Cybersecurity skills gap persists despite budget stabilisation

17 December 2025

Despite a reduction in cybersecurity budget cuts to 36% this year, an overwhelming 95% of organisations continue to face at least one critical skills gap, according to a recent ISC2 survey.

The findings highlight that staffing risks remain deeply entrenched, even as financial pressures begin to ease. Although 2024 saw widespread layoffs, hiring freezes, and budget reductions, there are early signs of stabilisation, with layoffs decreasing slightly to 24%. However, ISC2 warns that easing budget constraints do not mean organisations are out of danger, as ongoing funding limitations continue to hinder security teams and exacerbate staffing challenges.

Find out more

UK public sector faces diverse cybersecurity challenges

15 December 2025

A new study by Cohesity highlights the varied cybersecurity concerns across the UK's public sector, emphasizing that a one-size-fits-all approach is insufficient to address the complex and distinct risks faced by different services.

The research, conducted in partnership with Positive, surveyed 300 IT decision-makers across national government, local authorities, emergency services, and educational institutions.

Find out more

The next risk for tech leaders: a shrinking talent pipeline

12 December 2025

Imran Akhtar, Head of Academy, mthree

Artificial intelligence is transforming how technology teams work. Tasks that once took hours now take minutes. As teams grow leaner, many employers are cutting back on graduate and entry-level hiring, assuming that having smarter tools means requiring fewer hands.

The reality? This short-term logic risks creating a long-term gap in skills and, more importantly, experience that could stall an organisation’s progress for years.

Find out more
Redefining the perimeter: observability and security in the age of cloud complexity

12 December 2025

Pejman Tabassomi, Field CTO for EMEA, Datadog

Credential theft continues to pose a significant risk for enterprises operating in the cloud. In this environment, both human and machine identities now constitute the new security perimeter, meaning that a single leaked credential can provide attackers with access to an organisation’s most sensitive data. This risk has prompted teams to rethink their security models and develop new strategies (such as data perimeters and multi-account governance) to reduce exposure while maintaining operational agility.

Find out more