Continent 8 Technologies, a leading provider of cutting-edge managed IT solutions designed for the global iGaming and online sports betting industry, has entered into a strategic partnership with New Dawn Risk, a specialist Lloyd’s broker.
This collaboration brings together Continent 8’s cybersecurity services with New Dawn Risk’s insurance expertise to offer iGaming businesses a coordinated approach to risk management. Operators benefit from both enhanced security protection and reduced insurance premiums, with underwriters offering discounts based on the security maturity and controls in place.
“This partnership represents a significant step forward in how we support our clients,” said Elizabeth Grima, Senior Executive Manager, New Dawn Risk. “By combining Continent 8’s trusted cybersecurity services with our tailored insurance solutions, we are offering iGaming companies a truly end-to-end risk management package. It goes beyond traditional broking – it’s about delivering resilience, continuity, and peace of mind in a sector where cyber threats and regulatory pressures are constantly evolving.”

The new offering will initially launch in the UK and Europe, with plans to expand globally. It combines specialist cybersecurity services with tailored insurance to make protection more accessible to iGaming companies. Services include Managed SOC & MDR, Cyber Threat Intelligence Exchange, DDoS protection, Web Application and API Protection (WAAP), and Multi‑Factor Authentication (MFA) for end users. Businesses adopting the package will benefit from discounted premiums, which increases their access to cost effective coverage.
“We are excited to partner with New Dawn Risk,” said Patrick Gardner, Chief Security Officer at Continent 8 Technologies. “This collaboration brings together two specialists in their fields to offer a compelling mix of advanced cybersecurity controls and tailored insurance solutions for the iGaming industry. Strong cyber defences not only protect operators and suppliers but also demonstrate sound risk management – an increasingly important factor when it comes to reducing insurance premiums. As the go-to cybersecurity provider to the industry, we’ve been delivering multi-layered protection solutions to high-risk gaming businesses for years, and this partnership builds on that proven foundation.”

Blueprint Gaming is a leading UK-based game studio and part of Germany’s Gauselmann Group. The company develops innovative slot games for the global online and mobile markets, with titles also available across more than 100,000 land-based gaming terminals in the UK, Germany, and Italy.
Blueprint Gaming had been using an incumbent SIEM tool that offered technology but not the expertise and operational support of a fully managed SOC.
As a lean infrastructure team operating in a high-risk, data-intensive industry, Blueprint needed:
Without additional specialist resources, maintaining a proactive security posture was becoming increasingly challenging.
Blueprint selected Continent 8’s Managed Security Operations Centre (MSOC) — a complete, fully managed security service integrating an advanced SIEM platform operated by Continent 8’s cybersecurity specialists.
Key capabilities delivered included:
This combination of technology, people, and process provided the 24/7 monitoring and threat response Blueprint required – without increasing internal workload.

Continent 8 delivered a robust managed security solution combining a leading technology stack with expert cybersecurity professionals who operate and manage the environment on Blueprint’s behalf.
Outcomes included:
Adam Shepherd, Head of Infrastructure at Blueprint
“We’re a small team that manages huge volumes of data in a high-risk industry. Managing that effectively – without compromising security – was a real challenge for us. That’s where Continent 8 stepped in, providing a managed SOC service with a strong focus on the threat landscape. They’ve enabled quicker responses to threats and equipped us with simplified dashboards. Working with the team has been a real pleasure.”
Patrick Gardner, Chief Security Officer at Continent 8
“Blueprint required strong security oversight without adding operational burden to a lean internal team. Our Managed SOC service was designed to deliver exactly that – improving visibility, accelerating threat detection, and optimising log volumes while maintaining a robust security posture. The result is a scalable, cost-efficient security capability aligned to the realities of a high-risk, data-intensive environment.”
Click to download the PDF version
Cybersecurity regulation in Europe is evolving rapidly, and iGaming businesses must prepare now for two major incoming frameworks: the NIS2 Directive and the EU cyber resilience act (CRA). These regulations introduce stricter security obligations, tighter reporting deadlines and heightened accountability across the iGaming ecosystem.

