WEBINAR: Ransomware Has Evolved, And So Should Your Company
By Veriato 2021 Has been an interesting year for Ransomware attacks so far. After plaguing countless victims with dreaded ransom notes and bringing the US Colonial Pipeline and other large corporations to their knees, the Ransomware attack method has built a strong reputation for inflicting cyber terror on consumers and businesses alike. As cyber criminals […]
Cybersecurity in Financial Services: Remaining compliant and reducing risk with automation
By LogRhythm Businesses in the financial services sector have to manage enormous risk, wealth and personally identifiable information (PII), all while meeting strict regulatory requirements. As the proliferation of financial data continues to grow, organizations face the task of continuously protecting that information and keeping it secure, while maintaining a reputation in the financial sector. Despite this, many […]
Normalising data leaks: A dangerous step in the wrong direction
It was only recently, in early April, when it came to light that the personal data from over 500 million Facebook profiles had been compromised by a data leak in 2019. And since then, an internal Facebook email has been exposed, which was accidentally sent to a Belgian journalist, revealing the social media giant’s intended strategy for dealing with […]
The data dichotomy and the vital importance of effective self-regulation
The data privacy debate that has raged for the past decade has patently failed to meet the needs of either industry or consumers. Legislative change continues to challenge digital marketing models – and has had little impact on consumer trust: Edelman’s 2021 Trust Barometer cites an era of “information bankruptcy”, with global trust levels at […]
WEBINAR REWIND: Overcoming The Challenges Of Selecting An Insider Threat Detection Tool
Don’t worry if you missed last week’s insider threat webinar from Veriato – You can now re-watch the entire session online! In a crowded market with so many new products being released, it can often be hard to make sure you’re getting the right tool for your organization’s security needs. Purchasing an Insider Threat Detection […]
The Security IT Summit is less than 4 weeks away!
Have you secured your free delegate place at the hybrid Security IT Summit? You’ll receive an itinerary of 1-2-1 meetings with the market’s leading solution providers, gain access to live seminars and enjoy lunch & refreshments throughout. Please confirm your attendance here via our online form (virtual options are also available). The top areas being covered at the […]
A new chapter in remote IoT security
By Keith Glancey, Systems Engineering Manager at Infoblox When the COVID-19 pandemic struck, businesses around the world found themselves forced to adapt quickly in order to survive. IT and security teams took centre stage, and were tasked with supporting a newly-remote network of employees and maintaining business continuity. Many companies emphasised ‘connectivity first,’ relegating security to […]
WEBINAR: Overcoming The Challenges Of Selecting An Insider Threat Detection Tool
By Veriato In a crowded market with so many new products being released, it can often be hard to make sure you’re getting the right tool for your organization’s security needs. Purchasing an Insider Threat Detection tool for your organization requires extensive research, which can be very time-consuming. In our latest webinar, we try and […]
Security IT Summit: From AI to Z – All your needs are covered
The hybrid Security IT Summit is entirely free for you to attend. Receive an itinerary of 1-2-1 meetings with solution providers, gain access to live seminars and enjoy lunch & refreshments throughout. Please confirm your attendance here via our online form (virtual options are also available). The top areas being covered at the Summit include: – AI/Machine Learning– Red Teaming– Security […]
Do you specialise in Browser/Web Security? We want to hear from you!
Each month on IT Security Briefing we’re shining the spotlight on a different part of the cyber security market – and in June we’re focussing on Browser/Web Security solutions. It’s all part of our ‘Recommended’ editorial feature, designed to help IT security buyers find the best products and services available today. So, if you’re a Browser/Web Security solutions […]