| ← back to comparethecloud.net | | Compare the Cloud · Morning Edition | Sunday, 17 May 2026 · London |
Morning Edition.Ten curated stories, worldwide perspectives, before 9 a.m. | | 01 — The Enterprise Risk Nobody Is Modelling: AI Is Replacing the Very Experts It ... | 01 | | 02 — Microsoft Teams Is Finally Fixing Its Most Annoying File Preview Problem | 02 | | 03 — Enterprise Browser Extensions Are an Uncontrolled Attack Surface — Most IT Po... | 03 | | 04 — Ransomware Recovery Takes 24 Days on Average — and the Number Is Still Rising | 04 | | 05 — Apple Begins Rolling Out End-to-End Encrypted RCS Messaging Between iOS and A... | 05 | | 06 — Claude + MCP: Why Every App Using AI Assistants Is Getting It Wrong | 06 | | 07 — They Know You're Using a VPN — Enterprise Operations in Restricted Marke... | 07 | | 08 — European Commission Approves €500M Luxembourg State Aid Scheme for Cleantech ... | 08 | | 09 — Your Next Laptop's RAM May Not Even Look Like RAM — Here's Why LPCA... | 09 | | 10 — My Wi-Fi Network Has More Than One Name — Here's Why Yours Should Too | 10 |
| CTC Newsroom The Enterprise Risk Nobody Is Modelling: AI Is Replacing the Very Experts It Needs to Learn FromAs AI systems take over knowledge-work roles, the domain experts whose judgement trained and validated those models are being made redundant — removing the very feedback loop enterprises need to catch model drift before it becomes operational failure. | Every CTO I've spoken to this year is chasing AI ROI by cutting the exact people whose domain expertise validated the AI's outputs. That's not a future risk — it's an active feedback loop toward operational failure. The governance answer is simple: if you're replacing a human with AI, someone still needs to own error detection for that domain. Build that role in before you cut the headcount, not after the first incident. Kate Bennett · CEO, Compare the Cloud |
| Microsoft Teams Is Finally Fixing Its Most Annoying File Preview ProblemTeams will soon open shared files inline rather than bouncing users to a browser tab or prompting a download — a small UX fix with outsized impact on collaboration workflows in enterprise environments that rely on the platform for document co-editing. | This is exactly the kind of friction that drives shadow IT. When the official tool makes something harder than it should be, people find workarounds — a shared Google Doc here, a WhatsApp forward there — and before long your data governance story has holes in it. Microsoft fixing file preview sounds minor until you realise how many off-channel workarounds it eliminates. Kate Bennett · CEO, Compare the Cloud |
| · · · Enterprise Browser Extensions Are an Uncontrolled Attack Surface — Most IT Policies Don't Cover ThemThe average enterprise employee has seventeen browser extensions installed — most unvetted by IT, many granted access to credentials, clipboard data, and the full page DOM of every site visited, including internal tools and SaaS platforms. | Browser extension governance is one of those controls that sounds trivial until someone explains that a random productivity tool your finance team installed two years ago now has read access to every page they visit, including the CFO's banking portal. Allowlisting via managed browser policy is a one-day project. Put it in the next sprint if it's not already done. Kate Bennett · CEO, Compare the Cloud |
| Ransomware Recovery Takes 24 Days on Average — and the Number Is Still Rising| 24 days is the average. If you're in financial services, healthcare, or manufacturing, your regulator will not accept 'we were hit by ransomware' as an explanation for 24 days of disruption. Review your BCP's recovery time objective right now, map it against your actual backup architecture, and if there's a gap — close it before a ransomware operator finds it for you. Kate Bennett · CEO, Compare the Cloud |
| Alert Apple Begins Rolling Out End-to-End Encrypted RCS Messaging Between iOS and AndroidApple has pushed E2EE RCS to iOS 18.5 in its developer preview, enabling encrypted cross-platform messaging between iPhones and Android devices for the first time — a development that forces enterprise messaging policy teams to reassess their approved-channels list. | This is the moment compliance teams have been quietly dreading. E2EE RCS looks trustworthy on the surface, but enterprise messaging isn't just about encryption — it's about audit trails, data residency, and DLP controls that RCS doesn't provide. The risk isn't that employees will misuse it; it's that they'll assume 'encrypted = approved' and start using it for sensitive conversations before policy is updated. Get ahead of it with a clear, updated communication. Kate Bennett · CEO, Compare the Cloud |
