INTRUSION DETECTION & PREVENTION MONTH: How organisations are balancing automation and human expertise

With the rise of AI-powered security analytics, businesses now have the ability to automate threat detection, analyse massive datasets, and respond to attacks in real time. However, human expertise remains critical, as skilled cybersecurity professionals bring contextual awareness, intuition, and strategic decision-making that AI alone cannot replicate.vTo achieve the most effective defence against cyber intrusions, businesses are adopting a hybrid approach, combining AI-driven […]
Overcomplicated IT systems making workers leave their jobs

A significant proportion of UK employees are struggling to navigate workplace technology, resulting in many actually considering quitting to get away from their issues. That’s according to a Workspace 365 survey of 1,000 UK employees in organisations with more than 250 people, which underscores an urgent need for simplified and integrated digital environments, particularly as […]
ACCESS CONTROL MONTH: Combatting insider threats and data breaches

Insider threats remain one of the most significant cybersecurity risks for organisations. Whether caused by malicious intent, negligence, or compromised credentials, insider threats account for a growing number of data breaches. With sensitive data and critical systems at risk, businesses must adopt advanced access control solutions to mitigate insider threats and enhance cybersecurity resilience. By leveraging role-based access control (RBAC), […]
Cyber Secure Forum: Join HSBC, Heathrow Airport, The Met and more this June

The Cyber Secure Forum follows an award-winning format of meetings in a relaxed and intimate setting. Unlike regular trade shows, you will have the opportunity to meet with suppliers who specifically match your project requirements. What’s more, it is completely free for you to attend! 24th June 2025 Hilton, London Canary Wharf BOOK NOW As mentioned, your place is […]
ACCESS CONTROL MONTH: The ‘never trust, always verify approach’ to security

With cyber threats growing more sophisticated, organisations in the private & public sectors are embracing the Zero Trust security model to enhance access control and reduce attack surfaces. Traditional perimeter-based security approaches are no longer sufficient, as remote work, cloud computing, and hybrid infrastructures increase exposure to cyber risks. Zero Trust access control ensures that no user […]
ACCESS CONTROL MONTH: Which solutions are right for your organisation?

Access control is a critical pillar of cybersecurity, protecting organisations from unauthorised entries, data breaches, and insider threats. As cyber threats become more sophisticated, businesses must adopt advanced access control solutions that provide scalability, compliance, and seamless integration with existing cybersecurity infrastructure. Choosing the right solution requires a strategic approach, evaluating cloud-based access control, biometric authentication, and multi-factor authentication […]
Data: 28bn IoT devices will need securing globally by 2028

A study has found that the global number of IoT devices protected by cybersecurity solutions will reach 28 billion by 2028; rising from only 14 billion in 2024, representing a growth of over 100% over the next four years. However the research, conducted by Juniper, says that despite this sizeable growth, and as the complexity of […]
March 2025 is Intrusion Detection & Prevention Month on Cyber Security Briefing – Here’s how to get involved!

Each month on Cyber Security Briefing we’re shining the spotlight on a different part of the cyber security market – and in March we’re focussing on Intrusion Detection & Prevention solutions. It’s all part of our ‘Recommended’ editorial feature, designed to help IT security buyers find the best products and services available today. So, if you’re […]
ACCESS CONTROL MONTH: Weighing up biometric vs. traditional authentication

Traditional authentication methods such as passwords and smart cards are being challenged by biometric authentication, including fingerprint scanning, facial recognition, and behavioural biometrics. But which approach offers the best combination of security, usability, and scalability? Here we examine the strengths and challenges of each… 1. Traditional Authentication: Still Relevant in 2025? Traditional authentication methods have long been the standard […]
Security leaders struggling to balance data security with business objectives

Only 14% of security & risk management (SRM) leaders can effectively secure organisational data assets while also enabling the use of data to achieve business objectives. That’s according to a survey by Gartner, which says that while 35% of respondents secure data assets and 21% use data to achieve business goals, only one in seven can effectively […]