VULNERABILITY MANAGEMENT MONTH: Your checklist for selecting the best partners
Vulnerability management is a critical component of a robust cybersecurity strategy. For senior professionals in the UK’s public and private sectors, selecting the right solution provider is essential to protect their organisations from cyber threats. Here’s how delegates at the Cyber Secure Forum approach the task… Key Considerations for Supplier Selection Common Mistakes to Avoid Top Tips […]
One third of enterprises will automate 50% of network activities by 2026
By 2026, 30% of enterprises will automate more than half of their network activities, an increase from under 10% in mid-2023. “Infrastructure and operations (I&O) leaders are increasingly looking to AI-based analytics and augmented decision making, including intelligent automation (IA), to improve operational resilience and responsiveness, address complexity and process increasingly large amounts of data through […]
Data centres given Critical National Infrastructure status in UK – what does this mean for data centre providers?
By David Varney, partner at UK law firm Burges Salmon Earlier this month, the Technology Secretary Peter Kyle declared that UK data centres will now be classified as Critical National Infrastructure (UK CNI), marking the first new CNI designation since 2015. UK CNI constitutes critical elements of infrastructure of which the loss or compromise could result in […]
Cyber Secure Forum: Where the industry meets to connect and learn
Join us in November at the Cyber Secure Forum, where top speakers such as Ben Owen – Co-Founder of the OSINT Group, will be sharing their experience and knowledge – Register today! 7th of November – Hilton, London Canary Wharf Your pass is completely complimentary – ⭐ Book online here ⭐ OPENING PRESENTATION “The Data Dilemma: Balancing Online Sharing with […]
If you specialise in Employee Security Awareness solutions we want to hear from you!
Each month on Cyber Security Briefing we’re shining the spotlight on a different part of the cyber security market – and in October we’re focussing on Employee Security Awareness solutions. It’s all part of our ‘Recommended’ editorial feature, designed to help IT security buyers find the best products and services available today. So, if you’re a […]
VULNERABILITY MANAGEMENT MONTH: Analysing the key technologies and usage scenarios
Vulnerability Management is a critical component of a robust cybersecurity strategy. By proactively identifying and addressing vulnerabilities, organisations can reduce their risk of cyberattacks and protect sensitive data. Senior IT professionals can leverage a range of solutions to enhance their vulnerability management efforts – Here are the main considerations among delegates at the Cyber Secure Forum… Main Technologies […]
Two-thirds of UK workers would take legal action against their employer if their data was breached
A recent survey of 1,014 Britons by data experts Graham Coffey & Co. Solicitors has revealed that 65% would take legal action against their employer if their data was breached due to negligence. The survey indicates that 74% trust their employer to keep their personal data secure. Despite this, 75% would report a data breach to a […]
Higher education sector warned over cyber risks
September marks the start of the UK academic year, with universities across the country opening their doors to a new intake of students and faculty – but they also welcome in a new wave of cyber threats, according to one expert. Gregg Hardie, Public Sector Director at SailPoint states that with so much data at stake, from personal […]
Global information security spending to surpass $200bn in 2025
Worldwide end-user spending on information security is projected to total $212 billion in 2025, up 15.1% from $183.9 billion in 2024, according to data from Gartner, which attributes the expected growth to increased threats and a talent crunch. “The continued heightened threat environment, cloud movement and talent crunch are pushing security to the top of the priorities […]
PENETRATION TESTING MONTH: The methodologies you need to know
Penetration testing, a critical component of a robust cybersecurity strategy, involves simulating real-world attacks to identify vulnerabilities in an organisation’s systems. There are several widely recognised methodologies that cybersecurity professionals can employ to conduct these assessments – Here’s the Top 10 as deployed by delegates and suppliers at the Cyber Secure Forum… 1. Black-Box Testing This approach mimics […]