| $ ai deployment Claude + MCP: Why Every App Using AI Assistants Is Getting It WrongModel Context Protocol is quietly becoming the connective tissue of enterprise AI deployment — but most implementations bolt it on as a feature rather than treating it as an architectural decision, producing fragile integrations that break when models update. | MCP is genuinely transformative for enterprise AI — it's what makes AI assistants feel like they actually know your business rather than just your prompt. But 'we added MCP' is not an architecture. I'm seeing too many deployments where a connector works brilliantly in demo and then silently regresses three weeks later when the model rolls over. Version your connectors, test on model updates, and treat integration failures as production incidents. The bar for AI infrastructure is the same as any other infrastructure. Kate Bennett · CEO, Compare the Cloud |
| They Know You're Using a VPN — Enterprise Operations in Restricted Markets, ReassessedDeep-packet inspection, IP-reputation databases, and traffic-timing fingerprinting have matured to the point where VPN use is reliably detectable in most restricted markets — a reality that changes the risk calculus for enterprise teams operating across jurisdictions. | This is a corporate travel and ops risk that most security teams have not updated their briefings on since 2018. The detection landscape is categorically different now. If your company has employees operating in markets where VPN use carries legal or operational risk, the question is not whether your VPN is 'good enough' — it's whether you've briefed travellers honestly on the current detection reality and provided appropriate tooling. This belongs in your travel security policy review this quarter. Kate Bennett · CEO, Compare the Cloud |
| Liberté, égalité, sovereignty. European Commission Approves €500M Luxembourg State Aid Scheme for Cleantech ManufacturingThe European Commission has cleared Luxembourg's €500 million state aid scheme to accelerate cleantech manufacturing investment, adding to a growing pattern of member-state interventions designed to close the competitiveness gap with US Inflation Reduction Act incentives. | European industrial policy is fragmenting in a way that creates genuine complexity for multinationals. You now need to map subsidy availability across member states, understand eligibility conditions that vary significantly, and time applications to procurement decisions. This is exactly where good advisory work earns its fee — not in knowing the schemes exist, but in knowing which one applies to your specific technology, scale, and timeline. Kate Bennett · CEO, Compare the Cloud |
| | / / / / / / / / / / / / / / / / / / / / |
Zero-day Your Next Laptop's RAM May Not Even Look Like RAM — Here's Why LPCAMM2 MattersLPCAMM2 — Low Power Compression Attached Memory Module 2 — brings user-upgradeable RAM back to thin-and-light laptops, reversing a decade of soldered-only designs and giving enterprise device procurement teams a new longevity variable to factor into fleet refresh cycles. | Soldered RAM was the right engineering trade-off when thinness was the primary enterprise laptop value proposition. That calculus has changed: sustainability targets, supply chain pressure, and longer refresh cycles all point toward repairability. LPCAMM2 is worth adding to your next hardware procurement spec — not as a mandate, but as a 'prefer if available' criterion that will pay back in reduced replacement costs over a three-year fleet. Kate Bennett · CEO, Compare the Cloud |
| My Wi-Fi Network Has More Than One Name — Here's Why Yours Should TooSeparating corporate and guest Wi-Fi into distinct SSIDs with independent VLAN segmentation is a basic network hygiene practice that many SME and mid-market enterprises still skip — leaving IoT devices, guest traffic, and corporate data on the same broadcast domain. | Article I. Read the clause as you would a court ruling: the practical effect starts on publication, not the day the text was first circulated. |
| This one falls squarely into the 'embarrassingly fixable' category. Guest Wi-Fi that shares a VLAN with your corporate network is not a hard problem — it's an unfinished one. If you're responsible for a network where this hasn't been configured, this is your sign to schedule it this week. It's a one-afternoon task that removes an entire class of lateral-movement risk from your threat model. Kate Bennett · CEO, Compare the Cloud |
| That's the front page.Curated from the CTC Monitor worldwide feed — narrowed to the ten that matter before nine. Morning Edition · Compare the Cloud · Sunday, 17 May 2026 · London View on the web · Unsubscribe |
|