Entries by


SASE stands for Secure Access Service Edge. It is a comprehensive solution that combines network security and connectivity in a unified cloud-native architecture. SASE removes the legacy part of network security and shifts to a more dynamic, modern, and flexible security system.   In this article, I explain why businesses should migrate from traditional firewalling to […]

The True Cost Of Migrating On-Premise Infrastructure To The Cloud

With the shift in cloud-based solutions showing no signs of slowing down, we often think about the true costs of cloud migration. Organisations are enticed by the cloud’s promises of scalability, flexibility, and cost-efficiency. However, the decision to migrate presents some advantages, but it is also valid to note the drawbacks. Especially, when the actual […]

The Onion Approach to Cyber Security – Data Security Defence in Depth

In Shrek’s words (Well, sort of), “Onions have layers. “Cyber Security” has layers… You get it? They both have layers.” He has a point!    You may have heard of the term Defence-In-Depth. The principle is that the more “layers” of security, the better protected it will be from the threat actors who seek to affect […]

Microsoft Copilot for Security: Empowering IT Teams with AI-Driven Insights

Organisations all face an uphill battle against sophisticated and ever-changing threats. As adversaries become more cunning and leverage AI and ML to deliver more complex attacks, defenders need innovative tools to stay ahead. This is where Microsoft Copilot for Security, a ground-breaking solution that combines the power of artificial intelligence (AI) with security expertise to enhance […]

How IT Can Save Your Business Money and Make It Work Better

Technology is an essential part of any modern business, but it can also be a source of frustration, inefficiency, and risk if not managed properly. You need a reliable, trustworthy IT partner to help create and implement a strategic IT roadmap that aligns with your business goals and needs. We know that IT is essential […]

The Cyber OODA Loop Explained: Enhancing Cyber Defence with Rapid Decision-Making

If you follow the world of Jocko Willink or listen to his podcast, especially the one with Andrew Huberman, then you will have heard about the Observe, Orient, Decide and Act (OODA) loop.   Willink used this model during his time in the Navy Seals to help him overcome challenges. This article explores how the OODA loop […]

Cloud Security Posture Management, Why you need it!

It’s time to discuss the importance of moving to an Opex model, the drive towards consumption-based usage and the impact on technologies like Microsoft Azure, as well as the importance of protecting Cloud resources and security when you move resources to the cloud. This article looks at how we put these principles into practice in […]

Microsoft 365 Copilot What’s New For 2024

In today’s fast-paced business environment, staying on top of your workload can be challenging. That’s where Microsoft 365 comes in. This AI-powered productivity tool is designed to help businesses of all sizes work smarter, not harder. With the removal of the 300-user gap in January, this tool is now available to businesses of all sizes and […]

Integrating Generative AI

In the dynamic landscape of technology, integrating Generative AI, Machine Learning (ML), and Artificial Intelligence (AI) has become imperative for businesses to stay competitive and innovative.   Not since the dot.com era have we seen such a dramatic shift in technology, which has become a part of our everyday lives.    Businesses must adapt and […]

Technology and Cybersecurity; The Trends and Predications for 2024

Time waits for no man and the last 12 months have truly shown that neither can technology or cybersecurity. Tech will not be held back. Governments, companies and individuals cannot stop the march of technological progress. Therefore as I sat down to pen this article for the third year in a row it was very […]

Looking for a technology partner?
Let’s talk

  • This field is for validation purposes and should be left unchanged.