SAVE THE DATE: Security IT Summit – November 2022
Join us at the next Security IT Summit, which will take place in London this November – both live and virtual attendance options will be available! 9th November 2022 – Hilton London Canary Wharf – Booking form (flexible attendance options) Benefits of attending include: Receive a bespoke itinerary of relaxed, 1-2-1 meetings with innovative and budget savings […]
Do you specialise in Authentication? We want to hear from you!
Each month on IT Security Briefing we’re shining the spotlight on a different part of the cyber security market – and in July we’re focussing on Authentication solutions. It’s all part of our ‘Recommended’ editorial feature, designed to help IT security buyers find the best products and services available today. So, if you’re an Authentication solutions specialist and would […]
SAVE THE DATE: CIISec Live returns this September
CIISec Live will make a comeback as a physical event on the 7th of September 2022. This year the event will be situated at Edinburgh Napier University and will take on the overarching thematic of ‘inspiring the next generation of cybersecurity professionals’. We believe this concept along with the event being positioned at Edinburgh Napier […]
OPINION: Local authorities shouldn’t be daunted when moving to the cloud
Local Authorities are under intense pressure to escalate Digital Transformation strategies while also dramatically reducing IT costs, achieving public sector sustainability goals and extending citizen self-service access to key services. With stretched in-house resources and a widely acknowledged skills shortage, the existing IT team is dedicated to keeping the lights on for as long as […]
What vulnerability management should deliver
By Eleanor Barlow, SecurityHQ The purpose of Vulnerability Management is to ensure that organisations can accurately detect, as well as classify and contextualise vulnerabilities, within their organisation, and act on them to reduce the chances of a successful attack by exploiting the vulnerability. With Vulnerability Management, once vulnerabilities are detected and prioritised, remediation programmes are […]
Final call for the Security IT Summit – Register today!
With just under three weeks until the Security IT Summit, we wanted to let you know there are only two delegate places remaining. Your place is entirely free and you will receive; an itinerary of meetings with suppliers, access to seminars*, and a place at our networking lunch. Wednesday 29th June – Hilton London Canary […]
IT security solutions – 2022 buying trends revealed
Authentication, Compliance and Cloud Web Security top the list of services the UK’s leading IT security professionals are sourcing in 2022. The findings have been revealed ahead of July’s Security IT Summit and are based on delegate requirements at the upcoming event. Delegates registering to attend were asked which areas they needed to invest in during 2022 […]
Just one crack – That’s all a hacker needs…
By Michael Oldham, CEO of PortSys, Inc. Just one crack. That’s all a hacker needs to find to cripple your organization. Here are three essential steps to take to stop that crack from blowing your infrastructure wide open for bad actors: Multi-factor authentication (MFA) that includes device validation, certificate checks, Geo IP intelligence and other […]
What is Red Team Assessment and how can it benefit business?
By Eleanor Barlow, SecurityHQ Red Team Assessment as a service used to simulate real-life attacks, to know that the right security controls are implemented and working within a business, and to highlight the security gaps that would otherwise go undetected. A key part of Red Team Assessment is where a simulation is used to mimic […]
CIISec CyberEPQ qualification will kick-start cyber security careers
The Chartered Institute of Information Security (CIISec) is now managing the UK’s first and only Extended Project Qualification (EPQ) in cyber security. The Level 3 CyberEPQ will give anyone from 14 years old the best possible opportunity to kick-start their cyber security career and will integrate with CIISec’s broader development programmes to provide a clear […]