24th June 2025
Hilton London Canary Wharf
11th November 2025
Hilton London Canary Wharf
Search
Close this search box.

‘Overwhelmed’ cyber analysts fear their organisation could already be breached

97% of cyber analysts are worried they will miss security events, with 71% admitting their organisation may have been compromised and they don’t know about it yet. That’s according to a study by Vectra AI, which details how analysts are being overwhelmed, as they receive 4,484 alerts on average per day, but can’t cope with […]

Gatekeeping Digital Realms: Top tips for effective Authentication in cybersecurity

The first line of defence in protecting digital assets and data is effective user authentication. Ensuring the right individuals have access to your systems is paramount to maintaining a robust cybersecurity posture. Here, we explore key tips for optimising your authentication processes… Adopt Multi-Factor Authentication (MFA): MFA adds an extra layer of security to your […]

Amazon drives IaaS market to new highs

The worldwide infrastructure as a service (IaaS) market grew 29.7% in 2022, to total $120.3 billion, up from $92.8 billion in 2021, according to new data. Analysis by Gartner indicates Amazon retained the No. 1 position in the IaaS market in 2022, followed by Microsoft, Alibaba, Google and Huawei. “Cloud has been elevated from a […]

Do you specialise in Penetration Testing? We want to hear from you!

Each month on IT Security Briefing we’re shining the spotlight on a different part of the cyber security market – and in August we’re focussing on Authentication solutions. It’s all part of our ‘Recommended’ editorial feature, designed to help IT security buyers find the best products and services available today. So, if you’re an Authentication solutions […]

The changing role of partners in SAP’s new cloud mindset

Recent changes from SAP has left many partners wondering what the next steps are in providing cloud services, especially given  SAP’s insistence on developing a ‘cloud mindset’, and emphasising its Activate Methodology and Fit to Standard workshops to achieve this.  Up until this point, a change of direction to the cloud has had little impact […]

Navigating recessionary budget pressures on IT departments

In today’s challenging economic landscape, budgetary pressures have become a reality across every department. None more so than IT. In spite of the promise of increased productivity and performance, advanced technologies such as AI, faster storage, and more secure data inevitably cost more and take longer to deliver than today’s budgets can afford. IT directors […]

OPINION: The promising influence of generative AI on cybersecurity

The cybersecurity landscape has always evolved rapidly, with new threats emerging and old ones becoming more sophisticated. As defenders strive to stay ahead, generative artificial intelligence (AI) is proving to be a game-changing ally, transforming threat detection, response strategies, and even the creation of defensive measures. Generative AI holds the potential to transform threat detection. […]

SAVE THE DATE: Security IT Summit – November 2023

Join us at the next Security IT Summit, which will take place in Manchester this November with over 60 of the UK’s leading cybersecurity professional in attendance. 9th November 2023 Hilton London Canary Wharf Register Here  Benefits of attending include:  Receive a bespoke itinerary of relaxed, 1-2-1 meetings with innovative and budget savings suppliers who […]

Banking and investment sector IT spending to hit $652bn this year

Worldwide banking and investment services IT spending is forecast to total $652.1 billion in 2023, an increase of 8.1% from 2022, with software experiencing the largest growth with an increase of 13.5%. “Current economic headwinds have changed the context for technology investments in banking and investment services this year,” said Debbie Buckland, Director Analyst at […]

The importance of Zero Trust Architecture

By Cathal Judge (pictured), Founder and CEO of CISO Assurance Global Zero Trust security architecture adoption is on the rise, and with good reason. The Network and Information Security (NIS2) Directive requires the adoption of best-practice security architecture, to ensure state of the art security of European networks and information systems. Likewise, the GDPR requires […]