10th November 2026
Hilton London Canary Wharf
10th November 2026
Hilton London Canary Wharf
Days
Hours
Minutes

LORCA begins open call for fourth cohort of cyber scaleups

The London Office for Rapid Cybersecurity Advancement (LORCA) has launched a global open call for its fourth cohort of cyber scaleups, who will receive bespoke support to help them build in the UK and abroad. Successful cohorts will also gain access to commercial and engineering experts through delivery partners Deloitte and the Centre for Secure Information Technologies […]

NCSC publishes university threat assessment

The threats facing the UK’ universities and the steps they can take to protect themselves have been outlined in a report from the National Cyber Security Centre (NCSC), a part of GCHQ. The NCSC’s threat assessment aims to raise awareness of state-sponsored espionage targeting high-value research, as well as the risk of financial losses at the […]

5 reasons to attend the Security IT Summit

Register today for the Security IT Summit – It’s FREE for you to attend and could help you reduce expenditure by matching you up with innovative suppliers. As one of our guests, you’ll be joining just 60 other senior cyber security professionals who are attending the event to network, learn and forge new business relationships.  […]

Do you specialise in Employee Security Awareness? We want to hear from you!

Each month on IT Security Briefing we’re shining the spotlight on a different part of the cyber security market – and in October we’re focussing on Employee Security Awareness solutions. It’s all part of our ‘Recommended’ editorial feature, designed to help IT security buyers find the best products and services available today. So, if you’re an Employee Security […]

NCSC issues DoS attack guidance for business

Organisations worried about the threat of Denial of Service (DoS) attacks have been recommended to read guidance published by the National Cyber Security Centre. Wikipedia suffered a suspected DoS attack on Saturday September 7th that resulted in intermittent site access for some users in the UK, Europe and the Middle East. Advice for SMEs, large organisations, […]

Humans: The root cause of your cyber security issues

More than 99 per cent of cyber threats require human interaction to execute – enabling a macro, opening a file, following a link, or opening a document – signifying the importance of social engineering to enable successful attacks. That’s according to the latest Human Factor report from Proofpoint, which highlights the ways in which cybercriminals […]

Look who you’ll be joining at the Security IT Summit

The Security IT Summit is taking place this autumn and we’d love for you to join us as our VIP guest. 5 November 2019 – Hilton London Canary Wharf This VIP pass will give you the opportunity to meet with suppliers based on your own unique requirements, attend a series of seminars and network with […]

Keeping data secure in the oil and gas industry

By Jerry Askar, Managing Director Middle East, Levant & Africa, Certes Networks As automation continues to evolve, the utilities sector is finding that encryption of their network data is a critical to safeguard against cyber-attacks.  And, as organisations across the globe continue to prioritise cybersecurity, the threat landscape continues to expand.  Although good progress is being made, it […]

Are trusted employees your biggest threat?

Trusted employees have access to company-sensitive information, assets and intellectual property, and permission to make financial transactions – often without requiring any further approval. Attackers target these privileged, trusted people – impersonating suppliers, regulators and colleagues – and try to encourage them to do something they have permission to do, but shouldn’t, like diverting payments […]

Do you specialise in Vulnerability Management? We want to hear from you!

Each month on IT Security Briefing we’re shining the spotlight on a different part of the cyber security market – and in September we’re focussing on Vulnerability Management solutions. It’s all part of our ‘Recommended’ editorial feature, designed to help IT security buyers find the best products and services available today. So, if you’re a Vulnerability Management solutions […]