Best city for cyber security jobs? Washington DC
Washington D.C, US has been named the best city for cybersecurity jobs thanks to its many job opportunities and high average salary, while London only ranks in 8th. That’s according to research conducted by Techshielde, which analysed several metrics including average salary, job availability and cost of living to find the best place to live […]
ICT investment up as R&D drops during pandemic
45% of UK firms have decreased their research and development initiatives during the covid-19 pandemic, with even 18% of firms halting theirs altogether, according to new research from Durham University Business School. However, 40% of firms have invested in their ICT, likely to be the result of firms having to facilitate working from home and […]
Security IT Summit: Register today for November’s event
Free delegate places are now available for November’s hybrid Security IT Summit – but hurry, as places are likely to fill up fast! You’ll receive an itinerary of 1-2-1 meetings with the market’s leading solution providers, gain access to live seminars and enjoy lunch & refreshments throughout. Please confirm your attendance here via our online form (virtual options […]
The economy runs on trust – The Synack 2021 Trust Report
By Jennifer Bennett, Synack The Synack 2021 Trust Report The pandemic has accelerated initiatives to digitally transform operations, and drove efforts to implement Zero Trust security for remote workforces. Reinforcing cyber resilience continues to be top of mind in organizations, firms, and societies, and goes hand in hand with trust. The 2021 Trust Report is Synack’s […]
2021 Signals in Security Report: Renewed focus on vendor security
By Synack The operational chaos of last year not only accelerated a number of cybersecurity trends, but elevated the importance of vetting secure vendors and the trust that goes hand in hand with each partnership. We also found that training employees in cybersecurity best practices and integrating security more tightly into the development cycle stalled […]
Respect in Security seeks to stamp out industry harassment
Around a third of cybersecurity professionals have had personal experience of harassment online (32%) and in-person (35%), according to a study from Respect in Security – a new initiative set up to support victims and encourage coordinated industry action to tackle the problem. Respect in Security engaged Sapio Research to poll 302 industry professionals (male, female and […]
IT security solutions: 2021 buying trends revealed
Security Analytics, Cloud Web Security and Access Control top the list of services the UK’s leading IT security professionals are sourcing in 2021. The findings have been revealed by the Security IT Summit and are based on delegate requirements at this summer’s recent event. Delegates registering to attend were asked which areas they needed to […]
Lack of endpoint visibility costs a uK organisation £1.8M over three years
Tanium has released findings of a study that highlights the potential savings that public and private sector European organisations could realise by improving endpoint visibility and control across their IT estates. This comes at a time when endpoint visibility and management is crucial as organisations deal with issues such as mass remote working and the […]
Digital transformation: The long-term revenue opportunity
At the start of the pandemic many people would have been mistaken for thinking that work-from-home and stay at home orders were going to be short-lived. After the Prime Minister introduced these initial instructions to the nation, many IT teams rushed like mad to maintain business continuity and productivity for their organisations. Since then, society’s […]
WEBINAR REWIND: Ransomware Has Evolved, And So Should Your Company
Don’t worry if you missed last week’s excellent webinar from Veriato – you can now rewatch the entire session online! Right now, a cybercriminal gang like Prometheus, Maze, Ryuk, or NetWalker could be looking for vulnerabilities in your network to launch a Ransomware attack. Ransomware is typically initiated via phishing or social engineering tactics, these […]