The fastest growing threat
By Atech Did you hear about the hackers who got away from the scene of the crime? They just ransomware. There are countless evolved versions of this joke out there. Just as the jokes are evolving, ransomware attacks are evolving, too, and they are not funny. The true cost of an attack consists of both […]
Do you specialise in Browser Security? We want to hear from you!
Each month on IT Security Briefing we’re shining the spotlight on a different part of the cyber security market – and in June we’re focussing on Browser Security solutions. It’s all part of our ‘Recommended’ editorial feature, designed to help IT security buyers find the best products and services available today. So, if you’re a Browser Security solutions specialist […]
The Security IT Summit is almost here – Make sure you register today!
Have you claimed you free place at the next Security IT Summit. If not, sign up today, as delegate spots are being snapped up quickly! Wednesday 29th June – Hilton London Canary Wharf This unique event is entirely FREE for you to attend – simply reserve your place here. Source new innovative and budget-saving suppliers Attend inspirational […]
‘Simplicity is the ultimate sophistication’ for Access Control
By Tim Boivin (pictured), Marketing Director, PortSys Leonardo DaVinci’s philosophy in the headline has never rung so true as it does today in IT – especially when we’re talking about providing users secure access in our perimeterless world. If your access approach is wrong, your risk of being hacked ramps up exponentially. Counterintuitively, installing more security […]
Security IT Summit: Don’t miss June’s essential event for cybersecurity leaders
We have a free place waiting for you at next month’s Security IT Summit. Can you join us? Wednesday 29th June – Hilton London Canary Wharf This unique event is entirely FREE for you to attend – simply reserve your place here. Source new innovative and budget-saving suppliers Attend inspirational seminar sessions from industry thought-leaders Network with […]
5 Minutes With… PortSys CEO Michael Oldham
For the latest instalment of our cybersecurity executive interview series we spoke to Michael Oldham, CEO of PortSys, where he works on access control solutions across many industries, including finance, government, defense, utilities, healthcare, education, non-governmental organizations (NGOs), construction, retail, and other market segments where secure access to enterprise information is vital… Tell us about your company, products and […]
What an Endpoint is, and how EDR can benefit business
By Eleanor Barlow, Content Manager, SecurityHQ An endpoint, in its simplest form, is any device that can be connected to a given network, including, and not limited to laptops, computers, mobiles, servers, IoT devices, switches, cameras, digital printers, smart watches, and more. What constitutes as an endpoint is growing by the day. Be it in […]
Do you specialise in Advanced Threat Dashboards? We want to hear from you!
Each month on IT Security Briefing we’re shining the spotlight on a different part of the cyber security market – and in May we’re focussing on Advanced Threat Dashboard solutions. It’s all part of our ‘Recommended’ editorial feature, designed to help IT security buyers find the best products and services available today. So, if you’re an Advanced Threat Dashboard solutions […]
BlueFort’s FREE CISO event now available on-demand
By BlueFort Our latest virtual live CISO event last week was a success! Get access to the free recordings of our exciting sessions, discussing all the latest threats organisation’s face in a post-covid world. Our partners’ Virtual Exhibition stands are ready to visit where you can download content and even book a meeting with one […]
How hackers get caught
Cyber criminals are intelligent, elusive individuals, making it difficult for law enforcement to track them down. Not all hackers manage to escape retribution, however. Here, Joanne Newton, deputy head of the school of computing at Arden University, explores the traps they fall in to, and how they get caught… Cyber criminals go to many lengths […]