24th June 2025
Hilton London Canary Wharf
11th November 2025
Hilton London Canary Wharf
Search
Close this search box.

The secrets of no drama data migration

With Mergers, Acquisitions and Divestments at record levels, the speed and effectiveness of data migration has come under the spotlight. Every step of this data migration process raises concerns, especially in spin-off or divestment deals where just one part of the business is moving ownership.  What happens if confidential information is accessed by the wrong […]

Network protection in the hybrid era  

By Gary Cox, Director of Technology Western Europe at Infoblox   Since emerging from the worst effects of the pandemic, a mix of in-office and remote work has become common practice for many organisations. Initially seen as a temporary way of easing employees back into the workplace after almost two years working from home, it appears […]

We need higher factor protection in the sun AND in the workplace 

By Steven Hope, CEO of Authlogics When I was growing up, we didn’t have sunscreen per se, it was more referred to as suntan lotion. It wasn’t part of the summertime ritual it is for many people today and getting repeatedly burned was part of the holiday experience – a price to pay for the […]

Sail the digital transformation seas more securely with Zero Trust Access 

By Tim Boivin, PortSys (pictured)  Security has long been the boat anchor that drags down innovation – a deadweight that prevents digital transformation efforts from sailing to success.   With the pandemic, digital transformation efforts accelerated far beyond the horizon of what was thought possible. Those changing tides also gave cyber pirates the opportunity to hack […]

The four biggest mistakes in IT security governance

By Atech Intelligent IT security and endpoint protection tools are critical components of security governance, and the stakes within today’s threat landscape have never been higher. A lapse in identity protection or zero trust networks could spell financial disaster for a company. We know that attacks are increasing in sophistication and frequency, and in cost […]

What vulnerability management should deliver  

By Eleanor Barlow, SecurityHQ The purpose of Vulnerability Management is to ensure that organisations can accurately detect, as well as classify and contextualise vulnerabilities, within their organisation, and act on them to reduce the chances of a successful attack by exploiting the vulnerability. With Vulnerability Management, once vulnerabilities are detected and prioritised, remediation programmes are […]

Just one crack – That’s all a hacker needs…

By Michael Oldham, CEO of PortSys, Inc. Just one crack. That’s all a hacker needs to find to cripple your organization. Here are three essential steps to take to stop that crack from blowing your infrastructure wide open for bad actors: Multi-factor authentication (MFA) that includes device validation, certificate checks, Geo IP intelligence and other […]

CIISec CyberEPQ qualification will kick-start cyber security careers

The Chartered Institute of Information Security (CIISec) is now managing the UK’s first and only Extended Project Qualification (EPQ) in cyber security. The Level 3 CyberEPQ will give anyone from 14 years old the best possible opportunity to kick-start their cyber security career and will integrate with CIISec’s broader development programmes to provide a clear […]

The fastest growing threat

By Atech Did you hear about the hackers who got away from the scene of the crime? They just ransomware. There are countless evolved versions of this joke out there. Just as the jokes are evolving, ransomware attacks are evolving, too, and they are not funny. The true cost of an attack consists of both […]

‘Simplicity is the ultimate sophistication’ for Access Control

By Tim Boivin (pictured), Marketing Director, PortSys Leonardo DaVinci’s philosophy in the headline has never rung so true as it does today in IT – especially when we’re talking about providing users secure access in our perimeterless world. If your access approach is wrong, your risk of being hacked ramps up exponentially. Counterintuitively, installing more security […]