Inside the Mind of the UK CISO:
2025’s Top Cybersecurity Challenges

Chief Information Security Officers (CISOs) at large UK companies face a broad spectrum of cybersecurity challenges. These include an ever-evolving threat landscape, stringent regulatory demands, and practical constraints around resources and technology. Below, we outline key challenge areas and their impact on UK organizations, supported by recent findings and expert insights.

Contents

Current Threat Landscape

Regulatory & Compliance Challenges

Data Protection (GDPR): UK companies must comply with the UK GDPR and Data Protection Act, which mirror EU GDPR requirements. This means strict rules on protecting personal data, breach notification within 72 hours, and potential fines of up to 4% of global turnover for non-compliance. Large enterprises handle vast amounts of customer and employee data, so CISOs must ensure robust privacy controls, from encryption to access governance, to avoid regulatory penalties. High-profile UK cases (like fines against British Airways and Marriott for data breaches) keep GDPR compliance at the forefront of CISO agendas.

  • NIS2 and UK Cyber Laws: Although the UK is no longer in the EU, the EU’s new NIS2 Directive (effective late 2024) still affects British companies with European operations or customers. Many UK businesses will need to adhere to NIS2’s cybersecurity risk management and incident reporting requirements to continue operating in EU markets. This is proving challenging – over one-fifth of the UK’s largest firms admit they are “not sure” if NIS2 even applies to them, and about 10% of big companies subject to NIS2 weren’t compliant by the October 2024 deadline. In response, the UK government is introducing its own Cyber Security and Resilience Act (trailed in the King’s Speech 2024) to mirror and build upon NIS2 for UK critical industries. CISOs must navigate these evolving laws, which are likely to mandate stricter security controls and executive accountability for cyber risk. There is added pressure as regulators signal that company directors could face personal liability for major compliance failures.

  • Standards and Certifications (ISO 27001, Cyber Essentials): Adopting security frameworks is both a best practice and often a client expectation. International standards like ISO/IEC 27001 provide a comprehensive blueprint for information security management. Many large UK organisations pursue ISO 27001 certification to demonstrate their commitment to security – about 27% of large UK businesses have achieved ISO 27001 compliance. However, maintaining such certifications is resource-intensive, requiring continuous risk assessments, audits, and policy updates. Some security leaders view ISO 27001 as rigorous but necessary, whereas simpler schemes like the UK’s Cyber Essentials are seen as a baseline “tick-box exercise” covering only basic controls. Balancing these standards with day-to-day security needs is an ongoing challenge, especially when regulations (GDPR, NIS2) demand evidence of effective controls that these frameworks help provide.

  • Compliance Reporting and Audits: Large enterprises often must comply with multiple regulators and industry-specific rules (e.g. financial firms under FCA rules, healthcare under NHS DSP Toolkit). CISOs struggle with the overhead of producing audit reports, breach notification reports, and compliance documentation for various bodies. For example, GDPR and NIS2 both impose breach reporting mandates that require mature incident response and record-keeping. Ensuring that all business units follow policy and documenting that compliance can be difficult in organisations with thousands of employees. As regulations evolve, CISOs must update practices promptly – a moving target that requires constant vigilance and adaptation.

Cloud & IT Security Risks

Cloud Misconfigurations: The rapid cloud adoption in UK enterprises has introduced new vulnerabilities. Misconfigured cloud services (e.g. storage buckets left open or lax identity settings) are a leading cause of data breaches. In 2023, over 80% of data breaches involved data stored in the cloud, often due to configuration errors. This “silent saboteur” happens when cloud security settings are complex or overlooked, accidentally exposing sensitive information. UK companies are increasingly using multi-cloud environments, amplifying the risk of gaps. CISOs must enforce strong configuration management, continuous cloud security posture monitoring, and staff training to avoid costly cloud leaks.

  • Supply Chain Vulnerabilities: Large organisations depend on numerous third-party suppliers and software vendors, which expands the attack surface. Supply chain attacks – where adversaries compromise a less-secure partner to infiltrate a target – have surged. A 2024 study found 95% of UK businesses experienced a cybersecurity incident through their supply chain in the past year, a higher rate than the global average. Worryingly, one-third of UK firms said they have no way to detect incidents in their supply chain. High-profile examples include software supply chain breaches (like the SolarWinds incident) and compromises of managed service providers impacting many clients. Despite the risk, 66% of UK organisations admit that third-party risk management is still not a major priority for them. CISOs are working to change this by conducting supplier security audits, insisting on standards (some require key vendors to hold ISO 27001 or Cyber Essentials), and incorporating contractual security requirements. New regulations (e.g. NIS2, and the EU’s DORA for finance) are also pushing companies to strengthen supply chain security.

