11th November 2025
Hilton London Canary Wharf
June 2026
Hilton London Canary Wharf

How to block hidden malicious commands in obfuscated scripts

UK Hacking Fines

By Chris Corde, VP of Product Management, VMWare Carbon Black For a long time now, our Threat Analysts have flagged the growing threat of script-based attacks, especially from Microsoft PowerShell and Windows Management Interface script commands, and their ability to escape notice in many antivirus solutions. Increasingly, these types of attacks have become the common standard […]

Giving resellers the key to unlocking end user continuity, productivity and flexibility

By Dave Manning, Operations Director, Giacom Until recently, the transition to working from home was unfolding at a gradual pace for many businesses. Although there is much research to back up the benefits of flexible and remote working, many business leaders remained sceptical, believing that office working remained the setup that would be most productive […]

The growing DDoS landscape 

By Anthony Webb, EMEA Vice President at A10 Networks   Last month, news reports highlighted one of the biggest DDoS attacks ever recorded. The attack, which targeted a large European bank, generated 809m packets per second (Mpps). This is a new industry record for a PPS-focused attack which is more than double the size of previous attacks. A10 Networks recently launched its Q2 2020: State of DDoS Weapons Report, based on […]

Data centre pre-construction – The devil is in the detail

By Jon Healy, Operations Director at Keysource Having a detailed pre-construction phase undertaken before starting the design and build or upgrade of a data centre facility has a number of major benefits, however many organisations choose to sidestep this part of the process. In my experience this is a false economy that can often result in, at […]

In case you missed ZIVVER at the Security IT Summit…

By Zivver Last month marked ZIVVER’s first appearance at the Security IT Summit and we had a great time meeting so many people (virtually). If you took some time during the summit to connect with us, we look forward to staying in touch! And if you missed your chance to meet with us at the […]

Mind the gap: Upskilling cyber security teams

By Matt Cable, VP Solutions Architects & MD Europe, Certes Networks, is of interest at all? At the end of 2019, it was reported that the number of unfilled global IT security positions had reached over four million professionals, up from almost three million at the same time the previous year. This included 561,000 in North America and […]

Breaking down AI’s role in cybersecurity

Data security is now more vital than ever. Today’s cybersecurity threats are incredibly smart and sophisticated. Security experts face a daily battle to identify and assess new risks, identify possible mitigation measures and decide what to do about the residual risk.  This next generation of cybersecurity threats require agile and intelligent programs that can rapidly adapt to new and unforeseen attacks. AI […]

Proving ROI in cyber security

Research shows that almost half of businesses have reported cyber security breaches or attacks in the last 12 months. Amongst these businesses that identified breaches or attacks, more have experienced these issues at least once a week so far this year. Moreover, the unprecedented events of recent months have seen the number of attempted data breaches continue to rise, […]

The first and last line of defence

As the frequency and sophistication of cyber attacks increase at an alarming rate, much attention has been paid to high-profile data breaches of enterprise companies. Just recently, EasyJet revealed that the personal information of 9 million customers was accessed in a cyber attack on the airline; and the examples don’t stop there. British Airways was […]

Without automation, security gets harder during a business disruption

FireMon’s 2020 State of Hybrid Cloud Security Survey found that 69.5 percent of respondents have a security team of just 10 people or fewer.  And  most manage both on-premise network security and cloud security.   These teams are already bogged down with manual tasks at the best of times, so when a crisis  hits, it magnifies the risks of manual processes. Not only is it difficult to maintain essential network operations, but the number of misconfigurations that threaten compliance go up dramatically.  Worse still, if unexpected interruptions to […]