Quantum Computing and 1024-bit Encryption: Is your data already at risk?
Quantum computing threatens your current encryption. Attackers are harvesting your data now. Here is what to do about it now.
When the NCSC Says Act Now, Boards Should Listen
The NCSC has warned of a severe and enduring cyber threat to UK organisations. Northdoor sets out what the guidance means in practice and what boards need to decide, not just endorse.
From Legacy to Agile:
How AI is Transforming IBM Power Application Modernisation
IBM Power application modernisation is more achievable with AI. Learn how to tackle the skills gap and move legacy code forward.
DSARs: Why manual processes are setting you up to fail
Manual DSAR processes leave organisations unable to guarantee UK GDPR compliance particularly where shadow IT is present. Discover why a dedicated DSAR solution is the only defensible approach
IBM Power Modernisation:
How IBM Bob changes the economics of legacy transformation
IBM Bob is IBM’s AI-powered SDLC partner built for enterprise complexity. For organisations running IBM i, AIX, and legacy enterprise applications, it changes what is economically viable in a…[ ]
IBM Quantum Safe: How to build your post-quantum migration plan
Discover how IBM Quantum Safe helps organisations build a cryptographic inventory, prioritise risk and migrate to post-quantum standards, step by step.
Is now the time to evaluate Red Hat OpenShift Virtualisation?
Facing steep VMware/Broadcom price increases? Discover why organisations are shifting to Red Hat OpenShift Virtualisation and how Northdoor’s expert migration assessment delivers clarity, confidence…[ ]
Blueprint Two is gone, but the London Market Core Platform signals a smarter path forward
Blueprint Two is gone, but the London Market Core Platform signals a more pragmatic route to modernisation. Here’s what LMCP means for firms now.
Blueprint Two is cancelled.
Now the London Market must own its future
Lloyd’s Blueprint Two has been shelved. AJ Thompson explains why it failed, what it means for London Market firms, and how to move your technology modernisation forward without it.
Red Hat licensing optimisation guide 2026:
How to reduce RHEL costs and maintain compliance
Red Hat licensing optimisation reduces RHEL overspend by up to 40% closes compliance gaps, and helps you regain control of your Linux estate.
The quantum clock is ticking. Your encryption is already at risk
Your encrypted data is already being harvested. Learn the 5 urgent steps to assess your quantum encryption risk and migrate to NIST post-quantum standards now.
Subject Access Request Automation:
Stop treating SARs as a filing exercise
Automate Subject Access Request processing under UK GDPR. Cut response times, ensure consistent redaction, and build a full audit trail.
Red Hat OpenShift Virtualisation
Why it’s become the go-to VMware exit for UK organisations
Broadcom’s acquisition of VMware has triggered price increases of up to 1,000% for UK organisations. AJ Thompson, CCO at Northdoor, explains why Red Hat OpenShift Virtualisation has emerged as the…[ ]
Quantum-safe encryption
Why the threat to your data is already here
Quantum computers will break today’s encryption. With harvest now, decrypt later attacks already underway, find out what quantum-safe encryption means for your organisation.
The Quantum Revolution
Discover how quantum computing is reshaping healthcare, finance and climate science and why organisations need to start preparing today.
The AI infrastructure spending surge: investment, risk and market reality
Microsoft and Oracle are investing billions in AI infrastructure. Here’s what that spending signals for investors, enterprise adoption, and cloud competition.
When does SQL Server 2016 support end?
Microsoft SQL Server 2016 support ends 14 July 2026. Learn migration timelines (2-12 months), three migration paths, and why starting in Q1 2025 matters for your organisation.
What is ransomware? Why backups no longer protect your data
Beyond the Backup: The new era of ransomware extortion and data theft.
Cloud computing costs in the UK: The soaring reality and how to regain control
Cloud spend is now the 2nd largest cost for UK IT firms, often hitting 12-18% of revenue. Discover why AI is driving 20%+ of bills and 5 actionable strategies UK CIOs are using to cut costs by 20-30%
Five IT trends that will define the UK SME market in 2026
Five UK SME IT trends for 2026, covering AI readiness, cyber security, cloud sovereignty, ESG reporting and DORA-driven compliance.
2026 Insurance Technology Predictions
Explore 2026 insurance industry predictions, from Blueprint Two delays to AI adoption, sanctions compliance, and cybersecurity. Learn how insurers can prepare for change
IT Security Predictions for 2026
Discover the top IT security predictions for 2026 from AI-first cyber defence and automated Zero Trust ecosystems to supply chain resilience and quantum-resistant encryption. Learn how regulations…[ ]
How data is learning to speak: The new era of conversational BI
We answer the most pressing questions about conversational BI, from implementation challenges to future trends. Discover how AI is transforming business intelligence and what leaders need to know.
Financial data breaches and AI security trends: 2025 industry analysis
Explore 2025’s financial data breach statistics and AI security risks. Learn proven strategies to strengthen cyber resilience in finance.