In our recent webinar, “iGaming’s new cybersecurity rules”, Oliver Crofton (Regional Sales Director – Cybersecurity at Continent 8 Technologies) hosted an in‑depth discussion with Craig Lusher (Principal Solutions Architect EMEA at Continent 8 Technologies) and Jo Joyce (Partner and Head of Regulatory, IP & Digital at Taylor Wessing Ireland). Together, they provided clarity on the regulatory landscape and outlined what operators, suppliers and technology partners must do to stay ahead.
Here’s a breakdown of the key takeaways.
The iGaming industry operates in a high‑risk digital environment. Real-time financial transactions, complex technology stacks, and large volumes of sensitive personal data (including government-issued identity documents attached to financial information) make it a prime target for attackers. As cyber threats grow more sophisticated, regulators are raising the bar to ensure resilience.
NIS2 and the CRA aim to:
For iGaming, where uptime, trust and compliance underpin commercial success, these changes are significant.
NIS2 is fully live and enforcement has begun. This is no longer about preparation; the question is whether your organisation is compliant right now.
According to Craig and Jo, NIS2 represents a major overhaul of Europe’s cybersecurity framework. It replaces the original NIS Directive (2016), which was fragmented, voluntary in practice, and allowed each country to implement it differently.
Key updates include:

Whilst NIS2 focuses on how organisations manage security, the CRA concentrates on the digital products those organisations depend on and produce.
CRA reporting obligations begin on 11 September 2026. From that date, manufacturers must report actively exploited vulnerabilities and severe incidents affecting the security of their products, following the same 24-hour early warning, 72-hour notification structure. For vulnerabilities, the final report must be submitted within 14 days of a corrective measure becoming available. Full product standards, including CE-marking requirements for software and connected devices, come into force in December 2027.

Jo highlighted that the CRA requires manufacturers and developers of digital tools – including gaming software, APIs, hardware and integrated systems – to
Given the heavy reliance on third‑party tech in iGaming, this places strong emphasis on vendor due diligence and supply‑chain oversight.
Jo: “I think one of the things that I’ve spotted is quite a lot of operators and firms within the iGaming ecosystem haven’t really necessarily accepted that they’re in scope.”
If your organisation provides or supports any of the following, NIS2 likely applies:
There are two additional points worth flagging. First, white-label and B2B providers are often managed service providers (MSPs) without realising it. If you run a player account management (PAM) system for 20 other brands, you are managing their core services, which, by definition, makes you an MSP. Under NIS2, MSPs are designated as essential entities, meaning they face ex ante supervision (proactive inspections and audits at any time), the same regulatory tier as a data centre or cloud provider.
Second, there is no “group privilege” under NIS2. If an internal IT arm provides services to the wider corporate group, it may be classified independently as an essential entity in its own right. Being part of a larger group does not shield individual subsidiaries or divisions from independent classification.
A readiness assessment is the essential first step.
Craig emphasised how the threat landscape facing iGaming businesses has intensified – including a 400% surge in cyber attacks targeting the gambling industry. This is not a gradual trend; attackers have industrialised their approach.

