INDUSTRY SPOTLIGHT: Protect your top attack vectors, across all channels by Perception Point

Perception Point is a Prevention-as-a-Service company for the fastest and most accurate next-generation detection, investigation, and remediation of all threats across an organisation’s main attack vectors – email, web browsers, and cloud collaboration apps. Perception Point streamlines the security environment for unmatched protection against spam, phishing, BEC, ATO, ransomware, malware, Zero-days, and N-days well before […]
Making the right hybrid choice when it comes to UC

As hybrid working strategies mature, companies are fast discovering that choice is vital. Employers need to offer a flexible approach to balance diverse home and office working preferences. But they must also provide a choice of technology options, especially in key unified communication (UC) tools. Consolidating onto a single UC platform may appear to be […]
What more, if anything, should governments be doing about cyber actors?

By Will Dixon, Global Head of the Academy and Community at ISTARI Cyberattacks are becoming more frequent, and their potential consequences are becoming more severe. With Critical National Infrastructure and other important services constantly in the virtual crosshairs of both state actors and cybercriminals, it is entirely conceivable that an attack, or a series of […]
Security IT Summit: Claim your complimentary delegate place for June’s big event

As a cyber/IT security professional, you’re eligible for a complimentary place at the upcoming Security IT Summit – So make sure you claim it today! Date and venue: 27th June, Hilton London Canary Wharf Benefits include: – An itinerary, designed by you, of one-to-one meetings with solution providers – A seat at the industry seminar […]
Forum Events & Media recognised for networking event excellence

Forum Events & Media Limited, home of the Security IT Summit and Total Security Summit, has been named as the leading provider of Business Networking Events – UK for 2022 at the Business Concept B2B Awards. The Business Concept launched the B2B Events Awards in 2021 to champion those involved in the B2B Event Management […]
OPINION: Don’t let fatigue be the cause of MFA bypass

By Steven Hope (pictured) , Product Director MFA at Intercede If names such as Conficker, Sasser and MyDoom send a shiver down your spine, you are not alone. In the not-too-distant past computer viruses, whether simple or sophisticated had the power to cripple organisations large and small, as cybercriminals sought to wreak havoc, and gain notoriety […]
INDUSTRY SPOTLIGHT: iSTORM – Your trusted advisory service

iSTORM believe that strong privacy and information security practices are beneficial to every organisation. Their team has more than 2 decades experience covering information security, cyber security, ISO 27001, information governance, data protection and penetration testing. iSTORM understand the issues that 21st century businesses face and our hand-picked team of experts are here to provide […]
Do you specialise in Intrusion Detection & Prevention? We want to hear from you!

Each month on IT Security Briefing we’re shining the spotlight on a different part of the cyber security market – and in March we’re focussing on Intrusion Detection & Prevention solutions. It’s all part of our ‘Recommended’ editorial feature, designed to help IT security buyers find the best products and services available today. So, if you’re an Intrusion […]
Democratisation of technology among the top trends impacting providers and buyers

The top trends that will impact technology providers and buyers through 2025 will be driven by businesses increasing their reliance on technology, new opportunities emerging through technology and the impact of external macro forces. That’s according to a study from Gartner, which asserts that as the march of digitalisation continues even amidst disruption, technology providers have […]
There are two Security IT Summits this year – Here’s how to get involved!

The twice annual Summit allows senior IT and cyber security professionals to share forward-thinking ideas, meet new suppliers and discover new ways to underpin their future strategies. What’s included? – The opportunity to meet with providers that can support your projects and plans coming up. – Insightful and educational seminar sessions. – Networking opportunities with […]