  • Securing Hybrid Work Environments: The shift to remote and hybrid work has permanently changed corporate IT risk. With employees spread between office and home, the network perimeter has blurred. Home offices often lack the robust protections of corporate networks, and personal or unmanaged devices may connect to company data. This has led to a spike in threats: 69% of UK organisations report an increase in network security threats over the past 18 months, with most attributing it largely to remote/hybrid working. CISOs cite remote endpoints as a major weak link – 73% of UK CISOs believe that off-site employee devices are their biggest security vulnerability. These devices frequently miss patches and updates, falling “weeks or even months” behind on security fixes. To tackle this, companies are implementing Zero Trust strategies (never implicitly trusting a device or network, always verifying), stronger VPN and encryption for remote access, and endpoint security tools that can be managed over the cloud. Nonetheless, maintaining visibility and control over a dispersed IT environment remains a serious challenge. Nearly 72% of UK CISOs say that remote working has complicated their organisation’s cyber resilience posture, as attacks can now originate from any employee’s home network or personal email. Ensuring consistent security monitoring and incident response across on-premises and cloud systems is an ongoing priority.

  • IT Complexity & Legacy Systems: Large enterprises often operate a patchwork of legacy on-premise systems, newer cloud services, and various networking technologies. This complexity itself is a risk – 87% of UK IT leaders say a heterogenous network (multiple vendors and systems) creates management and security issues. Aging legacy systems, especially in industries like manufacturing and utilities, may not receive regular updates and can be incompatible with modern security tools. Attackers exploit these weak points; for example, older operating systems in OT (operational technology) environments are highly vulnerable to ransomware and malware that newer systems could fend off. CISOs must devise strategies to segment and protect legacy assets (often through network segmentation, virtual patching, and strict access control) while advocating for long-term IT modernisation. Balancing digital transformation initiatives with the need to close legacy security gaps is a delicate task in many UK firms.

Budget & Resource Constraints

Limited Cybersecurity Budgets: Even as cyber threats intensify, CISOs often face limitations on funding. Security competes with other business priorities, and economic pressures can tighten purse strings. In 2024, 49% of UK CISOs reported that the current economic downturn has hampered their ability to make critical security investments. Nearly half have been asked to cut security staff or delay new hires, and to trim budgets where possible. Justifying cybersecurity spend to boards and executives is a constant challenge – the ROI of preventing breaches (an avoided incident) can be hard to quantify. CISOs are addressing this by framing cybersecurity in terms of business risk and impact, using metrics (like potential financial loss from downtime or fines) to make the case that proactive spending is cheaper than reacting to a major breach. The good news is board awareness is improving; 84% of UK CISOs say their board now sees eye-to-eye with them on cybersecurity issues. Still, obtaining sufficient budget for advanced tools, skilled personnel, and training requires continuous executive education and advocacy.

  • Cyber Skills Shortage: A shortage of skilled cybersecurity professionals is an acute problem in the UK. Organisations struggle to recruit and retain talent such as security analysts, cloud security architects, and incident responders. Across the UK economy, half of businesses have basic technical security skills gaps, and 48% lack adequate incident management skills. The cyber workforce gap in the UK is estimated at over 93,000 unfilled positions in 2024 – a 27% increase from the previous year. This talent crunch leaves existing security teams overextended and can delay critical security initiatives. Large companies often end up competing for the same limited pool of experts, driving up salaries. Many CISOs resort to outsourcing (managed security services) or automation to fill the gap, but certain functions still need human expertise. Upskilling internal staff and running graduate apprenticeship programs are strategies being used to build talent from within. Nonetheless, in the short term, the skills shortage means CISOs must do more with smaller teams, and critical tasks like 24/7 monitoring or incident response can suffer if staff are stretched thin.

