
Find out moreRebuilding cloud control for the next era of UK enterprise compute
27 February 2026
Kevin Cochrane, CMO at Vultr
UK enterprises are at a critical turning point in how they design, deploy, and evolve cloud compute environments. After a decade dominated by a few hyperscale platforms, organisations face new pressures: accelerating compute demand, escalating and unpredictable costs, tighter data sovereignty expectations, and the need to support distributed, edge-enabled workloads. The CMA reports AWS and Microsoft dominate 40% of UK cloud spend, creating significant switching barriers. Cloud economics are changing rapidly, and performance-per-pound is emerging as a defining metric.
Find out more
26 February 2026
James Griffin, CEO, CyberSentriq
It’s easy to overlook, but DNS filtering quietly protects your organisation from countless threats every day. Stopping attacks before they reach your network strengthens your entire data protection framework from the ground up.
The key to completely securing company networks is to prevent infiltration of threats at the source. By utilising the Domain Name System (DNS), organisations can prevent access to dangerous locations masquerading as legitimate resources.
Find out moreThe hidden cost crisis in networking — and how to escape it
26 February 2026
Chris Noon. Director of Solution Engineering, International for Alkira
The networking landscape of 2026 is unrecognizable from the predictable cycles of the past decade. If your latest hardware refresh quote left you with a sense of sticker shock, you aren’t alone. Across the industry, the cost of physical infrastructure is surging, driven by a perfect storm of AI-driven component shortages, geopolitical friction, and a volatile tariff environment.
For IT leaders, the math no longer adds up. While budgets remain under intense scrutiny, the cost of the "boxes" required to run a modern business is climbing at an alarming rate. We are witnessing a structural shift in the economics of networking—one that requires a fundamental rethink of how we build and consume infrastructure.
Find out moreTwo years on, what are the lessons from the British Library cyberattack?
20 February 2026
Kashif Nazir, Technical Manager, Cloudhouse
On 28 October 2023, staff arriving at the British Library discovered a catastrophe unfolding. Key systems were encrypted, servers were offline, and digital catalogues had vanished. By mid-morning, the crisis management plan was invoked and the National Cyber Security Centre was engaged. One of the world's most prestigious cultural institutions – custodian of over 170 million items spanning three millennia – had fallen victim to a sophisticated ransomware attack.
More than two years after the attack, full restoration continues with some services still scheduled for recovery. This isn't just another cybersecurity cautionary tale. It's a story about what happens when decades of technical debt collide with modern threats and when structural vulnerabilities endemic across the sector finally come home to roost. Most importantly, it's a roadmap that every library, archive, museum, and university needs to study before facing their own reckoning.
Find out more