Operators and suppliers now face:
The interconnected nature of the sector amplifies the impact of any single vulnerability.
The cost of downtime in the industry now exceeds $6,000 per minute, and attacks are more visible in the news than ever, and recent breaches have seen hundreds of thousands of user profiles and identity documents exposed through relatively basic misconfigurations.
Craig highlighted several country‑specific differences in how NIS2 is being implemented, here are a few examples:
Malta moved faster than most EU member states, issuing Legal Notice 71 of 2025, with the CIPD as the ‘competent authority’. Self‑registration was due September 2025, so organisations that missed the deadline are now operating in a regulatory grey area. Governance and risk‑management controls must be live by March 2026, which at the time of the webinar was just weeks away.
Malta also goes further than EU baseline requirements by mandating a 24/7 security operations centre for digital infrastructure providers. Properly staffing a round-the-clock SOC requires at least 12 people to maintain a true rotation, which is a substantial operational investment for mid-sized operators.
The ultimate sanction isn’t just a fine; Malta can suspended MGA licences. For Malta-licensed gaming companies, this is an existential threat. If you lose your MGA licence, you are effectively locked out of dozens of global markets overnight.
Germany passed its implementation late, in November 2025. Registration deadlines for German‑based entities land in April 2026, leaving limited time for compliance.
Other member states are at various stages of transposition, and several missed the original October 2024 deadline. For operators with a presence in multiple EU countries, the practical challenge is managing compliance against several different national timelines and requirements simultaneously.
NIS2 is an EU directive, which means each member state must transpose it into national law. The result is that implementation timelines and specific requirements vary from country to country, and organisations operating across multiple jurisdictions need to track each one independently.
Both speakers stressed that NIS2 and the CRA require visible, ongoing engagement from senior management. Leading organisations will:
Under NIS2, leadership accountability is explicit. Executive training is not optional; it is a legal requirement under the directive.
Jo: “Just because something bad has happened doesn’t mean that you’re necessarily at fault… but you are going to have to produce reasonable reporting in layman’s terms… and explain that we’re operating in different risk parameters.”
Craig added the importance of training: “It’s mandatory for board‑level staff… you’ve got to keep training and constant training.”
Craig and Jo discussed the importance of reporting – especially when something goes wrong.
Jo: “The kind of reporting that one has to do under NIS2 is not a million miles away from the pre‑existing reporting… but there’s a real shift when you are experiencing a very serious incident.”
The 24‑hour reporting window is the operational flashpoint. Many companies are not ready for this. Under NIS2, the clock starts as soon as you become aware of a significant incident. You then have 24 hours to submit an early warning to the relevant CSIRT, 72 hours for a more detailed incident notification, and one month for the final report. A single incident can also trigger reporting obligations under the CRA and DORA simultaneously, each with different data requirements, formats, timelines and regulators.
Businesses need to prepare now by having supplier lists to hand, knowing exactly where to submit reports for each applicable regulation, and understanding that multi-jurisdictional reporting may be required.
Top tip from Jo:
Please print out a copy of your breach response plan… print out your incident response team list with phone numbers, ideally personal ones. If you can’t access your systems, it will take you an astonishing amount of time to pull this together.
Jo highlighted that enforcement activity under the CRA and NIS2 will be phased but increasingly serious.
From September 2026, the CRA introduces mandatory reporting of actively exploited vulnerabilities and severe incidents affecting product security. Full product‑related obligations take effect in December 2027, including the requirement for CE‑marking digital products, software included.
According to Jo, failure to report will likely be the first area where regulators take action, and penalties will be treated seriously.
Many NIS2 requirements are already enforceable. For essential entities that breach Articles 21 or 23, fines can reach up to EUR 10 million or 2% of total worldwide annual turnover, whichever is higher. For important entities, the maximum is EUR 7 million or 1.4% of worldwide turnover (Article 34 of NIS2). Regulators also have the power to issue binding instructions, order security audits, and, for essential entities, temporarily suspend or prohibit individuals from exercising managerial functions (Article 32(5)).
Jo: “They will factor in whether it’s going to bankrupt you… but they want these fines to hurt.”
This means businesses must act now to ensure reporting pathways, governance structures, supplier oversight and security controls are ready.
Craig and Jo recommended several clear actions for organisations:

There is a growing issue around the use of open‑source software (OSS) under the CRA. Although many OSS developers lobbied for exemption, OSS is widely used in commercial products. The CRA makes clear that organisations relying on OSS within regulated products remain fully responsible for meeting all cybersecurity and update obligations, including providing security updates for the minimum five-year support period.
Managing updates is difficult when you did not write the code – but the responsibility remains. The Software Bill of Materials (SBOM) requirement compounds this: manufacturers must maintain a machine-readable inventory of every library, open-source component and module in their products, kept as a living record.
Top tip from Jo:
If your business relies heavily on OSS, pay close attention to how it’s managed, seek specialist guidance and plan how you will meet long‑term update and security requirements.
The introduction of NIS2 and the EU cyber resilience act marks a significant shift for cybersecurity in iGaming. While the regulations bring real compliance challenges, they also create an opportunity for the industry to strengthen its defences, reduce operational risk and future‑proof operations.
Early preparation will help businesses stay compliant, competitive and trusted.
👉 Watch the full webinar here:
The 2026 Super Bowl weekend has once again demonstrated just how significant this event has become for the US sports betting ecosystem. This year’s matchup – New England Patriots vs. Seattle Seahawks at Levi’s Stadium – drew enormous national attention, with sportsbooks and operators preparing for yet another sharp spike in traffic and transaction volume. Super Bowl LX kicked off at 6:30 p.m. ET on February 8, with NBC broadcasting and Peacock streaming the game.
But what truly defined this year wasn’t just the on‑field drama – it was the scale and evolution of betting activity. Sportsbooks were expected to handle a record-breaking $1.76 billion in wagers across the US as betting continued to surge nationwide. Alongside traditional sportsbook action, prediction markets have been said to take center stage, allegedly boosted by a recent shift in federal regulatory posture. Industry analysts identified that, following a decision by the Commodity Futures Trading Commission to reverse its earlier proposal restricting political and sports-related contracts, platforms like Kalshi and Polymarket saw explosive participation heading into the game.
Notable betting storylines include a Nevada bettor who placed three preseason futures bets totalling $150,000 on Seattle – including $50,000 at 60‑1 odds for the Seahawks to win the Super Bowl – secured a combined payout approaching $4.5 million after Seattle’s championship win. These futures wagers represented some of the largest liabilities for US sportsbooks this season, highlighting the growing sophistication and long‑horizon strategies of certain bettors.
Our Super Bowl 2026 infrastructure performance reflected the scale and intensity of this year’s betting and iGaming activity. A review of Continent 8 network data revealed several notable trends across connectivity, cloud workloads, and B2B platform traffic:
Outbound traffic from transit customers to hyperscale cloud providers between Feb 9, 2026 (00:00) and Feb 10, 2026 (10:00)