  • Resource Burnout & Turnover: Limited headcount and high pressure contribute to burnout among security leaders and their teams. Over half (54%) of UK CISOs say they have experienced burnout, and 62% feel the expectations on them are excessive. Security teams often work long hours, especially during incidents, which can lead to high turnover. Talent retention is a challenge when stress levels are high; ironically, losing experienced staff then further worsens the resource crunch. Additionally, CISOs themselves face personal liability worries – 61% are concerned about being held personally accountable for breaches – adding to job stress. To cope, companies are emphasising work-life balance, rotating on-call duties, and providing mental health support for cybersecurity staff. Some relief is coming as boards recognise these issues; for example, many organisations now offer Directors & Officers insurance for CISOs and are prioritising discussions about realistic security expectations.

  • Proving ROI to Executives: Converting cybersecurity needs into business terms remains an art form CISOs must master. They need to justify expenditures on preventive measures (which, if effective, result in “nothing happening,” making success invisible). One approach is scenario-driven: illustrating how a major incident (like a ransomware outage or data breach) could cost millions in recovery, fines, and lost revenue, far outweighing the cost of proposed controls. Another tactic is benchmarking and compliance: showing executives how the company stacks up against industry security standards or regulatory requirements – failing to invest could mean falling out of compliance (with associated penalties). Many CISOs present dashboards or risk reports to boards, translating technical issues into risk categories (financial risk, operational risk). The encouraging trend is that more boards are receptive to these conversations now. As noted, board-CISO alignment in the UK has improved significantly since 2022. Still, in tight economic times, cybersecurity budgets are often scrutinised, and CISOs must continuously demonstrate value, such as by highlighting how strong security enables business objectives (e.g. winning client trust, maintaining uptime, protecting brand reputation).

Emerging Technologies & AI Risks

Generative AI Risks: The rise of generative AI tools (like ChatGPT and other large language models) presents a double-edged sword for CISOs. On one hand, these tools can boost productivity and even aid in defensive security (by quickly analysing threats or automating tasks). On the other hand, they introduce new risks. Nearly half (44%) of UK CISOs believe generative AI poses a security risk to their organisation. Concerns include sensitive data being fed into cloud AI tools (which could leak proprietary information), AI models being manipulated (poisoned) by adversaries, and the creation of ever-more convincing phishing content by attackers. In fact, UK security leaders rank generative AI systems as the top new technology introducing risk to their business, above even critical network infrastructure. Companies are starting to develop policies around employee use of AI (for example, disallowing input of confidential data into public AI services) and monitoring for AI-generated content in attacks.

  • AI-Powered Cyber Defenses: CISOs are also exploring artificial intelligence to enhance their defenses. Machine learning algorithms can detect anomalies in network traffic, flag subtle indicators of phishing, or respond to threats faster than a human. There is growing optimism about AI’s role in mitigating human error and advanced threats – 87% of UK CISOs say they are looking to deploy AI-driven security capabilities to help protect their organisations. Examples include AI-based email filters that catch phishing emails with suspicious language patterns, or behavioral analytics that spot account takeovers. However, adopting AI for cybersecurity isn’t plug-and-play; many security teams lack sufficient AI expertise. Globally, CISOs cite insufficient AI knowledge and skills on their teams, along with talent shortages, as top inhibitors to effectively using AI in defence. Thus, while AI offers promise, CISOs must carefully evaluate solutions to avoid overreliance on black-box algorithms and ensure they have staff who understand and can manage these tools. There’s also caution that attackers may attempt to trick or evade defensive AI (through adversarial attacks), so human oversight remains crucial.

  • Emerging Tech (IoT, OT, and Quantum): Beyond AI, other emerging technologies are on the CISO’s radar in large enterprises. Internet of Things (IoT) devices and Industrial IoT in manufacturing bring many new endpoints that need securing – everything from smart sensors in factories to connected devices in offices can be entry points if not managed. IoT devices often lack strong built-in security, and the UK government has introduced IoT security regulations (through the Product Security and Telecommunications Infrastructure Act) to mandate things like unique device passwords and security update transparency. CISOs in sectors like manufacturing and utilities are particularly wary, as older operational technology being connected to IT networks creates vulnerabilities. Additionally, quantum computing is on the horison; while not an immediate threat, CISOs are beginning to consider the long-term need for quantum-resistant cryptography to protect sensitive data from future quantum decryption capabilities. Keeping abreast of such technologies is itself a challenge – it requires ongoing research, upskilling, and often investing early in new security tools (for instance, network segmentation and anomaly detection for IoT environments) to stay ahead of the curve.

