VULNERABILITY MANAGEMENT MONTH: Analysing the key technologies and usage scenarios
Vulnerability Management is a critical component of a robust cybersecurity strategy. By proactively identifying and addressing vulnerabilities, organisations can reduce their risk of cyberattacks and protect sensitive data. Senior IT professionals can leverage a range of solutions to enhance their vulnerability management efforts – Here are the main considerations among delegates at the Cyber Secure Forum… Main Technologies […]
Two-thirds of UK workers would take legal action against their employer if their data was breached
A recent survey of 1,014 Britons by data experts Graham Coffey & Co. Solicitors has revealed that 65% would take legal action against their employer if their data was breached due to negligence. The survey indicates that 74% trust their employer to keep their personal data secure. Despite this, 75% would report a data breach to a […]
Higher education sector warned over cyber risks
September marks the start of the UK academic year, with universities across the country opening their doors to a new intake of students and faculty – but they also welcome in a new wave of cyber threats, according to one expert. Gregg Hardie, Public Sector Director at SailPoint states that with so much data at stake, from personal […]
Global information security spending to surpass $200bn in 2025
Worldwide end-user spending on information security is projected to total $212 billion in 2025, up 15.1% from $183.9 billion in 2024, according to data from Gartner, which attributes the expected growth to increased threats and a talent crunch. “The continued heightened threat environment, cloud movement and talent crunch are pushing security to the top of the priorities […]
PENETRATION TESTING MONTH: The methodologies you need to know
Penetration testing, a critical component of a robust cybersecurity strategy, involves simulating real-world attacks to identify vulnerabilities in an organisation’s systems. There are several widely recognised methodologies that cybersecurity professionals can employ to conduct these assessments – Here’s the Top 10 as deployed by delegates and suppliers at the Cyber Secure Forum… 1. Black-Box Testing This approach mimics […]
How AI can help address security challenges created by IT/OT integration?
By Jake Mitchell, who writes for Phytools, the North American distributor of network solutions The convergence of Information Technology (IT) and Operational Technology (OT) has been transformative for multiple industries, enabling businesses to monitor processes in real-time, improve operational efficiency and inform thought leaders to make improved decisions. However, this integration comes with its own set […]
Join IT sector peers from these great organisations at the Cyber Secure Forum
You have a FREE invitation pending to attend the Cyber Secure Forum – the essential event for senior buyers and leading solution providers in the UK. 7th of November – Hilton, London Canary Wharf (Under 3 months away) This free event provides an opportunity for you to source the solutions you need for your upcoming projects, via a series of 1-2-1 meetings with suppliers. Your peers who […]
If you specialise in Vulnerability Management solutions we want to hear from you!
Each month on Cyber Security Briefing we’re shining the spotlight on a different part of the cyber security market – and in September we’re focussing on Vulnerability Management solutions. It’s all part of our ‘Recommended’ editorial feature, designed to help IT security buyers find the best products and services available today. So, if you’re a Vulnerability […]
PENETRATION TESTING MONTH: Identifying your organisation’s needs to pick the best solutions
Penetration testing is a critical component of a robust cybersecurity strategy. Selecting the right partner is crucial to ensure the effectiveness of this process. Here are key considerations for IT and cyber security professionals in the UK when choosing a penetration testing provider, informed by delegate requirements at the Cyber Secure Forum… Understanding Your Needs Key Considerations […]
NCSC details how it protected UK election process from cyber threats
Protecting elections in cyberspace requires long-term planning and vigilance to effectively halt online threats, according to the head of the National Cyber Security Centre (NCSC). Felicity Oswald, CEO of the NCSC – a part of GCHQ – has emphasised the central role that exercising and preparation played in keeping the UK 2024 General Election safe […]