06 March 2026
Saurabh Prasad, Senior Solution Architect at In2IT Technologies
Cloud-native applications have transformed the way businesses operate, enabling faster innovation, greater agility, and enhanced scalability. Yet, with this evolution comes an equally complex security landscape.
Traditional security approaches, which rely on fragmented tools and point solutions, are increasingly insufficient on their own, as while many organisations still combine best-of-breed tools, the trend is toward more consolidated platforms. The reality is that modern applications, often composed of microservices running across distributed infrastructures, demand security that is as agile and interconnected as the systems themselves. This is where integrated security platforms prove indispensable.
Find out more03 March 2026
Aslam Tajbhai, Head of Solutions at DMP SA
Today, organisations rely heavily on data as the backbone of their operations. Every business decision, customer interaction, and innovation depends on instant access to accurate information. Unfortunately, many businesses only realise the importance of data protection after experiencing system failures or data loss. In today’s digital landscape, a robust backup strategy is not just advisable, it’s essential for resilience.
The 3-2-1-1 backup model is a proven approach for safeguarding data. It involves maintaining three copies of data, stored across two different types of media, with one copy kept offsite in an immutable state. This method enhances data durability and speeds up recovery, especially as immutable backups remain unaltered even when security systems are compromised. With cyber threats and ransomware attacks increasing, such protective measures are vital for organisational survival.
Find out more
20 February 2026
IBM has introduced IBM Sovereign Core, a groundbreaking software foundation designed to embed digital sovereignty controls directly into the architecture of cloud-native and AI workloads. The launch responds to growing concerns over cross-border data access, operational control, and compliance amid escalating geopolitical tensions and increasingly stringent regulatory environments.
As digital sovereignty extends beyond simple data residency, it now encompasses control over infrastructure, software, identity and access management, encryption keys, auditability, and the jurisdiction where AI models are hosted and inference is conducted. IBM Sovereign Core aims to give enterprises, governments, and service providers sovereignty "as an inherent property of the software," allowing them to operate within their own jurisdictional boundaries without relying on overlays or external controls.
Find out more20 February 2026
Ryan Boyes, Governance, Risk, and Compliance Officer at Galix
Vendor risk management has shifted from an administrative task to a strategic discipline, which shapes how well organisations protect themselves.
Many businesses rely heavily on third parties for essential services but underestimate how much sensitive data these partners hold or assume that responsibility shifts entirely once work is outsourced. Without clear standards, specialist support and continuous oversight, vendors quickly become one of the weakest links in an organisation’s security posture.
Find out more



