INDUSTRY SPOTLIGHT: EveryCloud – Identity Access & Management

EveryCloud partners with Gartner and Forrester cloud security leaders to access, compare and improve your cloud security capabilities. We assist you to build combined solutions from products that suit your needs and goals and assist with GDPR data protection compliancy. From Cloud Access Security (CASB), Identity Access Management (IAM) and Email & Web Security, our […]
GUEST BLOG: 5 tips for a winning risk management strategy

By Gallagher Risk comes in many forms, with varying degrees of cost to your business and recovery times. Here are a few items worth considering when it comes to producing a risk management strategy: 1. Take care of your people Staff really are the most important asset within an organisation. From a risk management perspective, […]
GUEST BLOG: 60 must-know cybersecurity statistics for 2018

By Varonis Cybersecurity issues are becoming a day-to-day struggle for businesses. Trends show a huge increase in hacked and breached data from sources that are increasingly common in the workplace, like mobile and IoT devices. Additionally, recent research suggests that most companies have unprotected data and poor cybersecurity practices in place, making them vulnerable to […]
GUEST BLOG: The anatomy of a phishing email

By Varonis Phishing scams are one of the most common ways hackers gain access to sensitive or confidential information. In fact, according to the Verizon’s 2018 Data Breach Investigations Report, phishing is involved in 70 percent of breaches that feature a social engineering component. What is Phishing? At the most basic level, a phishing scam […]
INDUSTRY SPOTLIGHT: EveryCloud Cloud Access Security

EveryCloud partner with Gartner and Forrester, cloud security leaders to access, to compare and improve your cloud security capabilities. We assist you to build combined solutions from products that suit your needs and goals and assist with GDPR data protection compliancy. From Cloud Access Security (CASB), Identity Access Management (IAM) and Email & Web Security, […]
Just a third of UK firms will be GDPR compliant by May 25

UK companies are hugely ill-prepared for this week’s General Data Protection Regulation (GDPR) enforcement deadline, according to new research. Less than a third (29%) of organisations surveyed by USB drive specialist Apricorn felt confident they would comply, and when questioned further and asked whether there were any areas they might be likely to fail, 81% […]
Bomgar updates Privileged Identity offering following Lieberman acquisition

Bomgar has released the latest version of its Privileged Identity solution, including enhanced integrations with Bomgar Privileged Access, as well as improved manageability over SSH keys and Linux systems. The platform is a rebranded and updated version of the award-winning RED Identity Management solution from Lieberman Software, which Bomgar acquired earlier this year. The company says advanced […]
Security IT Summit – Don’t miss out!

There are only a handful of delegate places left for this summer’s essential cyber security industry event. It takes place on July 3rd 2018 at the Hilton London Canary Wharf – and, as one of just 60 VIP guests, you can attend the Security IT Summit for FREE. REGISTER FOR YOUR FREE PLACE HERE Your […]
GUEST BLOG: Having the right connections – Are VPNs really fit for purpose?

Stuart Sharp, Global Director of Solutions Engineering at OneLogin Remote working has fast become commonplace in today’s business landscape. Free from the stress of the modern-day workplace, employees are increasingly keen to opt for the laptop and crack on with work uninterrupted, all from the comfort of their own home. In fact, the Office for […]
Do you specialise in Advanced Threat Dashboards? We want to hear from you!

Each month on IT Security Briefing we’re shining the spotlight on a different part of the cyber security market – in June we’re focussing on Advanced Threat Dashboard solutions. It’s all part of our ‘Recommended’ editorial feature, designed to help IT security buyers find the best products and services available today. So, if you’re an Advanced Threat Dashboard […]