Experts reflect on how you can be cyber smart for Cybersecurity Awareness Month 2021
The overarching theme of this year’s Cybersecurity Awareness Month is “Do your part. #BeCyberSmart.” The pandemic has made the line between our online and offline lives indistinguishable. Everything we do is fuelled by technology. Our homes, our economy, the entire country. Everything is impacted by, but also at risk of, the internet. By now, everyone and […]
VIRTUAL EVENT: Step into the Future of Cybersecurity at Tessian’s Human Layer Security Summit
The threats of the future are here, AI is now being used to construct more convincing phishing attacks than ever before. Singapore GovTech will explain exactly what this means for the future of phishing in one of Tessian’s game changing sessions at the action packed Human Layer Security Summit. Join other security leaders as Tessian’s […]
INDUSTRY SPOTLIGHT: HANDD Business Solutions
HANDD Business Solutions (HANDD) are a data centric cyber security service partner. We work within the IT security channel marketplace to provide software and the services required to address your business security needs. As a result, we do not author our own product sets and instead offer consultancy, sales and aftersales support for the product […]
Cutting through the noise
By Rapid7 Imagine this, your connected devices at home and office go rogue. The car drives you somewhere else instead of home, the office devices leak intellectual property and employee data, the home appliances reveal information about those at home. The thought of this happening would probably send shivers down your spine. Though it’s only […]
WEBINAR: Top 5 reasons why you need an access management solution
By Tenfold Security Do you know WHO in your organization has access to WHAT systems and data? If you don’t know the answer, chances are you haven’t yet employed an IAM solution. And that means your company is at high risk for data theft. You might be struggling to invest the administrative efforts required to […]
The future of cybersecurity is autonomous
Censornet’s Autonomous Integrated Cloud Security gives mid-market organisations the confidence and control of Enterprise-Grade cyber protection. Our platform integrates attack intelligence across email, web, and cloud to ensure our clients’ cyber defences react at lightning speed, day and night. The Censornet platform is simple and effective, not costly and complex. For our millions of users […]
Do you specialise in Malware protection solutions? We want to hear from you!
Each month on IT Security Briefing we’re shining the spotlight on a different part of the cyber security market – and in November we’re focussing on Malware solutions. It’s all part of our ‘Recommended’ editorial feature, designed to help IT security buyers find the best products and services available today. So, if you’re a Malware solutions specialist and […]
Security IT Summit is just TWO weeks away – Secure your place!
Don’t forget to claim your complimentary guest pass to the Security IT Summit and gain access to insightful seminar sessions from industry thought leaders. The event takes place November 4th at the Hilton London Canary Wharf, providing a platform for senior IT/cyber security professionals and their suppliers – for one-to-one business meetings, learning and networking. Confirmed seminar sessions […]
5 Minutes With… HANDD Business Solutions’ Sam Malkin
In the latest instalment of our IT security industry executive interview series we spoke to Sam Malkin (pictured, right), Lead Solutions Architect at HANDD Business Solutions, about the company, the security challenges presented by the shift to home working, the opportunities it also creates and the potential of Gaia-X… Tell us about your company, products […]
Synack works with Microsoft to provide a one-stop shop for Microsoft Azure-based cloud security
By Synack Microsoft Azure comes equipped with all the right security controls, but effective deployment and management of these controls is an ongoing process, driven by evolution and risk tolerance . Proper implementation of cloud rollouts and ongoing maintenance can be a challenge, even for large organizations, leading to a lack of protections such as least […]