Experts from Australia and the UK foresee major shifts in technology adoption and cyber security strategies by 2026, driven by increasing threats, energy constraints, and the complexity of AI-driven environments. Senior executives from Pure Storage and Fujitsu emphasize that resilience and data management will be pivotal in business and infrastructure decisions in the coming year.
Patrick Smith, Field CTO EMEA at Pure Storage, noted a staggering increase in high-profile cyberattacks over the past year, both in volume and their crippling effects on major businesses. He argues that the outdated notion of treating cyber resilience as a standalone issue, relying on a single vendor for protection, is becoming obsolete. Organizations are increasingly recognizing the need for an interconnected framework that encompasses multiple security options. Such a strategy can help mitigate risks and enable quicker recovery from attacks, underscoring the importance of integrated systems in combating ongoing threats.
Smith also highlighted the impact of energy availability on data centre projects, particularly in the UK. He pointed out that while energy efficiency has slipped down the political agenda, it remains a significant concern for many. He predicts three key trends: energy availability will dictate the construction of new data centres, with geographic location increasingly determined by access to energy. Moreover, the co-location of energy generation with data centres may become essential to avoid dependence on under-resourced grids. Smith also advocates for updating industry standards in measuring data storage efficiency, proposing the introduction of Terabytes per Watt (TBe/W) as a relevant benchmark to improve energy security and alleviate pressure on infrastructures.
Turning to artificial intelligence, Fred Lherault, Field CTO EMEA/METCA at Pure Storage, remarked on the shift in focus from AI training to inference. He stated that organizations lacking a robust inference platform risk failure as AI workloads become integral to production workflows. Ensuring that infrastructure is capable of providing fast access, high availability, and robust security will be crucial to combat inefficiencies and maximize resource utilization. However, he cautioned that many organizations still face challenges related to data readiness for AI, which can delay results and hinder project evaluation.
Concerns over data sovereignty and security are prompting organizations to reevaluate their cloud strategies. Lherault emphasized that understanding the location of critical data is vital for maintaining trust and ensuring access amid rising geopolitical tensions and regulatory pressures. As governments seek to mitigate risks associated with data access, businesses must also prepare for potential vulnerabilities.
In Australia, Daniel Broad, Head of Managed Security Operations at Fujitsu, echoed concerns over data breaches, noting that over 500 incidents were reported in the first half of 2025. He attributed this to a rise in the adoption of SaaS, AI, and cloud-native services, which often lead to a lack of visibility regarding data locations. By 2026, such blind spots could pose significant risks, particularly with stricter enforcement of the Security of Critical Infrastructure (SOCI) Act, which will compel organizations to demonstrate effective data management practices.
Broad warned of the increasing vulnerability of physical assets due to digital threats, as industries become more interconnected. He stressed the importance of a unified security strategy, which would require organizations to maintain real-time visibility across their entire environment. The convergence of information technology and operational technology will emerge as a defining security challenge in 2026, where breaches could disrupt critical systems and erode public trust.
Additionally, Broad pointed to the emergence of “digital ghosts,” referring to lingering digital identities of former employees, which could be exploited by attackers. As HR and IT systems become more automated, the presence of orphaned accounts poses a rising threat, especially in large organizations with high turnover rates. By 2026, addressing these “digital dead” accounts will be a critical component of security efforts.
Furthermore, Broad highlighted the potential rise of “shadow AI” ecosystems, where employees may adopt unapproved AI tools, connecting them to internal systems without oversight. This scenario poses significant internal risks, as sensitive data could be stored on unmanaged platforms leading to unmonitored decisions. As these shadow systems become embedded in operations, remediation may prove complex and disruptive.
As organizations navigate the rapidly evolving technological landscape, the integration of security measures, energy efficiency, and effective data management will be crucial. The trends emerging from these discussions not only underscore the challenges ahead but also highlight the necessity for proactive strategies to ensure resilience in an increasingly interconnected world.
Fujitsu | Pure Storage | UK Government | AWS | IBM
OpenAI and Apollo Research Reveal Alarming Signs of “Scheming” in AI Models
Google’s Gemini 3 Surpasses ChatGPT, Reclaims AI Leadership with $112B in Cash Reserves
ChatGPT at 3: Transforming Work, Education, and Healthcare for 800M Users Globally
Getty Images’ Copyright Case Against Stability AI Leaves Key Legal Questions Unresolved
Boost Employee Engagement: How AI-Driven Benefits Platforms Transform Utilization Rates





















































