September 2025 is Vulnerability Management Month on Cyber Security Briefing – Here’s how to get involved!

Each month on Cyber Security Briefing we’re shining the spotlight on a different part of the cyber security market – and in September we’re focussing on Vulnerability Management solutions. It’s all part of our ‘Recommended’ editorial feature, designed to help IT security buyers find the best products and services available today. So, if you’re a Vulnerability […]
500% increase in Cloud Account detections

A new report has highlighted a dramatic rise in identity threats and the evolving landscape of cloud techniques, driven by increased adoption of identity security measures, generative AI, and enhanced detection capabilities. The analysis by Red Canary emphasises the need for security strategies to address both clear threats and subtle, risky behaviours that can precede major breaches. […]
Meta and Microsoft join the Global Signal Exchange to help fight online scams

The Global Signal Exchange (GSE) has confirmed that Microsoft and Meta are joining as partners alongside 30 existing firms collaborating through the organisation to tackle online scams, fraud and abuse. The GSE)was founded in 2024 by Oxford Information Labs Research (OXIL), Google and the Global Anti-Scam Alliance (GASA) to help partner organisations collaborate, share data and […]
AI MONTH: Balancing Innovation and Ethics – Responsible AI governance in cybersecurity

AI systems are increasingly deployed to automate threat detection, triage alerts, and even take autonomous defensive action. While these technologies offer unprecedented speed and accuracy, they also raise urgent questions about bias, surveillance, and decision transparency… One of the most pressing challenges is algorithmic bias. AI-driven threat detection tools rely on large datasets to identify […]
Significant proportion of organisations don’t trust third-party vendors

Research from cyber consultancy CyXcel has revealed what it calls a ‘critical shortfall’ in the UK’s digital risk landscape: nearly three in ten (27%) of UK risk managers surveyed report they don’t have enough trust in third-party vendors to confidently manage their most critical threats, increasing their risk factors and threatening their businesses. This trust gap […]
VIDEO: Cyber Secure Forum open for registrations, bringing industry leaders and innovators together

Explore what’s new at this highly anticipated event offering you the unrivalled opportunity to meet 1-2-1 with suppliers offering the latest competitive solutions to this ever-evolving industry. Date: Tuesday 11th November 2025 Venue: Hilton, London Canary Wharf This unmissable event is entirely free for industry professionals, like you, to attend and includes: ✅ Access to a series of inspiring keynote […]
August 2025 is Penetration Testing Month on Cyber Security Briefing – Here’s how to get involved!

Each month on Cyber Security Briefing we’re shining the spotlight on a different part of the cyber security market – and in August we’re focussing on Penetration Testing solutions. It’s all part of our ‘Recommended’ editorial feature, designed to help IT security buyers find the best products and services available today. So, if you’re a Penetration […]
AI MONTH: Building a cybersecurity workforce ready for autonomous defences

As artificial intelligence continues to transform the cybersecurity landscape, the demand for skilled professionals who can manage, develop, and monitor AI-powered defences is rising rapidly. However, we know many organisations attending the Cyber Secure Forum face a widening talent gap, as traditional security teams struggle to keep pace with the tools and techniques required for […]
The Future of Network Pentesting: Automating Security with vPenTest

Traditional network penetration testing is no longer enough. It is manual, time-consuming, expensive, and typically conducted only once a year. Meanwhile, cyber threats evolve constantly and take advantage of gaps the moment they appear. Automated network penetration testing platforms like vPenTest are reshaping this landscape by enabling faster, scalable, and more frequent security assessments. 1. […]
Internal vs. External Network Pentesting: What’s the real difference?

When it comes to protecting your network, penetration testing is essential. But not all tests are created equal. Understanding the difference between internal and external network penetration testing can make a huge impact on your overall security. Let’s begin from the outside. External penetration testing simulates an attacker trying to gain access from the internet. […]