Blog
Why Identity Is Becoming The Security Perimeter
TL;DR Identity is becoming the primary control layer in cyber security Many SMEs no longer need traditional Active Directory environments Cloud-first organisations require centralised identity beyond legacy models Platforms like JumpCloud reflect a broader shift in...
Managed Cyber Security and Network Services UK and NZ
ITogether provides managed cyber security services and managed network services for organisations across the UK and New Zealand, helping them stay connected, protected, and operational in increasingly complex environments. We're often asked what this looks like in...
The Benefit of Cyber Essentials for Small Organisations
Small organisations often assume cyber risk is a problem for larger enterprises. Over the past 12 months, our work with organisations with fewer than 50 users across the UK and New Zealand suggests something very different. As you would expect, most organisations are...
Email Threat Protection: Defending Against AI Phishing Attacks
Despite the growth of AI, cloud platforms, and increasingly complex digital environments, one reality remains stubbornly consistent across the UK, Europe, and New Zealand. Email is still the most common entry point for cyber attacks. Phishing, credential harvesting,...
The Southland Data Centre: New Zealand’s First “AI Factory”
New Zealand is taking a significant step into the global AI infrastructure race. Hyperscaler Datagrid has received full resource consent to build a 280MW data centre in Southland, a facility that could become the country’s second-largest electricity user once...
Changes in April 2026 to Cyber Essentials
ITogether is proud to hold both Cyber Essentials and ISO 27001 certification – the world’s leading standard for information security. What is changing in April 2026 for Cyber Essentials ? As of 27 April, Cyber Essentials will be updated to the new "Danzell" question...
New Zealand’s National Cyber Security Strategy at a Turning Point
MediMap, Momentum, And The Missing Strategy: Why This Matters Now New Zealand is preparing to release a long-awaited national cyber security strategy after it effectively lapsed in 2023, while the country deals with a second high-profile health data breach in just two...
Kia Ora New Zealand
When New Zealand-based organisations ask us what value ITogether brings to the table, we often start by sharing our experience working in the United Kingdom where ITogether was originally started back 2005. While every region has its own challenges and pace, the UK...
AI in Secure Coding
One conversation we are now hearing regularly across the UK, Europe, and New Zealand is no longer theoretical. It is happening inside engineering teams today. A developer we spoke with recently generated roughly three months of work for four people, produced around...
AI Governance Risks: Understanding the Rise of Agentic Identity
There’s a shift underway. AI is no longer just generating content or assisting with analysis. It is making decisions, triggering workflows, calling APIs, and accessing sensitive systems. As Check Point’s recent acquisition (13 Feb 2026), Cyata’s founders put it, this...
Cyber Insurance: The Hard Truth
One question we’re asked on a weekly basis: Is Cyber Insurance actually worth it? The short answer is yes. The long answer depends on how your organisation views and measures cyber risk, what maturity looks like in your region, and what you expect cyber insurance to...
Join our AI and Application Security Webinar
Tuesday 3 February 2026 | 1pm - 2pm GMT REGISTER HERE AI is now embedded into applications, workflows, and decision-making paths. APIs are the connective tissue making this possible, but security models are not keeping pace. Across the UK, Europe, and New Zealand, we...
Scaling Cybersecurity in New Zealand
New Zealand already has several strengths when it comes to cyber security. From our perspective, regulation is generally pragmatic, public and private sectors collaborate well and many organisations carry less legacy technical debt than their overseas peers. These are...
Put your Logo in the Inbox: BIMI for CISOs
Most organisations spend heavily on cybersecurity awareness training and email filtering, yet still leave one weak spot wide open: the domain. If attackers can imitate your brand, they can phish customers, staff, and suppliers with frightening success. That’s where...
Check Point Harmony Email & Collaboration recognised as a Leader in the Gartner Magic Quadrant
Check Point has been positioned in the leader’s quadrant of the Gartner Magic Quadrant for Email Security (Q4 2025). It is a notable milestone in a crowded and highly competitive email security market. At ITogether, we work with over 50 cybersecurity vendors and...
ITogether Wrapped!
Here's an end-of-year wrap-up of some of the Network & Cyber Security services ITogether delivers, day in, day out across the UK, Europe and New Zealand! Agentic AI Secure enablement of autonomous AI agents. Focus on governance, risk management, data protection,...
Akamai’s State of the Internet Report 2025
We always look forward to Akamai’s State of the Internet report... This year’s research lands at exactly the right moment. The threat landscape is accelerating. Attackers are better funded, better automated, and increasingly powered by artificial intelligence in cyber...
How do I easily manage my domain’s SPF, DKIM and DMARC?
(And Why Should I Care About These if my Email is Already Working ?) The National Cyber Security Centre (NCSC) has updated its email security guidance, and many organisations are now reviewing their use of hosted DMARC services such as Valimail. A key concern is...


