  • AI-Augmented Threats: As noted earlier, attackers’ use of AI is a significant emerging risk. Malware-as-a-Service platforms are starting to incorporate AI to better evade antivirus, and phishing campaigns use AI to personalise at scale. For example, recent reports in the UK manufacturing sector highlight malware that can learn from its environment and adapt to exploit weaknesses in systems. Deepfake technology (for voice and video) is advancing, lowering the cost and skill needed to produce convincing fakes. This could elevate social engineering attacks – not just via phone scams, but potentially fake video calls from what appears to be a trusted colleague or CEO. The arms race is evident: 78% of CISOs say AI-driven threats are significantly impacting their organisations, but at the same time 60% now feel more prepared to defend against them (up from the prior year. This indicates that while the threat is maturing, so are defensive strategies. CISOs are pushing for continuous innovation in their security programs to incorporate AI threat intelligence feeds, automated incident response playbooks, and other advanced countermeasures to keep pace with attackers.

Email & Ransomware Threats

Ransomware Attacks: Ransomware remains one of the most prevalent and damaging threats. A majority of UK CISOs (51%) identify ransomware as their top cybersecurity concern. Nearly half of surveyed UK enterprises have already been hit by a ransomware attack in the past year. These attacks can halt operations for days; about 65% of affected businesses reported over six days of downtime after a major ransomware incident. Modern ransomware gangs employ double extortion (encrypting data and threatening to leak it) to increase pressure on victims, leading to significant financial and reputational damage.

  • Phishing & Social Engineering: Email-based phishing is by far the most common attack vector for UK companies. In fact, 84% of UK businesses that suffered breaches in the last year were victimised by phishing emails. Attackers use deceptive messages to steal credentials or deliver malware. Business Email Compromise (BEC), a form of phishing where criminals impersonate executives or suppliers, is a growing concern – 35% of UK CISOs rank BEC among their top threats. These attacks exploit human trust; human error is viewed as the biggest vulnerability by 65% of UK CISOs. Insider threats – whether malicious insiders or unintentional mistakes by staff – continue to cause data breaches and financial losses.

  • Insider Threats: Both malicious insider activity and employee negligence pose ongoing challenges. With more data accessible across large workforces, CISOs worry about insiders leaking or mishandling sensitive information. In 2024, 39% of UK security leaders reported a material loss of sensitive data, and in 69% of those cases departing employees were a contributing factor. This underlines the need for robust insider risk programs, monitoring, and staff training. On the positive side, most UK CISOs feel they are improving internal defenses (e.g. adoption of data loss prevention tools has jumped to 55% in 2024 from 34% in 2023).

  • AI-Driven Attacks: Adversaries are increasingly leveraging artificial intelligence to enhance attacks. Threat actors use AI to craft more convincing phishing lures, automate malware adaptations, and even generate deepfake content. For example, criminals have used AI voice-cloning to impersonate CEOs – one UK company was defrauded of $243,000 via a deepfaked voice scam. Over three-quarters of CISOs (78%) say AI-powered threats are already having a significant impact on their organisations. State-sponsored hackers and cybercriminal groups are employing AI to make attacks more targeted, scalable, and evasive. This evolution in tactics means CISOs must prepare for threats like AI-generated phishing emails, deepfake-enabled fraud, and malware that can adapt in real time to avoid detection.

Email Security & Phishing: Email continues to be the lifeblood of corporate communication – and the favorite target of attackers. UK enterprises see email threats as a top concern, since phishing is implicated in the vast majority of breaches. Phishing emails today go beyond the classic Nigerian prince scam; many are highly sophisticated, tailored to the target (spear phishing) and sometimes even AI-generated for realism. Attackers might scrape LinkedIn or use leaked personal data to craft messages that appear legitimate. Business Email Compromise (BEC) schemes have cost UK firms millions – attackers trick employees into wiring funds or sending sensitive files by impersonating suppliers or executives. Unlike mass spam, BEC attacks are low-volume and precisely targeted, making them harder to detect. To combat these, large companies are investing in advanced email filtering, threat intelligence, and ongoing user education. There’s cautious optimism, as 84% of UK CISOs believe their employees now understand their role in protecting the organisation (thanks to phishing awareness training and simulations). However, the threat is unrelenting: new phishing techniques like smishing/vishing (SMS and voice phishing) are on the rise, and even tech-savvy users can be fooled by a well-crafted fake email or call. The use of deepfake audio in phone scams (as in the case of the AI-generated CEO voice) is an alarming trend that blurs the line between email and voice fraud. Consequently, CISOs are implementing multi-factor authentication and verification policies (e.g. requiring callbacks or secondary confirmation for fund transfer requests) to add layers of defense against email-based fraud.