Outbound traffic from US transit customers to all destination ASNs from Feb 6, 2026 (00:00) to Feb 9, 2026 (10:00)

These insights highlight how operators, platforms, and cloud‑driven services collectively leaned on Continent 8’s global network to handle one of the busiest betting weekends of the year – ensuring fast, secure, and uninterrupted connectivity throughout Super Bowl week.
In the weeks leading up to any Super Bowl, the world sees the spectacle on the field – but behind the scenes, operators rely on robust, resilient infrastructure to support record-breaking engagement. For Continent 8, preparation for Super Bowl LX began months in advance, with teams across the business working to ensure a seamless and interruption‑free experience for customers.

Justin Cosnett, Chief Product Officer, explains the technical groundwork:
“Our technical preparation began months prior to the Super Bowl. This centred around infrastructure and network upgrades and optimisation – including bandwidth increases in all key peering and IX locations, cloud infrastructure refreshes, among other changes – to ensure an interruption‑free operation.”
As the big weekend approached, this preparation evolved into a detailed readiness programme built around five core pillars:
This disciplined, collaborative approach ensured that every layer of our infrastructure was optimized for the surge in demand.
While a Super Bowl broadcast lasts just over 3 hours and 37 minutes, our “live” operational window was far broader – spanning five continuous days, from Thursday through Monday. During this period, Continent 8 operated in full Super Bowl mode, with:
This extended readiness window allowed us to anticipate and respond to shifting traffic patterns as early Super Bowl wagering, promotional campaigns, and late‑week betting surges ramped up toward game time.
Continent 8 teams were monitoring network performance across our global ‘locker rooms,’ ensuring optimal conditions no matter where traffic originated.

Dublin Office

Montreal Office

India Office
Long after the final whistle, our work continued. With operators still handling settlement workloads, futures reconciliations, and continued user engagement, network oversight remained critical.
Our Major Incident Management playbook provided structure and clarity throughout the Super Bowl cycle – guiding decision‑making, enabling cross‑team coordination, and serving as a framework for continuous improvement as we transition to subsequent peak events.
Reflecting on this year’s performance, Justin emphasised the impact of the team’s meticulous planning:
“The entire Continent 8 team was instrumental in ensuring a flawless Super Bowl experience. This careful, meticulous planning underscored our commitment to delivering a reliable and unparalleled service to our customers, allowing millions of players to place their bets and engage with the event in real-time.”
The Super Bowl remains the most demanding annual event for US sports betting operators – and 2026 raised the bar again. With sportsbooks handling unprecedented wagering volume and prediction markets adding an entirely new category of high-frequency transactions, operators faced rapid and unpredictable load spikes that required resilient, low-latency infrastructure.

As demonstrated by Super Bowl weekend 2026, operators need to prepare not just for higher traffic, but for traffic patterns that are more volatile, more complex, and more continuous. Ensuring uptime, security, and latency control during these surges is essential to delivering a fault‑free betting experience.
“Super Bowl weekend is one of the biggest moments of the year for our North American customers, and we take that responsibility incredibly seriously. Our team prepares months in advance to ensure operators experience flawless uptime, ultra‑low latency, and the resilience they need when traffic hits its peak. At Continent 8, going the extra mile isn’t the exception – it’s what we deliver every day, and especially during the industry’s biggest events.”
Aidan Rees‑Williams, Head of North America Sales, Continent 8 Technologies
As the US sports betting landscape accelerates – now fueled not only by sportsbook adoption but also possible regulatory green lights for prediction markets – operators require partners who can manage mission‑critical digital resilience at national scale.
Continent 8’s US presence is uniquely aligned to support this environment because we offer:
Contact our team to learn more.

