Learn from the best at the Security IT Summit
There are just a handful of delegate places left for this summer’s Security IT Summit – don’t miss out on expert insight for our great line up of speakers. Here is one of the three seminar sessions that you can enjoy this June; “I can steal your sh1t!” If you dare to join my audience, […]
Do you specialise in Intrusion Detection & Prevention? We want to hear from you!
Each month on IT Security Briefing we’re shining the spotlight on a different part of the cyber security market – and in March we’re focussing on Intrusion Detection & Prevention solutions. It’s all part of our ‘Recommended’ editorial feature, designed to help IT security buyers find the best products and services available today. So, if you’re an Intrusion […]
Ransomware Year in Review 2021
By Varonis In 2021, attacks became highly effective and impactful. At the same time, high-volume indiscriminate ransomware threats remained omnipresent throughout the year. In this post, the Varonis Threat Labs team shares what they observed in the wild while working on ransomware investigations. Overall, the team identified these five ransomware trends that shaped 2021: Ransomware-as-a-Service […]
Third Cybersecurity Skills Festival takes place this month
People and skills that protect commerce, industry and public services from cyberattacks will feature at the 3rd Cybersecurity Skills Festival, which is being organised by SASIG, the Security Awareness Special Interest Group, in partnership with the UK Cyber Security Council, on Tuesday 22 February 2022. The Cybersecurity Skills Festival is a bi-annual virtual event where […]
The rise of Ransomware-as-a-Service and how organisations can protect themselves
By Keith Glancey, Head of Solutions Architect at Infoblox Over the years, ransomware has become an increasingly popular attack method for hackers looking to make a large return on investment. The COVID-19 pandemic only accelerated this problem further, opening up new opportunities for cybercriminals to cause disruption and find vulnerabilities. As businesses continue to struggle […]
Cybersecurity priorities: Why AI-powered threat detection should be in your plans
By Atech Cloud The changed world we’ve found ourselves living in since the global pandemic struck in 2020 has been particularly helpful to cybercriminals. Nothing illustrates this so well as the SolarWinds hack, described by Microsoft president Brad Smith as the most sophisticated cyberattack of all time, the reverberations of which have been felt throughout […]
How to combat cyber organised crime with XDR
According to Verizon’s latest ‘2021 Data Breach Investigations Report (DBIR)’, in the past few years, financially motivated attacks continue to be the most common forms of attacks, with organized crime groups representing around 80% of these attacks. In fact, in a threat assessment delivered by Europol, a warning was released stating the frightful impact that […]
Salesforce security: 5 ways your data could be exposed
By Varonis Salesforce is the lifeblood of many organizations. One of its most valuable assets-the data inside-is also its most vulnerable. With countless permission and configuration possibilities, it’s easy to leave valuable data exposed. That, coupled with the fact that most security organizations aren’t very familiar or involved with Salesforce’s administration, opens organizations up to massive risk. Here […]
Don’t miss this summer’s Security IT Summit – Register today!
Join the UK’s leading CISOs at the next Security IT Summit this June – It’s the most efficient way for you to meet with the best solution providers, all in one day. 29th June 2022 – Hilton London Canary Wharf – Booking form (flexible attendance options) Benefits of attending include: Receive a bespoke itinerary of relaxed, 1-2-1 […]
Do you specialise in Access Control solutions? We want to hear from you!
Each month on IT Security Briefing we’re shining the spotlight on a different part of the cyber security market – and in February we’re focussing on Access Control solutions. It’s all part of our ‘Recommended’ editorial feature, designed to help IT security buyers find the best products and services available today. So, if you’re an Access Control solutions specialist […]