Blog
Changes in April 2026 to Cyber Essentials
ITogether is proud to hold both Cyber Essentials and ISO 27001 certification – the world’s leading standard for information security. What is changing in April 2026 for Cyber Essentials ? As of 27 April, Cyber Essentials will be updated to the new "Danzell" question...
New Zealand’s National Cyber Security Strategy at a Turning Point
MediMap, Momentum, And The Missing Strategy: Why This Matters Now New Zealand is preparing to release a long-awaited national cyber security strategy after it effectively lapsed in 2023, while the country deals with a second high-profile health data breach in just two...
Kia Ora New Zealand
When New Zealand-based organisations ask us what value ITogether brings to the table, we often start by sharing our experience working in the United Kingdom where ITogether was originally started back 2005. While every region has its own challenges and pace, the UK...
AI in Secure Coding
One conversation we are now hearing regularly across the UK, Europe, and New Zealand is no longer theoretical. It is happening inside engineering teams today. A developer we spoke with recently generated roughly three months of work for four people, produced around...
AI Governance Risks: Understanding the Rise of Agentic Identity
There’s a shift underway. AI is no longer just generating content or assisting with analysis. It is making decisions, triggering workflows, calling APIs, and accessing sensitive systems. As Check Point’s recent acquisition (13 Feb 2026), Cyata’s founders put it, this...
Cyber Insurance: The Hard Truth
One question we’re asked on a weekly basis: Is Cyber Insurance actually worth it? The short answer is yes. The long answer depends on how your organisation views and measures cyber risk, what maturity looks like in your region, and what you expect cyber insurance to...
Join our AI and Application Security Webinar
Tuesday 3 February 2026 | 1pm - 2pm GMT REGISTER HERE AI is now embedded into applications, workflows, and decision-making paths. APIs are the connective tissue making this possible, but security models are not keeping pace. Across the UK, Europe, and New Zealand, we...
Scaling Cybersecurity in New Zealand
New Zealand already has several strengths when it comes to cyber security. From our perspective, regulation is generally pragmatic, public and private sectors collaborate well and many organisations carry less legacy technical debt than their overseas peers. These are...
Put your Logo in the Inbox: BIMI for CISOs
Most organisations spend heavily on cybersecurity awareness training and email filtering, yet still leave one weak spot wide open: the domain. If attackers can imitate your brand, they can phish customers, staff, and suppliers with frightening success. That’s where...
Check Point Harmony Email & Collaboration recognised as a Leader in the Gartner Magic Quadrant
Check Point has been positioned in the leader’s quadrant of the Gartner Magic Quadrant for Email Security (Q4 2025). It is a notable milestone in a crowded and highly competitive email security market. At ITogether, we work with over 50 cybersecurity vendors and...
ITogether Wrapped!
Here's an end-of-year wrap-up of some of the Network & Cyber Security services ITogether delivers, day in, day out across the UK, Europe and New Zealand! Agentic AI Secure enablement of autonomous AI agents. Focus on governance, risk management, data protection,...
Akamai’s State of the Internet Report 2025
We always look forward to Akamai’s State of the Internet report... This year’s research lands at exactly the right moment. The threat landscape is accelerating. Attackers are better funded, better automated, and increasingly powered by artificial intelligence in cyber...
How do I easily manage my domain’s SPF, DKIM and DMARC?
(And Why Should I Care About These if my Email is Already Working ?) The National Cyber Security Centre (NCSC) has updated its email security guidance, and many organisations are now reviewing their use of hosted DMARC services such as Valimail. A key concern is...
Why Deploying a Web Application without Akamai or Cloudflare is a Growing Risk
Putting a new web application straight on the public internet, without a protection layer such as Akamai CDN or Cloudflare DDoS mitigation, used to be fairly common. Today it is a strategic cyber security risk. Attackers automate reconnaissance, insurers raise...
Five Cloudflare Outages in 2025: Reliable or Risky?
Cloudflare have suffered five major outages in 2025 already. They have suffered more though if you check their status page here. Here’s a list of the more significant outages / incidents for Cloudflare in 2025, based on publicly-available post-mortems and...
Join our Agentic Security Operations Webinar!
From Automation to Agentic Operations: Building Safe, Scalable & Unified Security Tuesday 25 November 2025 | 13:00pm - 14:00pm GMT REGISTER HERE Security teams have automated for years, yet many still feel stuck with rigid playbooks, fragmented tools, and slow...
Mac vs Windows for Business
Why ITogether Chooses Apple for Business: Security, Reliability, and Value We’re often asked why we run our business primarily on Apple Mac devices rather than Windows PCs. It’s not about brand loyalty, it’s about practicality, performance, and...
Don’t Miss Our AI Cybersecurity Land Rover Experience Event
Broughton Hall, Skipton | Wednesday 26 November 2025 | 11am until 4pm REGISTER HERE As AI (artificial intelligence) continues to transform business operations, its impact on cybersecurity is becoming impossible to ignore. From AI-driven threat detection to automated...


















