24th June 2025
Hilton London Canary Wharf
11th November 2025
Hilton London Canary Wharf

Taking online networking back to basics in IT

IT professionals are struggling to get value from online networking, knowledge-sharing and content driven platforms. Too many recruitment requests, questionable connections, and far too much time spent wading through promotional messages to reach the right content. Individuals need less noise, more relevance. Max Kurton, Editor in Chief, EM360 explains why it’s time for online networking […]

Who keeps the keys to the smart cities?

By Sean Wray, VP NA Government Programs, Certes Networks Smart cities seem inevitable. According to IDC, Smart City initiatives attracted technology investments of more than $81 billion globally in 2018, and spending is estimated to grow to $158 billion in 2022. Similarly, in 2018, the number of major metropolitan cities relying on or developing a comprehensive smart city plan – as opposed to implementing […]

Make the Most of Your People with the Benefits of Automation

By Ofer Elzam, Vice President & GM, FireMon GPC Gone are the days when IT leaders fretted that the benefits of automation would shove people out of jobs. If anything, it’s the opposite: 74% of cybersecurity professionals say that a skills shortage has affected their organizations, continuing a trend of concern over the past few […]

Most Urgent CISO Skills 2020: Reporting, Avoiding Burnout, More collaboration

By Jake Olcott, VP of Government Affairs, BitSight Since the creation of the first CISO role about 25 years ago, the job has changed dramatically. What was once an uncommon position has quickly become standard, with the majority of companies including a cybersecurity-specific role in their C-suites. As cybersecurity has gone from niche issue to mainstream business concern, […]

Four Steps to Security Automation Success

By Ofer Elzam, VP and GM, FireMon Cloud & Automation Solutions Security automation projects are making headlines, with everyone looking to automate at least some portion of the policy management process. Usually, the goal is to save time and money by automating firewall administration and policy management. However, these two categories have grown exponentially in […]

Barracuda: Growing confidence and emerging gaps in cloud security

For modern organisations, digital transformation is increasingly the only game in town. CIOs are turning to multiple cloud providers in droves for new app-based models, driving enhanced business agility to meet ever-changing market demands. Yet security remains a constant challenge. Web applications themselves remain a major target for data theft and DDoS. A Verizon report from earlier this year claimed that a quarter of […]

GUEST BLOG: The Growing DDoS Landscape

By Anthony Webb, EMEA Vice President at A10 Networks A new wave of DDoS attacks on South Africa’s internet service provider has highlighted that these attacks continue to grow in frequency, intensity and sophistication. A10 Networks’ recent report on the Q2 2019: The State of DDoS Weapons has shed more light on the loud, distributed nature of DDoS […]

VIDEO – Top tips to spot phishing attacks

By Falanx Phishing, viruses and ransomware are some of the most common attacks aimed at organisations of all sizes, with phishing emails proving the most successful. With this October being Cyber Security Awareness month, empower your staff to recognise and defend against these attacks. Here are some of the signs to look out for > https://falanx.com/cyber/top-tips-to-spot-phishing-attacks/

How to manage, detect and respond to a data breach

Can you be 100% confident that your business has not been compromised? How would you know if the attacker has not used malware or a virus that would be picked up by the perimeter defences? Even when a compromise is identified, many companies aren’t sure what the next steps should be. It is the speed […]

Is email security training a waste of your time?

If users are the ones being tricked, train users and they won’t get tricked. Easy! Except it doesn’t quite work like that. Can user training ever hope to keep pace with the constantly evolving threat landscape? And who decided user training was the right solution in the first place? Click here to read the latest […]