Blog

AI in Secure Coding

AI in Secure Coding

One conversation we are now hearing regularly across the UK, Europe, and New Zealand is no longer theoretical. It is happening inside engineering teams today. A developer we spoke with recently generated roughly three months of work for four people, produced around...

read more
AI Governance Risks: Understanding the Rise of Agentic Identity

AI Governance Risks: Understanding the Rise of Agentic Identity

There’s a shift underway. AI is no longer just generating content or assisting with analysis. It is making decisions, triggering workflows, calling APIs, and accessing sensitive systems. As Check Point’s recent acquisition (13 Feb 2026), Cyata’s founders put it, this...

read more
Cyber Insurance: The Hard Truth

Cyber Insurance: The Hard Truth

One question we’re asked on a weekly basis: Is Cyber Insurance actually worth it? The short answer is yes. The long answer depends on how your organisation views and measures cyber risk, what maturity looks like in your region, and what you expect cyber insurance to...

read more
Join our AI and Application Security Webinar

Join our AI and Application Security Webinar

Tuesday 3 February 2026 | 1pm - 2pm GMT REGISTER HERE AI is now embedded into applications, workflows, and decision-making paths. APIs are the connective tissue making this possible, but security models are not keeping pace. Across the UK, Europe, and New Zealand, we...

read more
Scaling Cybersecurity in New Zealand

Scaling Cybersecurity in New Zealand

New Zealand already has several strengths when it comes to cyber security. From our perspective, regulation is generally pragmatic, public and private sectors collaborate well and many organisations carry less legacy technical debt than their overseas peers. These are...

read more
Put your Logo in the Inbox: BIMI for CISOs

Put your Logo in the Inbox: BIMI for CISOs

Most organisations spend heavily on cybersecurity awareness training and email filtering, yet still leave one weak spot wide open: the domain. If attackers can imitate your brand, they can phish customers, staff, and suppliers with frightening success. That’s where...

read more
ITogether Wrapped!

ITogether Wrapped!

Here's an end-of-year wrap-up of some of the Network & Cyber Security services ITogether delivers, day in, day out across the UK, Europe and New Zealand! Agentic AI Secure enablement of autonomous AI agents. Focus on governance, risk management, data protection,...

read more
Akamai’s State of the Internet Report 2025

Akamai’s State of the Internet Report 2025

We always look forward to Akamai’s State of the Internet report... This year’s research lands at exactly the right moment. The threat landscape is accelerating. Attackers are better funded, better automated, and increasingly powered by artificial intelligence in cyber...

read more
How do I easily manage my domain’s SPF, DKIM and DMARC?

How do I easily manage my domain’s SPF, DKIM and DMARC?

(And Why Should I Care About These if my Email is Already Working ?) The National Cyber Security Centre (NCSC) has updated its email security guidance, and many organisations are now reviewing their use of hosted DMARC services such as Valimail. A key concern is...

read more
Five Cloudflare Outages in 2025: Reliable or Risky?

Five Cloudflare Outages in 2025: Reliable or Risky?

Cloudflare have suffered five major outages in 2025 already. They have suffered more though if you check their status page here. Here’s a list of the more significant outages / incidents for Cloudflare in 2025, based on publicly-available post-mortems and...

read more
Join our Agentic Security Operations Webinar!

Join our Agentic Security Operations Webinar!

From Automation to Agentic Operations: Building Safe, Scalable & Unified Security Tuesday 25 November 2025 | 13:00pm - 14:00pm GMT REGISTER HERE Security teams have automated for years, yet many still feel stuck with rigid playbooks, fragmented tools, and slow...

read more
Mac vs Windows for Business

Mac vs Windows for Business

Why ITogether Chooses Apple for Business: Security, Reliability, and Value  We’re often asked why we run our business primarily on Apple Mac devices rather than Windows PCs. It’s not about brand loyalty, it’s about practicality, performance, and...

read more
Don’t Miss Our AI Cybersecurity Land Rover Experience Event

Don’t Miss Our AI Cybersecurity Land Rover Experience Event

Broughton Hall, Skipton | Wednesday 26 November 2025 | 11am until 4pm REGISTER HERE As AI (artificial intelligence) continues to transform business operations, its impact on cybersecurity is becoming impossible to ignore. From AI-driven threat detection to automated...

read more
Join Us in York for Hack Attack

Join Us in York for Hack Attack

The Guildhall, York | Tuesday 23 September 2025 | 9:15am:–2:00pm REGISTER HERE Join us for a Cyber Attack Demo designed for business leaders and technology enthusiasts. In just half a day, we’ll walk you through a real-life cyber attack – from the moment attackers...

read more