A Pledge Won’t Stop a Hacker. But It’s a Start.
The Cyber Resilience Pledge raises expectations, but a signature won’t stop a hacker. AJ Thompson explains why board‑level action and real cyber resilience are what actually protect your business.
Quantum Computing and 1024-bit Encryption: Is your data already at risk?
Quantum computing threatens your current encryption. Attackers are harvesting your data now. Here is what to do about it now.
When the NCSC Says Act Now, Boards Should Listen
The NCSC has warned of a severe and enduring cyber threat to UK organisations. Northdoor sets out what the guidance means in practice and what boards need to decide, not just endorse.
From Legacy to Agile:
How AI is Transforming IBM Power Application Modernisation
IBM Power application modernisation is more achievable with AI. Learn how to tackle the skills gap and move legacy code forward.
DSARs: Why manual processes are setting you up to fail
Manual DSAR processes leave organisations unable to guarantee UK GDPR compliance particularly where shadow IT is present. Discover why a dedicated DSAR solution is the only defensible approach
IBM Power Modernisation:
How IBM Bob changes the economics of legacy transformation
IBM Bob is IBM’s AI-powered SDLC partner built for enterprise complexity. For organisations running IBM i, AIX, and legacy enterprise applications, it changes what is economically viable in a…[ ]
Northdoor shortlisted for Network Computing Awards 2026
IT Services Company of the Year
Northdoor is a finalist for IT Services Company of the Year 2026 at Network Computing Awards. Vote for our award-winning IT consultancy by 14th May.
IBM Quantum Safe: How to build your post-quantum migration plan
Discover how IBM Quantum Safe helps organisations build a cryptographic inventory, prioritise risk and migrate to post-quantum standards, step by step.
Is now the time to evaluate Red Hat OpenShift Virtualisation?
Facing steep VMware/Broadcom price increases? Discover why organisations are shifting to Red Hat OpenShift Virtualisation and how Northdoor’s expert migration assessment delivers clarity, confidence…[ ]
Blueprint Two is gone, but the London Market Core Platform signals a smarter path forward
Blueprint Two is gone, but the London Market Core Platform signals a more pragmatic route to modernisation. Here’s what LMCP means for firms now.
Blueprint Two is cancelled.
Now the London Market must own its future
Lloyd’s Blueprint Two has been shelved. AJ Thompson explains why it failed, what it means for London Market firms, and how to move your technology modernisation forward without it.
Northdoor Achieves ISO 27001:2022 Certification for Information Security
Northdoor has achieved ISO 27001:2022 certification, confirming independently audited information security processes that protect client data and support compliance.
When AI tools become attack vectors:
The Claude code leak and what followed
AI coding agent security risks hit headlines in March 2026. The Claude Code npm leak triggered malware within hours. What to do now.
Red Hat licensing optimisation guide 2026:
How to reduce RHEL costs and maintain compliance
Red Hat licensing optimisation reduces RHEL overspend by up to 40% closes compliance gaps, and helps you regain control of your Linux estate.
The quantum clock is ticking. Your encryption is already at risk
Your encrypted data is already being harvested. Learn the 5 urgent steps to assess your quantum encryption risk and migrate to NIST post-quantum standards now.
Subject Access Request Automation:
Stop treating SARs as a filing exercise
Automate Subject Access Request processing under UK GDPR. Cut response times, ensure consistent redaction, and build a full audit trail.
Northdoor and Cenata launch reinsurance technology partnership
Northdoor and Cenata have announced a reinsurance technology partnership to deliver cloud-native outwards reinsurance solutions to insurers and reinsurers.
Red Hat OpenShift Virtualisation
Why it’s become the go-to VMware exit for UK organisations
Broadcom’s acquisition of VMware has triggered price increases of up to 1,000% for UK organisations. AJ Thompson, CCO at Northdoor, explains why Red Hat OpenShift Virtualisation has emerged as the…[ ]
Quantum-safe encryption
Why the threat to your data is already here
Quantum computers will break today’s encryption. With harvest now, decrypt later attacks already underway, find out what quantum-safe encryption means for your organisation.
Northdoor achieves FSQS registration renewal for 2026/2027
Northdoor has renewed its FSQS registration for 2026/2027, confirming our status as a trusted IT and cybersecurity supplier to UK financial services organisations.
The Quantum Revolution
Discover how quantum computing is reshaping healthcare, finance and climate science and why organisations need to start preparing today.
The AI infrastructure spending surge: investment, risk and market reality
Microsoft and Oracle are investing billions in AI infrastructure. Here’s what that spending signals for investors, enterprise adoption, and cloud competition.
When does SQL Server 2016 support end?
Microsoft SQL Server 2016 support ends 14 July 2026. Learn migration timelines (2-12 months), three migration paths, and why starting in Q1 2025 matters for your organisation.
What is ransomware? Why backups no longer protect your data
Beyond the Backup: The new era of ransomware extortion and data theft.
