24th June 2025
Hilton London Canary Wharf
11th November 2025
Hilton London Canary Wharf

Smart access: What if biometrics were the foolproof solution for infrastructure protection?

By Céline Littré, Product Marketing Manager at Linxens Biometrics are already well known and used in sectors such as identity and payments, but their use could also be relevant to access control for both IT and physical infrastructures? Access to IT infrastructures As the number of reported cyber-attacks has multiplied, companies, which until recently were […]

Fintech: How financial technology is benefitting businesses, and impacting security

Is your business operating as efficiently as it could be? For smaller businesses and startups, maximising efficiency can be the difference between surviving and thriving. In today’s rapidly-evolving commercial landscape, being an early adopter of the latest technology can set your business apart from the rest, open the door to a wider market of potential […]

The changing role of partners in SAP’s new cloud mindset

Recent changes from SAP has left many partners wondering what the next steps are in providing cloud services, especially given  SAP’s insistence on developing a ‘cloud mindset’, and emphasising its Activate Methodology and Fit to Standard workshops to achieve this.  Up until this point, a change of direction to the cloud has had little impact […]

The importance of Zero Trust Architecture

By Cathal Judge (pictured), Founder and CEO of CISO Assurance Global Zero Trust security architecture adoption is on the rise, and with good reason. The Network and Information Security (NIS2) Directive requires the adoption of best-practice security architecture, to ensure state of the art security of European networks and information systems. Likewise, the GDPR requires […]

The Cloud Revolution: A call for improved security measures

By Aleksandr Värä, Technical Sales Director of Crayon Recent years have seen a significant shift towards the adoption of cloud services by businesses, and the pace is only accelerating. Over 80% of IT leaders already use hybrid cloud solutions, which combine the strengths of public cloud providers like AWS and Google Cloud with private hardware. […]

Six key considerations for ITAD security

IT asset disposition (ITAD) is the practice, method and means of disposing of IT hardware. The legal and compliance demands companies face mean that the data held on computers, devices and other physical assets can become a liability without an audited process in place. With new methods for data protection becoming increasingly crucial for business […]

The Cyber Security Roadshow you should be at in London on 19th April!

Your peers are registering for Tessian’s Fwd: Thinking Roadshow and so should you! This half day, complimentary event will take place aboard HMS Belfast, London, and is dedicated to helping forward thinking security teams navigate the ever-changing threatscape. Hear from the top CISOs and industry experts who have paved the way when it comes to […]

The role of network cameras as sensors to support digital transformation

Axis Communications’ Linn Storäng explains how high-quality video data on open IT architecture might support the digital transformation of business functions… To think of the network camera – an essential part of any company’s security infrastructure – as being a tool for security purposes alone could be a missed opportunity. Today’s cameras are versatile IoT […]

Say goodbye to traditional security training: How to keep your staff engaged!

As the saying goes, what got you here, won’t get you there. While the traditional method of once-a-year security awareness training for your staff may have been an acceptable method in the early 2000’s, times change, and so do the needs of staff. Simply providing information to employees is not enough. For best results, information delivered […]

INDUSTRY SPOTLIGHT: Protect your top attack vectors, across all channels by Perception Point

Perception Point is a Prevention-as-a-Service company for the fastest and most accurate next-generation detection, investigation, and remediation of all threats across an organisation’s main attack vectors – email, web browsers, and cloud collaboration apps. Perception Point streamlines the security environment for unmatched protection against spam, phishing, BEC, ATO, ransomware, malware, Zero-days, and N-days well before […]