Modern chief information security officers (CISOs) face a threat landscape defined by distributed systems, volatile supply chains, and expanding attack surfaces. Platform consolidation is often used to reduce complexity, yet only architectures with deep integration across data, control, and identity planes achieve the intended security benefits. This makes the integration layer a dominant source of enterprise risk.
While unified security platforms promise simplicity, attackers are increasingly bypassing core systems and exploiting the connections between them: API links, OAuth tokens, third‑party apps, and automation workflows. These integrations quietly expand the enterprise trust boundary and introduce new single points of failure. Over‑privileged tokens, undocumented workflows, vulnerable open/closed source components, and fragmented ownership make it possible for attackers to authenticate themselves through trusted integrations rather than breach the platform directly.
All this means that this integrated layer, not the platform itself, is the new enterprise perimeter, meaning CISOs must govern delegated trust with the same rigour as they do for core systems. When converging multiple solutions they must mitigate the inherent security risks that come with single‑point‑of‑failure systems through architectural redundancy and modularity and ensure true integration.
Demand evidence of true integration, not integration theatre
There are several factors that distinguish a true platform from integration theatre. Scrutinising these will show where vendors are using marketing to obscure a lack of genuine integration:
Data: A platform should decouple the data plane from the control plane. At the data layer, it should allow for a single data lake that all security logs feed into and all solutions read from simultaneously. Aggregated data can then be correlated to deliver full visibility across systems and detect sophisticated multi‑stage attacks instead of having multiple databases connected via APIs and sync actions.
Policy orchestration: Policies should be written once, be consistent and propagated across the stack, from endpoints and email to firewalls and intrusion detection systems (IDS), without the need to deploy them through different user interfaces (UIs).
Identity and authorisation: All platform components should integrate through a common identity broker, using a central policy orchestrator to enforce both Role‑Based and Attribute‑Based Access Control consistently across the environment. Multiple logins, inconsistent roles, or fragmented identity experiences are strong indicators of integration theatre rather than true unification.
Interoperability: Integration theatre provides a collection of black boxes with no meaningful influence on each other. Unified solutions, on the other hand, work together and do not just coexist. They use telemetry to provide context and build a complete attack‑path picture, offering seamless connectivity to edge devices and third parties, such as Microsoft Defender’s 57 API connectors or Cisco’s 100+ third‑party integrations.
Architect for resilience, not dependency
Vendor consolidation can simplify environments but also create monocultures and single points of failure. To avoid over‑reliance on any one platform, organisations should adopt a cyber security mesh architecture. This is a central policy source with distributed enforcement across global locations, ensuring that critical controls remain functional even if the core platform fails. Pairing the platform with best‑of‑breed niche tools preserves flexibility and reduces vendor lock‑in. The Q3 2025 Forrester Zero Trust Landscape reinforces the view that zero-trust has to be an overall strategy, not a single product. This can then build higher resilience, greater architectural flexibility, and a reduced likelihood that systemic platform failure will lead to business disruption.
Govern the integration layer as a first-class asset
With integrations now acting as primary vectors of delegated trust, organisations must treat them with the same scrutiny as they would for any core security asset. This requires continuously inventorying all integrations, enforcing least‑privilege API scopes, mandating short‑lived and automatically rotated credentials, and applying real‑time anomaly detection to API behaviour. Threat modelling must precede deployment, and integration risk must be embedded into third‑party governance frameworks.
When exposure is high, organisations should rapidly map critical integrations, assess token lifetimes and privilege levels, and execute targeted remediation such as rotation, down‑scoping, monitoring, or removal. They should create a tightly controlled blast radius, a hardened identity perimeter, and a measurable reduction in delegated trust risk as these are the very factors attackers increasingly exploit.
Organisations that succeed will be those that govern the integration layer with the same discipline as the platforms themselves. That means CISOs must look beyond vendor claims and examine how data, identity, and policy truly operate. Authentic platforms share telemetry, policy engines, and a unified identity layer, while theatrical ones rely on brittle connectors.
But they need to recognise that even the strongest platform reshapes risk rather than removing it. To prevent the platform becoming a single point of failure, organisations must pair consolidation with disciplined governance of delegated trust, continuous integration‑layer risk assessment, and architectural safeguards such as mesh‑based enforcement and distributed control planes. The strongest strategy blends unified efficiencies with the resilience and scrutiny required to withstand inevitable failures.
Joe Mayhew and Ahmed Tikail are cyber security experts at PA Consulting
When I started hiking, big leather boots were the only real option. They were burly, stiff, and difficult to break in, but one pair would last you decades. Technology has mercifully caught up, however. If you head to the trails today, most hikers and backpackers are opting for more lightweight, low-cut options. While an influx of new shoes from brands like Hoka, Merrell, Danner, and Salomon has transformed the footwear industry, that doesn’t mean the hiking boot has had its day. It just depends on what you’re looking to do and when you’re doing it.