Cloud computing costs in the UK: The soaring reality and how to regain control
Cloud spend is now the 2nd largest cost for UK IT firms, often hitting 12-18% of revenue. Discover why AI is driving 20%+ of bills and 5 actionable strategies UK CIOs are using to cut costs by 20-30%
Windows 10 End of Support
Windows 10 support ended in October 2025. Learn about the security risks, GDPR compliance issues, and why UK organisations must upgrade now.
Five IT trends that will define the UK SME market in 2026
Five UK SME IT trends for 2026, covering AI readiness, cyber security, cloud sovereignty, ESG reporting and DORA-driven compliance.
2026 Insurance Technology Predictions
Explore 2026 insurance industry predictions, from Blueprint Two delays to AI adoption, sanctions compliance, and cybersecurity. Learn how insurers can prepare for change
IT Security Predictions for 2026
Discover the top IT security predictions for 2026 from AI-first cyber defence and automated Zero Trust ecosystems to supply chain resilience and quantum-resistant encryption. Learn how regulations…[ ]
How data is learning to speak: The new era of conversational BI
We answer the most pressing questions about conversational BI, from implementation challenges to future trends. Discover how AI is transforming business intelligence and what leaders need to know.
Financial data breaches and AI security trends: 2025 industry analysis
Explore 2025’s financial data breach statistics and AI security risks. Learn proven strategies to strengthen cyber resilience in finance.
How the Cloudflare outage exposed hidden risks
Discover expert answers to the most common questions about the 2025 Cloudflare outage, hidden dependencies, and how to strengthen digital resilience for your busiess.
UK sanctions list update:
What businesses need to know before 28 January 2026
From 28 January 2026, the UK Sanctions List will replace the OFSI Consolidated List as the single source for sanctions data. Learn how Northdoor’s Sanctions Checker helps you stay compliant.
The UK's new cyber rules are coming: 5 surprising changes you can't ignore
Discover the UK’s new Cyber Security and Resilience Bill, its surprising changes, and how it impacts businesses. Learn about new responsibilities, stricter timelines, and significant penalties.
The real cost of IT Support for SMEs
Discover the real IT support costs SME businesses face beyond basic salaries. Our detailed analysis reveals hidden expenses, compares in-house vs outsourced options, and shows why most small…[ ]
IBM Expert Care: Premium IT Support
Discover how IBM Power and Storage Expert Care reduces downtime, boosts resilience, and protects mission-critical IT systems.
AWS outage 2025: the critical lessons for UK business continuity
The October 2025 AWS outage proves the cloud is “just someone else’s computer” that will fail. AJ Thompson details the supply chain risks and offers boards the essential strategy shifts required for…[ ]
What happens after an attack?
Cyber breaches are inevitable. Learn why response not prevention, defines business survival.
IBM Multivendor Support Services: a smarter path for VMware and Oracle customers
Discover how IBM multivendor support services help reduce VMware and Oracle costs, avoid vendor lock-in, and future-proof IT infrastructure.
Passwordless authentication: reality vs hype
Discover the truth about passwordless authentication. Learn about the real vulnerabilities, fallback challenges and why passwords aren’t dead.
Rethinking Data Warehousing Webinar: strategies for modern businesses
Join our data warehousing webinar to discover practical strategies on how modern architectures improve agility, governance, and ROI.
Northdoor welcomes Martin Summerhayes as new Head of Managed and Support Services
Martin Summerhayes’ appointment strengthens Northdoor’s service delivery and client support.
Security Project of the Year: Northdoor and The Salvation Army Shortlisted
Learn how Northdoor plc’s cybersecurity project with The Salvation Army earned a prestigious nomination for Security Project of the Year at the Computing Security Awards.
Tesco’s £100M lawsuit exposes VMware licensing risks
Tesco’s £100M lawsuit over VMware licensing exposes major risks. Learn what it means for your business and how to protect your IT strategy.
Cloud hosting: essential questions answered for UK businesses
Explore expert answers to common cloud hosting questions from Northdoor’s Dominic Green. Learn about types, security, costs, and migration strategies for UK businesses.
Human factors in cyber security
Discover how human factors in cyber security and emotional decision-making impact your organisation’s vulnerability to attacks. Take our free phishing security test today.
Supply chain security risks drive data breach costs for UK in 2025
Supply chain breaches cost UK CISOs £241,620 more. Shadow AI accounts for 20% of breaches. Learn how to reduce data breach costs in 2025.
Cost of a Data Breach Report: 2025 key findings
Discover the true cost of data breaches in 2025. IBM’s landmark report reveals the $4.44M average breach cost and AI’s impact on security. Download the full report now.
Tom Richards shares IT modernisation insights on The Hitchhiker’s Guide to IT podcast
In The Hitchhiker’s Guide to IT podcast, Northoor’s Tom Richards explains how to modernise systems, reduce risk, and support future growth.
Subscribe to our newsletter
Subscribe to our newsletter to get the very latest insights and updates in the world of enterprise IT and data security: