IT Brief UK - Technology news for CIOs & IT decision-makers

CISA stories

Us corporate cyber control room incident response dashboard

Cyber leaders tip 2026 shift to resilience over prevention

Yesterday
#
cisa
Cyber chiefs predict 2026 cyber budgets will pivot from prevention and box-ticking to rapid response, recovery and demonstrable resilience.
Realistic control room industrial equipment computer monitors warning cyber threat

AI risks intensify cyber threats to critical infrastructure OT

Last week
#
cisa
AI deployment in critical infrastructure raises cyber security risks as attackers exploit operational technology networks with advanced AI-driven tactics.
Ps greg sullivan.cioso global

How managed service providers can help clients with CIRCIA

Last month
#
cisa
U.S. MSPs can support critical infrastructure clients in meeting CIRCIA's 2026 cyber incident reporting rules, ensuring faster detection and compliance readiness.
Rekha shenoy headshot 1200x677 2

Gaining control: The human role in AI-driven automation

Last month
#
cisa
Many network owners fear AI automation may disrupt vital systems; experts urge human-centred control to ensure safety and trust in AI-driven operations.
Image  5

QuSecure appoints Garfield Jones to drive quantum security shift

Last month
#
cisa
QuSecure appoints Garfield Jones as Senior VP to advance quantum-safe security, leveraging his US federal cybersecurity and post-quantum cryptography expertise.
Digital firewall protecting network of computer servers from malware

Check Point scores 99.59% in top firewall security report by NSS

Last month
#
cisa
Check Point topped NSS Labs’ 2025 firewall report with a 99.59% security effectiveness score, leading in malware and exploit defence amid rising cyber threats.
Person examining computer screen split image real human face vs digital manipulation

Deepfake threat grows as public & business struggle to keep up

Wed, 15th Oct 2025
#
cisa
Deepfake scams surge worldwide, with 49% of firms hit in 2024 as public and businesses struggle to spot convincing fake videos and audio.
Image001  17

NEC Security to safeguard GREEN×EXPO 2027 digital systems

Fri, 3rd Oct 2025
#
cisa
NEC Security will provide cybersecurity services to safeguard digital systems at the GREEN×EXPO 2027 in Yokohama, preparing for 15 million visitors.
Digital illustration secure data vault breached ai shapes futuristic padlocks quantum encryption cyber threats

Forrester forecasts agentic AI breaches & quantum spending surge by 2026

Thu, 2nd Oct 2025
#
cisa
Forrester predicts the first agentic AI data breach and a surge in quantum security spending by 2026, amid rising government control of telecoms.
Realistic hospital building digital padlocks hackers iot medical devices warning

Global ransomware attacks rise as healthcare faces surge in cyber threats

Fri, 22nd Aug 2025
#
cisa
Ransomware attacks surge to 20 daily incidents in 2025H1, with healthcare facing increased cyber threats and hackers targeting overlooked IoT devices worldwide.
Jen easterly

Jen Easterly joins Huntress as adviser amid USD $1.5bn expansion

Thu, 21st Aug 2025
#
cisa
Jen Easterly, former US cybersecurity chief, joins Huntress advisory board as firm expands with USD $1.5bn valuation and boosts AI cyber defence services.
Digital padlock ai network circuit lines cybersecurity protection

ISACA unveils AI security credential to boost cyber expertise

Thu, 21st Aug 2025
#
cisa
ISACA has launched the Advanced in AI Security Management credential to enhance cybersecurity expertise amid rising AI-driven threats.
Digital shield protecting data streams between computer servers quantum safe security

Microsoft sets 2033 deadline for post-quantum security rollout

Thu, 21st Aug 2025
#
cisa
Microsoft aims to complete its quantum-safe security rollout by 2033, integrating post-quantum cryptography across Windows, Azure and Microsoft 365 to counter future threats.
Ps   jen easterly   headshot

Jen Easterly joins Huntress Strategic Advisory Board for AI focus

Thu, 21st Aug 2025
#
cisa
Jen Easterly, ex-CISA Director, joins Huntress' Strategic Advisory Board to enhance AI-led cybersecurity as the firm advances its USD $1.5 billion growth.
Computer monitor shield software vulnerabilities icons windows interface

August Patch Tuesday: Microsoft addressing 111 vulnerabilities

Wed, 13th Aug 2025
#
cisa
Microsoft's August 2025 Patch Tuesday fixes 111 vulnerabilities, including nine critical remote code executions and a moderate zero-day flaw.
Secure server room with shield lock icons network cables australian motifs

HPE unveils integrated AI security & data protection upgrades

Wed, 6th Aug 2025
#
cisa
HPE expands AI-driven cybersecurity and data protection in Australia, integrating Juniper Networks tech to boost zero-trust and cyber resilience for enterprises.
Uk government building surrounded by chains and padlocks ransomware attack cyber threats

UK faces highest rate of ransomware payment in IT, Telecoms

Thu, 31st Jul 2025
#
cisa
New research shows 83% of UK public sector organisations hit by ransomware have paid ransoms, the highest rate globally despite a slight overall decline.
Medieval knight digital shield and new zealand map cyber defense illustration

New Zealand’s place in global cyber defence - From medieval knights to cybercriminals

Wed, 23rd Jul 2025
#
cisa
New Zealand faces mounting cyber threats from state-backed digital guerrilla warfare, urging urgent government action to safeguard critical infrastructure and national security.
Secure cloud above us government buildings encrypted data symbols locks

AppOmni secures FedRAMP Moderate ATO for SaaS security platform

Thu, 10th Jul 2025
#
cisa
AppOmni's SaaS Security Platform has gained FedRAMP Moderate ATO, enabling US federal agencies to protect critical cloud data with enhanced security and compliance.
Secure server room firewall network cables multifactor auth taiwan architecture

Zyxel advances Secure by Design for global SMB networking security

Thu, 10th Jul 2025
#
cisa
Zyxel Networks adopts CISA's Secure by Design Pledge, enhancing SMB networking security with MFA, unique passwords, and transparent vulnerability reporting worldwide.