24th June 2025
Hilton London Canary Wharf
11th November 2025
Hilton London Canary Wharf
Search
Close this search box.

Download your complimentary copy of the 2021 Gartner Market Guide for Email Security

By Tessian Big News! Tessian has been recognized as a Representative Integrated Cloud Email Security (ICES) Vendor in the 2021 Gartner Market Guide for Email Security. Learn more about the changing threat landscape, Gartner’s recommendations, and what sets Tessian apart. This report states that “Email continues to be a significant attack vector for both malware […]

Cloud applications put your data at risk — Here’s how to regain control

By Yaki Faitelson, Co-Founder and CEO of Varonis Cloud applications boost productivity and ease collaboration. But when it comes to keeping your organisation safe from cyberattacks, they’re also a big, growing risk. Your data is in more places than ever before. It lives in sanctioned data stores on premises and in the cloud, in online collaboration […]

Is cryptojacking hurting your network performance?

By Anthony Chadd, Neustar With the global cryptocurrency market experiencing steady growth, cryptojacking attacks have exploded in popularity. These attacks look to embed cryptomining malware in the targeted network to hijack servers and steal processing power, diminishing the capabilities of IT resources. Cryptojacking attacks can be carried out in numerous ways, but watch these two […]

WEBINAR: The next generation of secure digital communications – Why now and why it matters

By Zivver Regulatory reforms, digital transformation, hybrid working… The business landscape continues to evolve and the need for secure and compliant digital communications solutions is higher than ever. The current state of communications security cannot keep pace. Join our webinar to get practical insights from our panel of industry leaders, security experts and end-users as […]

Is application isolation the future of endpoint security?

The endpoint is the new frontline in the battle against enterprise cyber-risk – considering the increasing volume and complexity of threats, and the growth of unmanaged endpoints during the pandemic, it’s no surprise that the vast majority (91%) of global IT decision-makers interviewed recently by HP now believe that endpoint security has become as important […]

The freedom to focus on what matters most

By Rapid7 Today’s cyber security cannot follow the old playbook designed for detecting and mitigating attacks. The push for digitisation across industries and sectors has expanded the threat surface exponentially. The latest spike in ransomware attacks, data breaches, IP theft, bear testimony to that. Things have changed and need to be revamped and redesigned, keeping […]

The Synack platform expands to confront the cyber skills gap

By Peter Blanks Chief Product Officer, Synack At Synack, we’re committed to making the world a safer place. We’re doing that by helping organizations defend themselves against an onslaught of cyberattacks. We’re doing it by harnessing the tremendous power of the Synack Red Team, our community of the most skilled and trusted ethical hackers in the […]

Responding to the rising ransomware threat

By Redscan, a Kroll Business In October 2021, Sir Jeremy Fleming, the head of GCHQ, disclosed that the number of ransomware attacks in the UK has doubled in just one year. Recently described as “the most immediate danger to UK businesses,” by Lindy Cameron, the CEO of the UK’s National Cyber Security Centre, ransomware continues […]

How to simplify access reviews

By Tenfold Security More and more cybersecurity regulations require businesses to restrict access to data on a need-to-know basis. This best practice is also known as the principle of least privilege. Put simply, it means that members of your organization should only have access to files and resources they absolutely need in order to do […]