24th June 2025
Hilton London Canary Wharf
11th November 2025
Hilton London Canary Wharf
Search
Close this search box.

ACCESS CONTROL MONTH: The ‘never trust, always verify approach’ to security

With cyber threats growing more sophisticated, organisations in the private & public sectors are embracing the Zero Trust security model to enhance access control and reduce attack surfaces. Traditional perimeter-based security approaches are no longer sufficient, as remote work, cloud computing, and hybrid infrastructures increase exposure to cyber risks. Zero Trust access control ensures that no user […]

ACCESS CONTROL MONTH: Which solutions are right for your organisation?

Access control is a critical pillar of cybersecurity, protecting organisations from unauthorised entries, data breaches, and insider threats. As cyber threats become more sophisticated, businesses must adopt advanced access control solutions that provide scalability, compliance, and seamless integration with existing cybersecurity infrastructure. Choosing the right solution requires a strategic approach, evaluating cloud-based access control, biometric authentication, and multi-factor authentication […]

Data: 28bn IoT devices will need securing globally by 2028

A study has found that the global number of IoT devices protected by cybersecurity solutions will reach 28 billion by 2028; rising from only 14 billion in 2024, representing a growth of over 100% over the next four years. However the research, conducted by Juniper, says that despite this sizeable growth, and as the complexity of […]

ACCESS CONTROL MONTH: Weighing up biometric vs. traditional authentication

Traditional authentication methods such as passwords and smart cards are being challenged by biometric authentication, including fingerprint scanning, facial recognition, and behavioural biometrics. But which approach offers the best combination of security, usability, and scalability? Here we examine the strengths and challenges of each… 1. Traditional Authentication: Still Relevant in 2025? Traditional authentication methods have long been the standard […]

Security leaders struggling to balance data security with business objectives

Only 14% of security & risk management (SRM) leaders can effectively secure organisational data assets while also enabling the use of data to achieve business objectives. That’s according to a survey by Gartner, which says that while 35% of respondents secure data assets and 21% use data to achieve business goals, only one in seven can effectively […]

Your next game-changing supplier could be just one meeting away at the Cyber Secure Forum

You’re invited to an exclusive cyber security networking event — completely free of charge — where you’ll connect with top industry suppliers, gain valuable insights from expert-led seminars, and explore cutting-edge cyber security solutions. What’s the event? The Cyber Secure Forum is our bi-annual, award-winning event designed specifically for senior decision-makers like yourself. Our unique format makes […]

Public sector pay gap putting UK cyber defences at risk, says research

A significant pay gap between private sector and UK government cybersecurity roles is jeopardising national security by hindering the public sector’s ability to attract and retain top talent. That’s according to analysis of publicly-available data by cyber security specialists at Naoris Protocol, which shows pay for key roles in cyber security can be nearly double in […]

Network operators will spend $6.3bn on quantum key distribution by end of the decade

A new study from Juniper Research has found telecoms market stakeholders will invest a cumulative spend exceeding $6 billion on developing and implementing quantum key distribution (QKD) between 2025 and 2030.  QKD is a communication method that leverages quantum mechanics to create encryption keys that are unable to be intercepted by fraudulent players; increasing the security of network […]

Web3: Quantum computing, AI & the metaverse ‘fuel a perfect storm’ for cyber crime

The financial and operational damage caused by data breaches is poised to worsen dramatically, fuelled by advancements in quantum computing, Metaverse and artificial intelligence (AI), according to research. A global study conducted by Naoris Protocol reveals that the average cost of a data breach could climb to $5.3 million within five years, up from the […]