24th June 2025
Hilton London Canary Wharf
11th November 2025
Hilton London Canary Wharf
Search
Close this search box.

Meetings, networking & learning – The Security IT Summit has it all

Your delegate place at June’s Security IT Summit will allow you to meet 1-2-1 with a range of suppliers, attend great seminars and network with peers – there is no hard sell, just a great opportunity to discuss your upcoming projects. You’ll also be able to enjoy our buffet lunch and refreshments throughout the day […]

Five top tips for improving your cyber security visibility and control 

By Leyton Jefferies, Head of Security Services, CSI With an increasing number of high-profile security breaches splashed across the media, companies are now looking to improve their cyber security. As the world has become more digitally connected and working from home continues to be part of the way we work, there has become more opportunity […]

Do you specialise in Phishing Detection? We want to hear from you!

Each month on IT Security Briefing we’re shining the spotlight on a different part of the cyber security market – and in April we’re focussing on Intrusion Detection & Prevention solutions. It’s all part of our ‘Recommended’ editorial feature, designed to help IT security buyers find the best products and services available today. So, if you’re a Phishing Detection […]

ContiLeaks: Ransomware gang suffers data breach

By Varonis Conti, one of the most infamous, prolific and successful big game ransomware threats, has suffered yet another embarrassing leak with a treasure trove of both internal chat transcripts and source code being shared by a reported Ukrainian member. Having previously had their internal manuals and tools exposed by a disgruntled affiliate in August […]

CISO Live Interactive Event – Last chance to register!

Today’s the day! In a few short hours our virtual live event for CISOs and about CISOs will be starting. Our interactive event will give you the chance to ask questions about the latest topics in cyber security and vote in our polls about the latest threats organisations face.    Join F5, CyCognito and NoName at […]

IT security in 2022 – what you need to know

By Jack Rosier of QMS International, one of the UK’s leading ISO certification bodies We’re living in the age of computers, with technology playing a more important role in our lives with each passing year. With the pandemic acting as a catalyst for increasing digitalisation, 2022 is likely to see more technology usage than ever […]

NEW CISO Live Interactive Event – Register today!

In a recent survey, 85% of CISOs reported they think security will be more complicated, with 71% have a cyber skills shortage and 72% struggling to retain security staff Many CISOs find themselves in a tight spot. Not only are IT teams desperately playing a game of catch-up, many are stretched due to a lack […]

Supply chain attacks of 2022 on the rise

According to Microsoft, the goal of a supply chain attack is to ‘source codes, build processes, or update mechanisms by infecting legitimate apps to distribute malware.’ Supply chain attacks ‘begin with an advanced persistent threat that determines a member of the supply network with the weakest cyber security in order to affect the target organization.’ (CERT-UK report […]

Backup is dead: True Cyber Protection is the way ahead

By Adam Brace, EveryCloud So, is Backup Really Dead? In the traditional sense we would say yes, as Cyber Criminals have developed and deployed ways that mean backing up alone is not enough to provide true data protection. Now (and especially in the future), to be fully protected, organisations need to ensure their data is recoverable, […]

Identify and investigate Business Email Compromise (BEC) scams

Business Email Compromise is an email-based phishing attack that specifically targets businesses and organizations to steal money, sensitive information, or account credentials. These attacks can be difficult to prevent as criminals may utilize social engineering techniques such as impersonation and intimidation to manipulate users. Threat actors will often prepare for BEC attacks by first performing […]