In cybersecurity, intelligence is power. Financial institutions and healthcare providers have long relied on threat intelligence platforms to anticipate attacks and protect critical assets. Yet, the gambling industry, despite handling billions in transactions and sensitive customer data, has been slower to adopt this proactive approach.
The stakes are high. Cyber incidents targeting gaming operators have surged dramatically, with attacks becoming more sophisticated and financially devastating. We have seen land-based casinos forced offline for days.
For an industry built on trust and real-time engagement, the question is no longer whether operators need intelligence, but how quickly they can integrate it into their security posture.
Consider financial services. Banks operate under constant threat from fraud, phishing, and ransomware, yet they’ve built robust intelligence-sharing ecosystems like FS-ISAC (Financial Services Information Sharing and Analysis Center). These platforms allow members to share threat intelligence in real time, creating collective defence that benefits the entire sector.
Gaming needs its own equivalent, but with crucial differences. Our adversaries are unique: organised crime groups targeting high-roller accounts, bonus abuse rings operating across dozens of operators, match fixers probing betting platforms, and in certain jurisdictions, nation-state actors targeting offshore operations. Generic threat intelligence platforms miss approximately 70% of gaming-specific attack patterns because they weren’t designed to recognise these threats.
Effective threat intelligence transforms security operations across several critical areas.
Smarter vulnerability management:Gaming operators run complex technology stacks spanning payment processors, gaming engines, live betting platforms, and player databases. Patching everything according to generic severity scores is impossible during live operations. Intelligence changes the equation from “how severe could this be?” to “is this being actively exploited against gaming platforms now?” When intelligence reveals a payment gateway vulnerability under active exploitation against European operators, that patch moves to the front of the queue regardless of theoretical severity.
Faster incident response:Intelligence enables teams to build playbooks for gaming-specific scenarios before incidents occur. When attacks happen, context accelerates decisions. A generic PowerShell alert becomes high priority when intelligence identifies it as a technique used by gaming-targeting ransomware groups. The MITRE ATT&CK framework provides common language for this intelligence, allowing teams to measure defensive coverage objectively and identify gaps systematically.
Example: Champions League final, an operator detected unusual API calls to their odds calculation engine. Intelligence immediately revealed the same pattern had appeared at three other sportsbooks in the preceding 48 hours. A pre-built playbook isolated affected systems automatically. The attack was contained in four minutes rather than 45.
Proactive threat hunting:Shared intelligence generates hunting hypotheses no single operator could develop alone. When multiple operators detect reconnaissance against payment systems using specific techniques, everyone can search for identical indicators. Security teams shift from reactive firefighting to actively hunting for bonus abuse automation, payment fraud patterns, and early reconnaissance.
Reduced alert fatigue:Gaming platforms generate millions of security events daily. Intelligence-driven contextualisation transforms “this IP attempted 50 logins” into “this IP is part of a credential stuffing botnet that hit six gaming sites today.” Alerts receive priority based on actual gaming industry impact. Analysts escape false positive overload and focus on genuine threats.