Which shoes should you pick to go out for the day? I tested countless pairs of great hiking boots, trail runners, and hiking shoes across a variety of terrain, from forest trails and coastal paths to high alpine terrain. To get a better understanding of the differences between the many options available—and which is right for you—I grilled Ingrid Johnson, a leading footwear product specialist at REI. (For what it’s worth, Johnson’s personal recommendation is the Salomon XA Pro).
Update March 2026: We added links to recent coverage, added the On Running Cloudrock Low, and updated links and prices.
Jump to Section
Here’s When You Need Boots
If you’re carrying a heavy pack over rough terrain, or if it’s wet or snowy, you need hiking boots. They tend to be higher at the ankle, with stiff midsoles and protective toe caps, and they are generally made from very durable materials like leather and tough synthetic fabrics like Cordura. Hiking boots prioritize stability, protection, and durability.
Boots generally have thick, deep lugs, tougher soles, stronger toe guards, and sturdier ankle support. They protect you from rock impact, uneven ground, moisture, and often colder conditions. The high-cut designs also offer more ankle support, something I found reassuring when coming back from a recent injury.
But don’t think that hiking boot brands are stuck in the dark ages. Borrowing lightweight features and materials from trail running, brands are able to offer technical boots with cushioning, grip, and stability. They’re still heavy, but featherweight compared to a traditional leather boot. Hoka’s Kaha 3 GTX ($240) is one of the best boots available, blending soft nubuck leather, Vibram Megagrip sole, and bags of cushioning. Here are a few other picks:
Perennially popular for good reason, these Salomons boast superb levels of comfort and support without the bulk typically associated with traditional walking boots. They feel like ski boots, but that’s not a criticism; the height and support is most welcome when walking all day carrying a full pack.
Despite being declared the third-hottest year on record, 2025 was a relatively quiet year for climate disasters in the US. No major hurricanes made landfall, while the total number of acres burned in wildfires last year—a way of measuring the intensity of wildfire season—fell below the 10-year average.
But starting this week, the West is experiencing what looks to be a record-breaking heat wave, while forecasting models predict that a strong El Niño event is likely to emerge later this year. These two unrelated phenomena could set the stage for a long stretch of unpredictable and extreme weather reaching into next year, compounding the effects of a climate that’s getting hotter and hotter thanks to human activity.
First, there’s the heat. Beginning this week and heading into next, a massive ridge of high-pressure air will bring record-breaking temperatures to the American West. The National Weather Service predicts that temperature records across multiple states are set to be broken in dozens of locations, stretching as far east as Missouri and Tennessee. The NWS has issued heat warnings for parts of California, Arizona, and Nevada, as well as fire warnings for parts of Wyoming, Nebraska, South Dakota, and Colorado.
“This will be the single strongest ridge we’ve observed outside of summer in any month,” says Daniel Swain, a climate scientist at the University of California Agriculture and Natural Resources.
The other remarkable thing about this heat wave, Swain says, is just how long it’s going to last. “This is not a day or two of extreme heat,” he says. “We’ve already in some of these places been seeing record highs every day for a week, and we expect to see them every day for another at least seven to 10 days.” The later end of March will be much more intense, with temperatures in some places breaking April and May records. “There aren’t that many weather patterns that can result in an 85- or 90-degree temperature in San Francisco, Salt Lake City, and Denver in the same week.”
This late winter heat wave is adding on to an already warm winter in the West—with big implications for the summer. A month ago, snowpack levels across multiple states were at record lows thanks to warmer-than-average temperatures. According to data provided by the Department of Agriculture, snowpack levels were still sitting below 50 percent of average across many Western states. Snowpack is a critical natural reservoir for rivers in the West; between 60 to 70 percent of the region’s water supply in many areas comes from melting snow. Low snowpack is a bad sign for already-stressed rivers like the Colorado, which supplies water for 40 million people in seven states.
The ongoing heat wave, Swain says, will more than likely make conditions even worse. “April 1st is typically the point at which snowpack would be, at least historically, at its peak,” he says. Even if temperatures cool off until summer, these low snowpack levels are also a worrisome sign for the upcoming fire season. Snow droughts like the one the West is experiencing can dry out soil, kill trees, and lessen stream flow: ideal conditions for a wildfire to grow. Meanwhile, the water supply in the Colorado River could drop even lower. States that rely on the river are already facing a political crisis as they attempt to renegotiate water rights; a drought would only up the ante.
Then there’s El Niño. Last week, the National Weather Service announced that there was more than a 60 percent chance of an El Niño event emerging in August or September. Various weather models suggest that this El Niño could be particularly strong. While we likely won’t know for sure until summer, “the fact that [all the models] are moving upwards is worth watching,” says Zeke Hausfather, a research scientist at Berkeley Earth.
The UK government recently unveiled its UK fusion strategy 2026, which includes £125m of funding to develop the artificial intelligence (AI) growth zone at Culham, Oxfordshire. This includes a £45m investment in “Sunrise”, the new fusion-dedicated supercomputer.