  • Ransomware Trends: Ransomware is such a dominant threat that it merits special focus for large organisations. Over the past few years, ransomware attacks have evolved from simple encryption hold-ups into complex data heists and extortion campaigns. UK companies across all sectors – from finance to healthcare to manufacturing – have been targeted. In sectors like manufacturing, ransomware hit 34% of businesses in 2023, and that proportion is projected to rise to 42% in 2024. Attackers are increasingly using “ransomware as a service” models, where affiliate gangs purchase ready-made ransomware kits (sometimes with AI enhancements to evade security) and share profits with the developers. They typically infiltrate via phishing or exposed remote access services, then spread silently, targeting backups and exfiltrating data before triggering the encryption. The impact on large enterprises is severe: operations may be disrupted worldwide, sensitive data (including personal data under GDPR) can be leaked, and recovery is expensive. Many UK firms have cyber insurance, but policies are evolving with stricter requirements and not all costs are covered. Notably, 60% of UK CISOs believe their organisation would consider paying a ransom to restore systems and prevent data release, although this is down from 75% the year before. Law enforcement (and the NCSC) advise against paying ransoms, as it can encourage further attacks, but in practice some companies feel they have no choice when customer data or critical services hang in the balance. CISOs are focusing on resilience measures: maintaining reliable offline backups, practicing incident response drills, and implementing network segmentation to contain the blast radius of a ransomware outbreak. Yet, the ransomware threat is growing in sophistication – recent strains incorporate AI to dynamically thwart endpoint defenses, and attackers often time their strikes (e.g. weekends or holidays) for maximum damage. This threat landscape means CISOs must keep ransomware at the top of their risk register and ensure the entire organization (from the server room to the boardroom) is prepared to respond to an attack.

  • Double Extortion and Data Leaks: A significant trend in ransomware is the move to double extortion. Attackers not only encrypt files but also steal large volumes of data and threaten to publish it if the ransom isn’t paid. For UK companies, this turns a cybersecurity incident into a data breach crisis – involving legal, regulatory, and public relations responses. GDPR mandates breach disclosure to authorities and possibly to affected individuals if personal data is leaked, so a ransomware attack now often triggers regulatory scrutiny as well. The prospect of leaked trade secrets or customer information can drive some firms to pay ransoms even if they could restore from backup. In 2024, about 80% of UK CISOs said they would rely on cyber insurance to cover ransomware losses, reflecting how prevalent and costly these incidents have become. CISOs are therefore not only trying to prevent ransomware intrusions, but also limiting impact by encrypting data at rest (so stolen files are useless to extortionists) and carefully controlling access (to prevent one compromised account from accessing terabytes of data). They are also working closely with legal and compliance teams to formulate breach response plans in advance. The battle against ransomware is as much about preparation and response as it is about prevention, given that attackers constantly find new ways in.

  • Continuous User Awareness: Both phishing and ransomware often start by exploiting human factors, so user awareness remains a core defense. Large UK companies conduct regular security awareness training, phishing email drills, and strict policies (like forbidding unknown USB drives or requiring verification for unusual requests). The culture is slowly shifting – employees are more alert to suspicious emails or links now than a few years ago. Still, attackers adapt their lures to current events (e.g. fake delivery notices, pandemic-related scams, or urgent-looking messages from “IT support”). CISOs also have to combat “alert fatigue”: with so many warnings about cyber threats, staff might become desensitised. Thus, training content must be engaging and updated frequently with real examples. Metrics from these programs (like reporting rates of fake phish vs. click rates) help gauge where more education is needed. Given that email and ransomware threats are here to stay, fostering a vigilant workforce is one of the most effective ways for CISOs in the UK to reduce risk.

The Four Pillars of CISO Success

To help UK CISOs cut through the noise and focus on what matters, we’ve mapped out four strategic stages that underpin an effective cybersecurity approach. From securing your human layer to proving outcomes to your board, these pillars reflect how today’s leaders are prioritising their defences.

Where Do We Go From Here?

CISOs of large UK enterprises are grappling with a multifaceted security landscape. They must defend against relentless cyber threats like phishing and ransomware, which are growing more sophisticated with the aid of AI. At the same time, they are tasked with steering their organisations through tightening regulatory waters – from GDPR to new national laws – and proving to auditors and boards that their security posture is robust. All of this must be achieved often under resource constraints and talent shortages, requiring creative strategies to do more with less.

