Questions raised as to whether US government agencies can implement zero trust policies in short-term
75% of U.S. federal agencies will fail to implement zero trust security policies by 2026 due to funding and expertise shortfalls. That’s according to Gartner, which defines zero trust as a security paradigm that starts from the baseline of trusting no end user, and explicitly identifies users and grants them the precise level of access […]
PHISHING DETECTION MONTH: Casting a wider net in the fight against cybercrime
Phishing attacks remain a major cyber threat for organisations in the UK’s public and private sectors. These often sophisticated scams can cause significant financial losses, data breaches, and reputational harm. Fortunately, advancements in phishing detection solutions are empowering CIOs to stay ahead of cybercriminals. Let’s explore the key recent and future trends in this critical […]
Financial sector subject to cyber attack ‘death by a million cuts’
BlackBerry’s Global Threat Intelligence Report states that threat actors focusing efforts on targeting high-value data held by the global financial sector, with one million attacks logged over the 120 day period. This “death by a million cuts” is revealed to be using mainly commodity malware, which indicates a large number of independent actors targeting the […]
30% of increasing demand for APIs will come from AI and LLM
More than 30% of the increase in demand for application programming interfaces (APIs) will come from AI and tools using large language models (LLMs) by 2026, according to Gartner. “With technology service providers (TSPs) leading the charge in GenAI adoption, the fallout will be widespread,” said Adrian Lee, VP Analyst at Gartner. “This includes increased […]
INTRUSION DETECTION MONTH: Standing Guard – Sourcing the best IDS solutions
CISOs (Chief Information Security Officers) across public and private sectors face a monumental challenge: safeguarding sensitive data and critical infrastructure. Intrusion Detection Systems (IDS) play a vital role in this fight, acting as digital sentinels that identify and alert security teams to potential cyberattacks. However, selecting the right IDS provider can be a complex task. […]
Cyber Secure Forum: 50% of delegate places already allocated!
As a senior professional in the cyber security industry, we’d like to send you an exclusive invitation to a niche event we’re hosting this June: The Cyber Secure Forum. We have a limit of 45 professionals who can attend, (over half have already been filled)!. Some details below: Cyber Secure Forum | Tuesday 25th June […]
If you specialise in Phishing Detection we want to hear from you!
Each month on Cyber Security Briefing we’re shining the spotlight on a different part of the cyber security market – and in April we’re focussing on Phishing Detection solutions. It’s all part of our ‘Recommended’ editorial feature, designed to help IT security buyers find the best products and services available today. So, if you’re an Phishing […]
IT experts poll: Elon Musk is ‘wrong’ that no jobs will be needed in the future
Elon Musk’s claim that AI will make all human jobs irrelevant should not be taken seriously, according to a survey of tech experts conducted by BCS, The Chartered Institute for IT. During an interview with UK Prime Minister Rishi Sunak for the AI Safety Summit last year, Musk said: ‘There will come a point where […]
INTRUSION DETECTION MONTH: Fortressing the Digital Realm from anomaly detection to predictive analytics
Chief Information Security Officers (CISOs) shoulder heavy responsibility for safeguarding sensitive data and critical infrastructure. Intrusion Detection Systems (IDS) and related services play a crucial role in this ongoing battle, acting as the frontline defence against cyberattacks. This article explores how CISOs in the UK are utilising these technologies and how intrusion detection strategies are […]
ACCESS CONTROL MONTH: Navigating the Maze – Sourcing trusted access control solutions for CIOs
Securing physical and digital access is paramount for any organisation. For Chief Information Officers (CIOs), the responsibility of selecting a trusted access control solutions provider carries significant weight. This article explores key approaches to guide CIOs in navigating the diverse landscape and finding the ideal partner… 1. Define Your Needs Clearly: Start by conducting a […]