Skip to content
Home

Info & Advice

Unsanctioned cloud apps aren’t new. What’s changed is the scale and visibility. Teams are using more cloud tools than ever, often without formal approval. This is what’s commonly referred to as Shadow IT, and in 2026, it’s accelerating.
Today, users judge the network by how it feels. This shift is driving a move towards network observability, the ability to see, understand and act on what’s happening across the entire connectivity chain, in real time.
Identity has become the new security perimeter – and it’s under more pressure than ever. Modern environments are now made up of not just people, but thousands of service accounts, machine identities and increasingly autonomous AI agents, all operating at speed.
Zero Trust Network Access (ZTNA) is emerging as a practical response to a problem many organisations are already feeling – that traditional VPN‑based remote access no longer reflects how people, applications and environments actually operate.
Local cloud data centres are often overlooked in cloud strategy conversations. Yet for many organisations, they provide a more balanced way to achieve performance, security, and governance goals.
Network modernisation isn’t usually driven by failure. More often, it’s driven by a quiet realisation that what once worked comfortably is now being asked to do far more than it was ever designed for.
Software supply chain attacks are becoming one of the hardest cyber threats for organisations to detect – and a recent incident involving Axios shows why.
Every organisation wants to move forward. But something interesting often happens when organisations genuinely try to innovate. They discover that the foundations they’re building on are far more fragile than they realised.
We talk a lot about zero trust, multi‑factor authentication and identity protection. But in many environments, security models still quietly assume one thing – a person at the keyboard. That assumption no longer reflects reality.
AI has moved from novelty to normal almost overnight. Teams are using tools like ChatGPT to draft emails, summarise meetings, analyse data and speed up everyday work. In many cases, this experimentation is already happening whether leadership knows it or not.
At the end of last month, many of us were shocked to hear of another cyber attack on a healthcare platform, this time one affecting our aged community. The incident once again placed cyber security firmly in the public spotlight, highlighting just how vulnerable even trusted digital services can be.
Moving to the cloud gives organisations speed, flexibility, and scale. But it also introduces new responsibilities. Cloud security isn’t a “set and forget” exercise. Small misconfigurations, left unchecked, can quickly turn into serious security incidents.