Intelligence extends beyond traditional cybersecurity. iGaming’s ecosystem of platform providers, payment processors, and affiliate networks creates significant supply chain risk. When a major provider suffers a breach, operators need immediate notification and indicators to hunt for compromise in their own environments.
Fraud prevention benefits enormously from shared intelligence. Credential stuffing, bonus abuse rings, and synthetic identity creation operate across multiple operators simultaneously. Real-time sharing allows the entire industry to block known fraudsters before they cause widespread damage.
iGaming operates under intense regulatory scrutiny across multiple jurisdictions. Intelligence programmes must account for data sovereignty when sharing across borders, maintain evidence chains for incident reporting, and demonstrate due diligence to regulators.
Rather than complicating compliance, intelligence sharing strengthens it. Documented participation demonstrates proactive security investment. Standardised incident categorisation streamlines reporting. Cross-operator intelligence identifies systemic risks that regulators will certainly notice even if individual operators miss them.
None of this works without trust. Operators compete fiercely, and sharing incident details raises legitimate concerns about competitive exposure.
Effective programmes offer anonymity where needed – operators can share indicators without identifying themselves. Clear data governance establishes who accesses what information. Critically, the value must be obvious. Operators need to see that participation makes them measurably safer, that what they receive far exceeds what they contribute. As membership grows, network effects compound: more operators sharing means better intelligence for everyone.
Gaming operations run around the clock with no maintenance windows during major sporting events. Attacks deliberately target peak revenue periods. Response times measured in hours are unacceptable.
This demands SOAR (Security Orchestration, Automation & Response) automation. When intelligence identifies malicious infrastructure, indicators must flow automatically into firewalls and detection systems. Pre-configured playbooks must execute without waiting for human intervention.
Operators with mature programmes report mean time to detect dropping from 14 hours to under 10 minutes. Mean time to respond falls from four hours to 12 minutes. False positives reduce by 70%.
With average gaming breach costs exceeding $5M including regulatory fines and customer compensation, preventing one major incident justifies significant investment. When a zero-day in payment gateway software was identified through shared intelligence, operators with access isolated vulnerable systems 48 hours before public disclosure. Those without suffer breaches averaging $5M each.
The gaming industry has reached an inflection point. We can continue operating in silos, or recognise that collective defence serves everyone’s interests. The attackers are already collaborating; we must do the same.
Financial services learned this lesson years ago. For gaming, the question is whether we learn proactively or wait for a sector-wide incident to force the conversation.
For more information on Threat Exchange, visit continent8.comor email sales@continent8.com.
**Source: EGR Digital Edition 248
Artificial Intelligence (AI) is rapidly reshaping how governments, enterprises, and communities operate – and tribal nations are no exception. To explore these opportunities, the Tribal Leadership Council, in partnership with Continent 8 Technologies, recently hosted a specialised webinar titled “Practical AI for Tribal Organizations.”
The session featured two expert presenters:
These speakers guided attendees through a practical, sovereignty-focused understanding of how AI can support tribal governance, cybersecurity, community engagement, and enterprise operations.
It was important to Cris to set the scene on AI from the offset – and the fact that AI is not a single product or technology – it’s a broad set of capabilities that are already embedded in much of the systems and software we use today.
With that said, below is a summary of the key insights shared during the webinar.
AI is no longer a future concept – it is a tool tribal leaders can use right now to increase efficiency, strengthen decision-making, and improve the delivery of services. The webinar highlighted the ability of AI to:
By automating repetitive tasks and analysing information at scale, AI frees tribal leadership to focus on strategy, sovereignty, and community impact.
Cris stressed that the success of AI isn’t dependent on the algorithm, but the quality of the data used: “trash in, trash out.”
Jerad and Cris outlined a crucial distinction between generative AI and agentic AI – two categories that offer very different capabilities and also associated risks.
Designed to create content.
Useful for drafting policies, summarizing documents, producing reports, or generating communications. Content should always be verified – there is a risk for errors and hallucinations.
Designed to take actions based on rules or goals.
Capable of performing tasks such as compliance checks, initiating workflows, alerting staff, or managing routine operational processes.
Understanding the difference allows tribal organizations to choose the right AI tool for the right job – and avoid over-automating areas that require human oversight.
Key takeaway: generative AI assists people, whereas agentic AI acts on behalf of the organization.
Examples shared during the webinar demonstrated how AI can streamline workflows, including:
One powerful use case: automating regulatory certification steps reduced staff workload while improving accuracy – allowing tribal teams to focus on meaningful leadership and community priorities. One tribal organization took a 6-month manual process down to a 2.5-week workload.
AI-powered tools can enhance how tribes communicate with and support their citizens. This includes:
These capabilities help tribal governments stay connected to their people while reducing demand on staff.
But it’s important to understand: AI does not replace human judgment or community leadership.
The presenters also explored how tribal enterprises – from gaming to hospitality to broadband and beyond – can benefit from AI through:
These efficiencies translate to better productivity, fewer errors, cost savings, and stronger competitive advantage.
From data exposure and enhanced fraud, it is important tribal leaders understand the risks associated with AI. Sensitive data should be kept out of public platforms.
Both speakers emphasized that AI adoption must reinforce – not compromise – tribal sovereignty. Key considerations include:
These measures ensure tribal nations maintain full control over their data, decisions, and digital future.
As AI expands, cybersecurity must evolve with it. Cris highlighted essential protections such as:
AI itself can strengthen cyber defense by detecting suspicious activity earlier and accelerating response times.
The speakers outlined a practical roadmap for responsible, sovereignty-aligned AI implementation:
AI is not about replacing people or traditions. It is about protecting sovereignty, improving services, and controlling your digital future.
By taking a careful, strategic approach, tribal leaders can harness AI to strengthen governance, protect sovereignty, and uplift their communities.
You can watch the full webinar recording here:
Continent 8 Technologies, a leading provider of cutting-edge managed IT solutions designed for the global iGaming and online sports betting industry, announces that it is officially open for business in Alberta, Canada. This expansion follows the province’s release of its competitive iGaming regulatory framework and the publication of detailed hosting and security requirements by the Alberta Gaming, Liquor and Cannabis Commission (AGLC), marking another significant milestone in Continent 8’s long-standing commitment to serving the North American market.
With proven operations in Ontario – where the company successfully launched its Public Cloud solution in Toronto in direct response to the province’s opening of its iGaming market in 2022 – Continent 8 brings to Alberta the same depth of regulatory understanding, technical capability, and customer-driven innovation that has established it as a trusted partner across Canada.
Alberta’s iGaming framework sets out detailed hosting and data governance obligations for operators and suppliers. For example, all data centres used by licensees must receive AGLC approval, covering data residency, cross-border transfers, and encryption key controls.
The province also mandates fully functional disaster recovery infrastructure and immutable, encrypted backups, with strict requirements for quarterly testing and offsite storage – areas where Continent 8’s experience provides immediate value.
In addition to hosting requirements, Alberta introduces some of the most comprehensive security requirements in the country, including mandatory MFA, SOC 2 and ISO 27001 compliance, annual penetration testing and extensive log retention requirements.
“Our heritage means we understand the rigorous regulatory expectations, and the operational challenges operators and suppliers face when entering new markets,” said Michael Tobin, CEO and Founder of Continent 8 Technologies. “Alberta’s standards are comprehensive, particularly around disaster recovery, backups, and security. We have built our solutions so customers can meet these requirements confidently from day one. We are excited to support customers as Alberta opens its market and continues Canada’s growth story.”
Continent 8’s network now spans every major regulated province or state in North America, supported by facilities across more than 100 locations globally. Customers benefit from end-to-end services including managed hosting, cloud, connectivity, and cybersecurity, all engineered for regulated industries.
Continent 8 Technologies, a leading provider of cutting-edge managed IT solutions designed for the global iGaming and online sports betting industry, has been named number one in GamblingIQ’s prestigious ‘Security 10’ global rankings. CEO Michael Tobin is recognised as the top industry leader in security, trust and data integrity.