The good news? Awareness at the executive level in the UK is higher than ever. Boards increasingly recognise cybersecurity as a core business risk. This top-down support will be crucial as CISOs invest in modern defences (like zero trust architectures and AI-driven security tools) and build resilience against worst-case scenarios. The evolving threat landscape – with attackers weaponising emerging technologies – demands constant adaptation. By focusing on fundamentals (cloud configuration, supply chain oversight, employee awareness) while staying agile, UK CISOs are positioning themselves to defend their organisations and protect long-term trust.

How Peritus Cloud Security Can Help

At Peritus, we speak to security leaders every day — and the challenges outlined in this report are the ones we hear most often. From third-party risk and cloud misconfigurations to phishing defence and Zero Trust implementation, our services are designed to meet the needs of modern CISOs.

Here’s how we help businesses like yours stay proactive and resilient:

Comprehensive Security Assessments – Know Your Gaps: We uncover misconfigurations, vulnerabilities, and compliance gaps across cloud and on-prem environments — identifying high-risk issues before attackers do. You’ll receive clear, prioritised actions tailored to your estate.

Third-Party Risk Management – Secure the Supply Chain: We help you evaluate and control vendor access, enforce least privilege, and monitor for anomalies – so even if a supplier is compromised, your business stays protected.

Advanced Threat Detection & Response – Stop Attacks Early: Our managed XDR and 24/7 SOC services combine machine learning with real-time monitoring, alerting you to unusual activity before damage occurs.

Human Risk Management – Fortify Your First Line: We deliver engaging training, phishing simulations, and executive coaching to turn employees from a vulnerability into a strength.

Zero Trust & Cloud Security – Build it Right: We guide you through Zero Trust architecture and cloud posture management, helping you reduce risk while modernising securely.

Incident Response Readiness – Be Prepared, Not Panicked: From tabletop exercises to live response, we make sure your team is ready if a breach occurs — and can act decisively to contain it.

Ongoing Advisory & vCISO Support – Stay Ahead: Our strategic advisors work with you on governance, compliance, and threat adaptation — aligning your security to your business.

Why Peritus? We’re vendor-neutral, fast-moving, and practical. Our consultants are senior experts with real-world experience — and our mission is simple: to deliver cloud security that works. No jargon. No fluff. Just clarity, control, and confidence.

If you’re ready to strengthen your cybersecurity posture and stop firefighting, let’s talk.


Sources:

  • UK Government Cyber Security Breaches Survey 2024 – official statistics on breach prevalence and attack typesgov.ukgov.uk

  • Proofpoint Voice of the CISO 2024 – survey of UK CISOs’ top perceived threats and challengesproofpoint.comproofpoint.com

  • Absolute Security UK CISO Cyber Resilience Report 2024 – insights on budget constraints, remote work risks, and ransomware incidenceabsolute.combusinesswire.com

  • Networking+ (Green Raven survey) – findings that 20% of large UK firms’ security heads lack clarity on NIS2 obligationsnetworkingplus.co.uk

  • Computer Weekly – analysis of NIS2’s ripple effect on UK businesses and upcoming UK cyber lawscomputerweekly.comnetworkingplus.co.uk

  • BlueVoyant State of Supply Chain Defense 2024 (UK) – data on third-party risk impacts (95% incidents via supply chain)bluevoyant.com

  • Darktrace 2025 State of AI Cybersecurity – report on CISOs seeing increased AI-driven threats (78% reporting significant AI threat impact)streetinsider.com

  • TechForce UK Cyber Trends 2024 – statistics on top threats (81% phishing, 79% ransomware) and ransomware downtime impactstechforce.co.uktechforce.co.uk

  • SecurityBrief UK – report on rising AI-enhanced attacks in manufacturing (ransomware hitting 34% in 2023)securitybrief.co.uk

  • UK Gov Cyber Skills in Labour Market 2024 – study on skills gaps (48% lack incident response skills)gov.ukand workforce shortagescomptia.org

  • Trustpair (Fraud analysis) – case study of AI deepfake voice fraud in a UK firmtrustpair.com

  • Daisy “State of Networking 2024” via ComputerWeekly – survey linking hybrid work to 69% threat increase in UK orgscomputerweekly.com and network complexity issues.