How CSIOs can bridge the skills gap: Balancing rapid AI innovation with robust cybersecurity

Studies show that UK businesses faced approximately 7.78 million cybercrimes in the past 12 months alone. While 75% of the respondents surveyed for the 2024 SoPR have integrated AI tools into their penetration testing processes, a critical skills gap persists. Most organisations struggle to match the pace of AI adoption with the necessary expertise to […]
Wireless access control overtakes wired for the first time

The 2025 edition of ASSA ABLOY’s Wireless Access Control Report reveals a market at a tipping point, with wireless and mobile solutions now the dominant choice for digital access management. For the first time in the report’s 12-year history, ASSA ABLOY’s commissioned industry survey found that wireless (fully or partly) deployments have overtaken wired-only systems […]
VULNERABILITY MANAGEMENT MONTH: Integrating your security processes into DevSecOps pipelines

Vulnerability management is no longer seen as a bolt-on activity handled after deployment. For organisations under increasing pressure from regulators, customers, and boards to reduce cyber risk, the focus has shifted to embedding vulnerability detection and remediation directly into development workflows: a practice widely known as ‘shifting left’… The Problem with Traditional Approaches Historically, vulnerability […]
This could be your itinerary at the Cyber Secure Forum

If you’re interested in 1-2-1 meetings with leading suppliers and solution providers then the Cyber Secure Forum, taking place this November, is the only event you need. Tuesday 11th November 2025 Hilton, London Canary Wharf Your complimentary invitation includes: Click Here To Register Here’s how your working day could look like: Tuesday 11th November 08:00-08:45 Delegate Registration & […]
Organisations will spend $213bn on information security in 2025

Global end-user spending on information security is projected to reach $213 billion in 2025, up from $193 billion in 2024, according to Gartner, which also estimates that spending will increase 12.5% in 2026 to total $240 billion. “Established security spending will continue as normal, but some organizations are being more cautious with any new security spending in […]
PEN TESTING MONTH: Automated vs. Manual – Striking the right balance for continuous threat visibility

As cybersecurity threats grow in scale and sophistication, the tools and methods used to defend against them must evolve. For organisations attending the Cyber Secure Forum, balancing regulatory pressure, operational demands, and limited security budgets, the choice between automated and manual penetration is a strategic concern. Automated pen testing tools, or more accurately, automated vulnerability […]
September 2025 is Vulnerability Management Month on Cyber Security Briefing – Here’s how to get involved!

Each month on Cyber Security Briefing we’re shining the spotlight on a different part of the cyber security market – and in September we’re focussing on Vulnerability Management solutions. It’s all part of our ‘Recommended’ editorial feature, designed to help IT security buyers find the best products and services available today. So, if you’re a Vulnerability […]
PEN TESTING MONTH: Why internal testing is critical in the age of insider threats and hybrid workforces

As organisations adapt to hybrid working models and more complex IT ecosystems, the historic notion of perimeter defence has all but dissolved. Today, some of the most significant threats come from within the network, and internal penetration testing is fast becoming a vital tool in identifying them. Insider threats, whether malicious or accidental, pose a […]
UK firms bearing brunt of ransomware surge

A new study shows hackers are relentless and ransomware is still a global epidemic: in 40% of attacks, threat actors threatened to physically harm executives at organisations that declined to pay a ransom demand. The 2025 Ransomware Risk Report from Semperis found that UK organisations are being targeted more than most other countries (84%), and around half […]
PEN TESTING MONTH: Red Team vs. Blue Team – How simulated attacks are cyber defences

Mature organisations attending the Cyber Secure Forum in both the public and private sectors are increasingly turning to red teaming and blue teaming (simulated attack and defence exercises) to rigorously test their cyber resilience. Red team exercises mimic real-world attackers. These ethical hackers use the same tactics, techniques, and procedures (TTPs) as cybercriminals, e.g. phishing, […]