Do you specialise in Phishing Detection? We want to hear from you!
Each month on IT Security Briefing we’re shining the spotlight on a different part of the cyber security market – and in April we’re focussing on Phishing Detection solutions. It’s all part of our ‘Recommended’ editorial feature, designed to help IT security buyers find the best products and services available today. So, if you’re a Phishing Detection solutions […]
Join us at the Security IT Summit this June
The next Security IT Summit, which will take place in London this June – both live and virtual attendance options will be available! 29th June – Hilton London Canary Wharf – Booking form (flexible attendance options) Benefits of attending include: Receive a bespoke itinerary of relaxed, 1-2-1 meetings with innovative and budget savings suppliers who you would […]
The cloud security challenge every CISO must overcome
By Keith Glancey, Systems Engineering Manager at Infoblox Cloud adoption has never been higher. Whether it’s public, private, multi- or even hybrid-cloud environments, organisations of all sizes, across all sectors are benefiting from the enhanced flexibility, reduced cost and greater stability that cloud can bring. However, whilst cloud can be an enabler in many areas, it can also […]
How AI stopped a WastedLocker intrusion before ransomware deployed
By Max Heinemeyer, Director of Threat Hunting, Darktrace Since first being discovered in May 2020, WastedLocker has made quite a name for itself, quickly becoming an issue for businesses and cyber security firms around the world. WastedLocker is known for its sophisticated methods of obfuscation and steep ransom demands. Its use of ‘living off the […]
White Paper: Maximize Your SIEM with Precise Active Directory Security Details
Filling the Active Directory Security Gaps in Your SIEM Lateral movement and privilege escalations through Active Directory are the root cause of all breaches. SIEM solutions are not new, and most organizations rely on them to measure the overall security of the network and devices that the SIEM is monitoring. SIEMs can gather log information […]
WEBINAR: Live Attack Simulation – Ransomware
Wednesday, March 24th @10:00 GMT If you’re concerned about ransomware, whether it’s beating Ryuk, stopping data exfiltration, or preventing the latest trend of “double extortion”, this session is for you. Join Cybereason for a live attack simulation, where we’ll discuss the latest ransomware trends, walk through a multi-stage attack, and show the side by side […]
WHITE PAPER: Build better endpoint security to protect your entire network
By Quest As your IT environment grows, tracking and securing all the endpoints connecting to your network is a monumental task. Managing and deploying security updates is time-consuming and challenging because of the wide range of devices people use to get their work done. Every desktop, laptop, smartphone, tablet and internet-of-things (IoT) device connecting to […]
SAVE THE DATE: Security IT Summit – Summer 2021
Join us at the next Security IT Summit, which will take place in London this June – both live and virtual attendance options will be available! 29th June – Hilton London Canary Wharf – Booking form (flexible attendance options) Benefits of attending include: Receive a bespoke itinerary of relaxed, 1-2-1 meetings with innovative and budget savings suppliers […]
WHITE PAPER: 5 Steps to Battle Endpoint Cybercrime with KACE
By Quest Endpoint updates are becoming more complex and challenging than ever with Bring-your-own-device (BYOD) programs and internet-of-things (IoT) technologies. Each device connecting to your network increases the number of threats from malware and viruses. Read this white paper to learn five steps for building a unified endpoint security strategy that will give you: Clear […]
WEBINAR: Managing the Compliance & Security Nightmares Caused By A Remote Workforce
Webinar – March 11th, 12pm GMT How do companies protect themselves with the right tools to mitigate compliance and security concerns? There are precautions and best practices that are being employed by many companies, and should be part of the security and compliance infrastructure as companies adapt to the new norm of both people and […]