This accolade reinforces Continent 8’s position as the trusted provider of data centre services, cloud hosting, private connectivity, and cybersecurity solutions, underscoring its commitment to safeguarding operators, suppliers, and players in an increasingly complex and regulated digital landscape.
Continent 8 is the partner of choice for hundreds of leading operators, suppliers, and platform providers worldwide. From tier-one brands to emerging innovators, these companies depend on Continent 8’s secure, compliant, and resilient infrastructure to power their businesses and protect their players. Customers include FanDuel, Kambi, Sportingtech, Playtech, DraftKings, Alea, BetMGM, and more.
GamblingIQ stated: ‘Michael Tobin is one of gambling’s rare figures who combines respect with genuine popularity: a feat almost impossible in an industry as volatile and scrutinised as ours. His reputation isn’t built on flash or hype, but on steady, practical leadership, curiosity about technology, and an ability to make complex challenges seem manageable. Operators, regulators, suppliers and colleagues value his clarity, his evidence-backed thinking, and his long-term approach to partnerships. After nearly 30 years, his standing signals more than success: it reflects consistency of character, reliability and a human touch in a sector that often forgets both.’
Read the full Security 10 feature by GamblingIQ, here: https://www.gamblingiq.co.uk/post/the-security-10
Michael Tobin, CEO and Founder of Continent 8 Technologies, commented: “Security and trust are the cornerstones of iGaming – they are the principles on which I founded Continent 8. This recognition from GamblingIQ is a testament to our team’s relentless focus on safeguarding the industry and enabling our customers to innovate with confidence. Congratulations to all the other companies listed in the Security 10.”
Meet Michael Tobin and the Continent 8 team at ICE Barcelona, 19-21 January at Stand 2Q20. To arrange a meeting, please visit https://lp.continent8.com/ice-barcelona-2026 or contact sales@continent8.com.
Continent 8 Technologies, is proud to announce its sponsorship of Douglas Athletic Football Club for the 2025/26 season, supporting the club from grassroots to seniors.
The sponsorship deal will see the senior and junior teams wearing new kit for the season, proudly displaying the Continent 8 logo.

