26 February 2026
James Griffin, CEO, CyberSentriq
It’s easy to overlook, but DNS filtering quietly protects your organisation from countless threats every day. Stopping attacks before they reach your network strengthens your entire data protection framework from the ground up.
The key to completely securing company networks is to prevent infiltration of threats at the source. By utilising the Domain Name System (DNS), organisations can prevent access to dangerous locations masquerading as legitimate resources.
Find out moreThe hidden cost crisis in networking — and how to escape it
26 February 2026
Chris Noon. Director of Solution Engineering, International for Alkira
The networking landscape of 2026 is unrecognizable from the predictable cycles of the past decade. If your latest hardware refresh quote left you with a sense of sticker shock, you aren’t alone. Across the industry, the cost of physical infrastructure is surging, driven by a perfect storm of AI-driven component shortages, geopolitical friction, and a volatile tariff environment.
For IT leaders, the math no longer adds up. While budgets remain under intense scrutiny, the cost of the "boxes" required to run a modern business is climbing at an alarming rate. We are witnessing a structural shift in the economics of networking—one that requires a fundamental rethink of how we build and consume infrastructure.
Find out more
20 February 2026
Kashif Nazir, Technical Manager, Cloudhouse
On 28 October 2023, staff arriving at the British Library discovered a catastrophe unfolding. Key systems were encrypted, servers were offline, and digital catalogues had vanished. By mid-morning, the crisis management plan was invoked and the National Cyber Security Centre was engaged. One of the world's most prestigious cultural institutions – custodian of over 170 million items spanning three millennia – had fallen victim to a sophisticated ransomware attack.
More than two years after the attack, full restoration continues with some services still scheduled for recovery. This isn't just another cybersecurity cautionary tale. It's a story about what happens when decades of technical debt collide with modern threats and when structural vulnerabilities endemic across the sector finally come home to roost. Most importantly, it's a roadmap that every library, archive, museum, and university needs to study before facing their own reckoning.
Find out moreCyber resilience in 2026: designing security for real-world behaviour
12 February 2026
Simon Seymour-Perry, CEO of Logica Security
One of the most persistent misconceptions in cyber security is the belief that human risk is primarily a people problem. In reality, it is a design problem and increasingly, boards, regulators, and threat actors alike recognise it as such.
Research consistently shows that the vast majority of cyber incidents involve human error. Yet most organisations continue to respond by increasing training, tightening policies, and adding layers of control. Despite decades of investment, why are incident levels still so stubbornly high?
Find out moreThe invisible breach: how SaaS supply chains became cybersecurity’s new weak link
11 February 2026
Avinash Gupta, Head of COE (Centre of Excellence) at In2IT Technologies
Software-as-a-Service (SaaS) is no longer an IT choice; it’s the operating system of business itself. From Salesforce to Workday, Microsoft 365 to Slack, the SaaS layer now underpins collaboration, analytics, and decision-making.
Yet, while businesses enjoy the convenience, scalability, and cost-efficiency these platforms offer, many overlook the hidden web of interconnected risks beneath them. The growing sophistication of SaaS supply chain attacks - particularly those exploiting connectors and OAuth trust chains - has made this one of the most insidious and underestimated threats in cybersecurity today.
Find out more