One area in which Sunrise will be used is accelerating simulation, surrogates and design, where AI could simplify simulations or learn the behaviour of complex systems such as plasmas to speed up simulations that previously took weeks or months to run.
It will also be used for data management, making the UK Atomic Energy Authority’s (UKAEA) fusion research and experimental data consistent, accessible and electronically readable. In addition, Sunrise offers the UKAEA – an executive non-departmental public body, sponsored by the Department for Energy Security and Net Zero – the ability to enhance experimental operations and control in real-time diagnostics, where AI can be trained to spot anomalies and flag issues.
The role of high-performance computing (HPC) AI acceleration hardware within the government’s strategy for nuclear fusion is to prepare fusion data for AI applications to ensure that researchers from small and medium-sized enterprises (SMEs) and academic institutions can access data, supporting greater collaboration and engagement with industry partners.
The 6.76 exaflops Sunrise AI supercomputer involves a collaboration between AMD, DESNZ, the Department for Science, Innovation and Technology (DSIT), Dell Technologies, Intel, UKAEA, the University of Cambridge, and Weka, a data platform provider.
Looking at its headline performance data, Rob Akers, UKAEA’s director for computing programmes, says: “It’s very challenging to define how powerful a piece of hardware like Sunrise is, because it depends on your metric for success.”
Sunrise offers the full spectrum of floating point precisions, from 8-bit right the way up to 64-bit precision, but, as Akers points out, each one of those targets a different part of the problem. “The important thing for us is that we can’t forego 64-bit precision, because that’s what’s going to feed the artificial intelligence algorithms that we’ll be applying when using Sunrise as an engineering tool,” he says.
“Sunrise is not just a very powerful laptop – it is a very complex piece of machinery that we’ll be putting to the task of solving a very large set of complex problems”
Rob Akers, UKAEA
AI makes it possible to collapse high-fidelity models that need very high bit precision down into what UKAEA calls “surrogate” models, according to Akers, who adds that these surrogates can run on a workstation or a laptop in a tiny fraction of the time it would take the big solvers running on large supercomputers.
“It’s almost like an instrument for discovery,” he adds. “Sunrise is not like a laptop. It’s not just a very powerful laptop – it is a very complex piece of machinery that we’ll be putting to the task of solving a very large set of complex problems.”
One of the interesting numbers that pop up in the specification for Sunrise is the figure for 8-bit precision, especially given that 8-bit computing harks back to the era of the home computer some 50 years ago.
“The interesting thing is that 8-bit precision has become an incredibly powerful part of the computing landscape now because of large language models [LLMs],” says Akers.
Running LLMs is in the UKAEA’s plans. “We are going to be doing work in that space, building very bespoke models that will ingest text document archives that have been collected over many, many decades, and turning that into useful information and knowledge,” he says.
Digital twins
Akers says this information will be put together with the Mega Amp Spherical Tokamak (MAST) experimental data run at Culham. “Working out how to achieve this needs the full spectrum of precision,” he says.
Although 8-bit precision is the domain of the LLMs that need to process tokens as quickly as possible to understand volumes of textural information, Akers says 64-bit precision is the realm of high-fidelity simulation, which needs to achieve a high degree of accuracy. “Because of the way we run models forward in time, we can’t allow them to drift. They need to preserve certain physical quantities to ensure the simulations are meaningful,” he says.
Sunrise will allow us to take on a moonshot-like problem, a lot more cost-effectively, to reduce risk and accelerate the time to deliver commercial fusion Rob Akers, UKAEA
So, while floating point precision is regarded as a metric for comparisons against other AI machines, for Akers, it is not necessarily the best metric to measure the outright performance of an AI scientific machine. What is needed, he says, is “the ability to simulate very high-fidelity, strongly coupled models”.
This is due to the sheer complexity of a machine that aims to mimic the way the sun generates its power. “In a nuclear fusion power plant, there are lots of different physical mechanisms that couple the plant together – everything from structural forces due to gravity, but also due to electromagnetism. Then there’s the heat flow and radiation flow across the system. Everything’s coupled together,” says Akers.
Historically, UKAEA has not been able to simulate this environment at scale. “What we worry about is the black swans or emergent behaviour that is a result of that coupling,” he adds.
Akers says digital twins running on Sunrise will be able to model these very complex systems, which can then be compared with the results of experiments. “We are able to tune up our ability to step forward in time or step outside where we’ve been before, or indeed to create new pieces of machinery that we’ve never seen before, and take a giant leap where we have confidence in having nailed down the known unknowns into the simulations,” he says.
“Test-based design is expensive, and it’s slow,” Akers adds. The goal is to use Sunrise to reduce the amount of test-based design that UKAEA has to do. “It will allow us to take on a moonshot-like problem, a lot more cost-effectively, to reduce risk and accelerate the time to deliver commercial fusion.”