Anna McChesney, Director of Digital Marketing at Continent 8 Technologies, commented: “We’re thrilled to support Douglas Athletic FC this season. As a business rooted in the Isle of Man, it’s important to us to give back to the community. Football brings people together, and we’re proud to play a part in helping the club thrive both on and off the pitch. Best of luck to everyone in the 25/26 season!”
John Minter, Club Secretary & Treasurer of Douglas Athletic FC Committee, added: “Having Continent 8 on board is a huge boost for the club. Their support means we can continue to grow and provide opportunities for players of all ages. It’s fantastic to see a local company investing in local sport, and we’re excited about what this season holds.”
Continent 8 incorporated on the Isle of Man in 2006 to service global businesses in the iGaming and online sports betting industry. The company, with around 300 staff globally, employs 20 talented individuals working from its purpose-built Tier-3 data centre facility in Douglas.
In the iGaming industry, trust is everything – not just for players, but for the entire ecosystem of operators, suppliers, and technology providers. Players expect seamless experiences, secure transactions, and confidence that their personal data is protected. At the same time, suppliers and platform partners demand robust cybersecurity standards and transparent risk management to safeguard their own systems and reputations. Yet, as the sector grows – driven by new markets, mobile-first platforms, and real-time betting – the attack surface expands exponentially. Cybercriminals have noticed. From ransomware groups to phishing campaigns, the industry is now a prime target for sophisticated attacks that exploit both technology and human behaviour.

Recent analysis shows a 400% surge in cyber incidents impacting casino operators and gambling businesses since early 2025. The cost of downtime during a major sporting event can exceed $6,000 per minute, and phishing attacks have grown by 180% since 2023. These numbers underscore a stark reality: the iGaming ecosystem is under siege.
The past year has been a wake-up call for the industry. In July 2025, Flutter Entertainment, owner of Paddy Power and Betfair, confirmed a breach affecting up to 800,000 users, exposing personal data such as IP addresses and betting activity. In March, Merkur Group, a major European casino operator, suffered a catastrophic incident that compromised sensitive data across multiple platforms, including payment details, identity verification documents, and over 70,000 ID scans, all due to misconfigured backend interfaces. Beyond data theft, account takeover attacks surged by 42% in Q1 2025, with one European betting platform losing €1.7 million in just 48 hours before detection. These examples illustrate a clear trend: attackers are exploiting both technical vulnerabilities and human factors, and the financial and reputational stakes have never been higher.
Why is the industry a target? Because it offers two things that attackers value most – money and data. Every payment gateway, affiliate integration, and game studio aggregation introduces new vulnerabilities. Add to this the complexity of real-time transaction engines, regulatory reporting systems, and third-party content providers, and you have an environment where a single weak link can compromise the entire chain.
Now that I have set the scene, here’s what I believe will shape cybersecurity in iGaming in 2026.
Artificial Intelligence is the double-edged sword of cybersecurity. In 2026, expect AI-driven attacks – deepfakes, automated intrusions, and identity-centric exploits – to become mainstream.
On the defensive side, AI will power advanced threat hunting, anomaly detection, and predictive analytics. Operators will deploy machine learning models to identify fraudulent transactions in real time and detect behavioural anomalies before they escalate. But securing AI itself will be critical as attackers are already targeting AI systems to turn them into insider threats.
Cybersecurity will move from being a compliance checkbox to a strategic KPI. This is a welcome shift for the industry. Regulators are demanding real-time, machine-readable compliance data, while players increasingly view security as part of the user experience. Seamless onboarding, frictionless withdrawals, and transparent data handling will become loyalty drivers.
The complexity of today’s threat landscape means no single operator can fight alone. Intelligence sharing will become the cornerstone of industry-wide defence. This is where Continent 8’s Threat Exchange sets a new benchmark.
Launched in late 2025, Threat Exchange is the industry’s first dedicated cyber threat intelligence (CTI) platform, engineered specifically for iGaming and online sports betting. It processes billions of signals daily, delivering real-time, actionable insights to operators, platform providers, and regulators.
Key capabilities include:
As I often say, “Threat Exchange is changing the game.” By leveraging our position as the industry’s trusted cybersecurity and hosting partner, we transform vast datasets into clear, actionable intelligence. This isn’t just about detecting threats – it’s about anticipating them and enabling proactive resilience.
Jurisdictions from Brazil to Finland are introducing competitive licensing models, while established markets like the UK are tightening advertising and security requirements. Compliance will increasingly rely on API-driven automation, enabling operators to feed regulators real-time data on transactions, safer gambling measures, and incident response.
To thrive in this environment, operators should:
Cybersecurity in iGaming is no longer about reacting to incidents – it’s about anticipating them. Those who harness intelligence, embrace collaboration, and embed security into every layer of their operations will not only survive but lead.
For more information on how Continent 8 can support your initiatives, email sales@continent.com or fill out our Contact Us page.