How the Cloudflare outage exposed hidden risks
Discover expert answers to the most common questions about the 2025 Cloudflare outage, hidden dependencies, and how to strengthen digital resilience for your busiess.
UK sanctions list update:
What businesses need to know before 28 January 2026
From 28 January 2026, the UK Sanctions List will replace the OFSI Consolidated List as the single source for sanctions data. Learn how Northdoor’s Sanctions Checker helps you stay compliant.
The UK's new cyber rules are coming: 5 surprising changes you can't ignore
Discover the UK’s new Cyber Security and Resilience Bill, its surprising changes, and how it impacts businesses. Learn about new responsibilities, stricter timelines, and significant penalties.
The real cost of IT Support for SMEs
Discover the real IT support costs SME businesses face beyond basic salaries. Our detailed analysis reveals hidden expenses, compares in-house vs outsourced options, and shows why most small…[ ]
IBM Expert Care: Premium IT Support
Discover how IBM Power and Storage Expert Care reduces downtime, boosts resilience, and protects mission-critical IT systems.
What happens after an attack?
Cyber breaches are inevitable. Learn why response not prevention, defines business survival.
IBM Multivendor Support Services: a smarter path for VMware and Oracle customers
Discover how IBM multivendor support services help reduce VMware and Oracle costs, avoid vendor lock-in, and future-proof IT infrastructure.
Passwordless authentication: reality vs hype
Discover the truth about passwordless authentication. Learn about the real vulnerabilities, fallback challenges and why passwords aren’t dead.
Rethinking Data Warehousing Webinar: strategies for modern businesses
Join our data warehousing webinar to discover practical strategies on how modern architectures improve agility, governance, and ROI.
Tesco’s £100M lawsuit exposes VMware licensing risks
Tesco’s £100M lawsuit over VMware licensing exposes major risks. Learn what it means for your business and how to protect your IT strategy.
Cloud hosting: essential questions answered for UK businesses
Explore expert answers to common cloud hosting questions from Northdoor’s Dominic Green. Learn about types, security, costs, and migration strategies for UK businesses.
Human factors in cyber security
Discover how human factors in cyber security and emotional decision-making impact your organisation’s vulnerability to attacks. Take our free phishing security test today.
Supply chain security risks drive data breach costs for UK in 2025
Supply chain breaches cost UK CISOs £241,620 more. Shadow AI accounts for 20% of breaches. Learn how to reduce data breach costs in 2025.
VMware vSphere End of Support: Key dates, risks and your options
VMware vSphere 7 support ends October 2025, vSphere 8 in October 2027. Prevent security risks & costs. Contact Northdoor for transition planning.
IT infrastructure modernisation: Expert Insights with Tom Richards
Tom Richards shares practical insights on overcoming today’s IT infrastructure modernisation challenges, covering legacy system updates, storage strategies, compliance, and hybrid IT environments.
Cyber insurance for SMBs
SMBs are a big market for cyber insurance sales, but underwriters need a clear view of risk to price accurately. Learn how.
Creating a robust cybersecurity business continuity plan
Discover how to integrate cybersecurity into your business continuity plan. Learn best practices, risk management strategies, and protect against cyber attacks. Expert guidance from Northdoor
Captcha scams: How to identify and protect yourself
Learn to defend captcha scams. Protect your personal data with expert cybersecurity tips on avoiding fake CAPTCHA attacks.
Protecting donor data: the triple threat facing UK Charities
UK charities face 924,000 cybercrimes annually. Learn how to protect donor data and strengthen security with limited resources.
Maximise your enterprise Linux with Red Hat
Discover How Red Hat Enterprise Linux can standardise your IT Environment, offering enterprise-grade support, security and cloud readiness.
Azure Security: Safeguarding your business data in the cloud
Discover how Azure security protects your business data in the cloud. Learn best practices for robust cloud security and data protection.
Maximising your hybrid cloud operations
Ensure your hybrid cloud delivers optimal performance with strategies to tackle integration challenges, manage costs, & maintain compliance.
Microsoft Azure: Enterprise-Grade Solutions for Every Business
Learn how Microsoft Azure makes enterprise-grade solutions accessible, scalable, and secure for businesses of all sizes.
Protecting highly regulated sectors from cybercrime
Discover the escalating cybercrime threat and challenges faced by regulated industries, and the proactive measures to fortify cyber security.
Quishing: The rising threat of QR Code phishing every CISO must address
Learn about Quishing, the emerging QR code phishing threat that’s alarming cybersecurity experts. Download the Quishing report.
10 practical steps to help organisations adopt AI
Discover 10 steps to adopt AI while safeguarding sensitive data. Learn safe implementation strategies, regulatory insight, and expert guidance
Latest Blog Articles
Subscribe to our newsletter
Subscribe to our newsletter to get the very latest insights and updates in the world of enterprise IT and data security: