17 December 2025
Despite a reduction in cybersecurity budget cuts to 36% this year, an overwhelming 95% of organisations continue to face at least one critical skills gap, according to a recent ISC2 survey.
The findings highlight that staffing risks remain deeply entrenched, even as financial pressures begin to ease. Although 2024 saw widespread layoffs, hiring freezes, and budget reductions, there are early signs of stabilisation, with layoffs decreasing slightly to 24%. However, ISC2 warns that easing budget constraints do not mean organisations are out of danger, as ongoing funding limitations continue to hinder security teams and exacerbate staffing challenges.
Find out more15 December 2025
A new study by Cohesity highlights the varied cybersecurity concerns across the UK's public sector, emphasizing that a one-size-fits-all approach is insufficient to address the complex and distinct risks faced by different services.
The research, conducted in partnership with Positive, surveyed 300 IT decision-makers across national government, local authorities, emergency services, and educational institutions.
Find out more
12 December 2025
Imran Akhtar, Head of Academy, mthree
Artificial intelligence is transforming how technology teams work. Tasks that once took hours now take minutes. As teams grow leaner, many employers are cutting back on graduate and entry-level hiring, assuming that having smarter tools means requiring fewer hands.
The reality? This short-term logic risks creating a long-term gap in skills and, more importantly, experience that could stall an organisation’s progress for years.
Find out more12 December 2025
Pejman Tabassomi, Field CTO for EMEA, Datadog
Credential theft continues to pose a significant risk for enterprises operating in the cloud. In this environment, both human and machine identities now constitute the new security perimeter, meaning that a single leaked credential can provide attackers with access to an organisation’s most sensitive data. This risk has prompted teams to rethink their security models and develop new strategies (such as data perimeters and multi-account governance) to reduce exposure while maintaining operational agility.
Find out more



