Skip to content

David Pape

AI Helps With Vulnerability Detection AND Exploitation – Why Patching Remains Vital

In this blog post, we address real cases of vulnerability discovery with AI but also how these very same tools get exploited by threat actors to expedite cyber attacks.

Azure UK South Region Capacity: What You Need to Know and How to Prepare

The Azure UK South region capacity constraints are impacting cloud deployments across the region—understanding the challenges and implementing proactive strategies can keep your..

Business Email Compromise (BEC) and Deepfakes: Protecting Approvals and Payments With Microsoft Controls

In this blog post, we’ll provide you with practical guidance on Microsoft-specific controls to protect approvals and payments in Microsoft 365 to protect you from your next..

Disaster Recovery Failures: Top 10 Causes and Fixes

In this post, we're addressing the ten most common reasons disaster recovery fails during an incident, including practical fixes you can implement without turning your..

Cloud Migration Assessment: What To Measure Before You Move Anything

In this post, we'll look at the eight things that decide whether migration is smooth or painfully expensive.

Lessons from the Birmingham City Council Oracle Debacle

In this article, we reflect on the chaos and ballooning costs that ensued after Birmingham City Council embarked on its cloud journey with Oracle.

AI Phishing in 2026: Why Microsoft 365 Users Are Still Getting Caught (and What To Monitor)

AI has made phishing faster, more convincing, and harder to spot. This guide shows what to monitor in Microsoft 365 and Entra ID, so you can detect account takeovers early, spot..