10th November 2026
Hilton London Canary Wharf
10th November 2026
Hilton London Canary Wharf
Days
Hours
Minutes

Just one crack – That’s all a hacker needs…

By Michael Oldham, CEO of PortSys, Inc. Just one crack. That’s all a hacker needs to find to cripple your organization. Here are three essential steps to take to stop that crack from blowing your infrastructure wide open for bad actors: Multi-factor authentication (MFA) that includes device validation, certificate checks, Geo IP intelligence and other […]

What is Red Team Assessment and how can it benefit business?

By Eleanor Barlow, SecurityHQ Red Team Assessment as a service used to simulate real-life attacks, to know that the right security controls are implemented and working within a business, and to highlight the security gaps that would otherwise go undetected. A key part of Red Team Assessment is where a simulation is used to mimic […]

CIISec CyberEPQ qualification will kick-start cyber security careers

The Chartered Institute of Information Security (CIISec) is now managing the UK’s first and only Extended Project Qualification (EPQ) in cyber security. The Level 3 CyberEPQ will give anyone from 14 years old the best possible opportunity to kick-start their cyber security career and will integrate with CIISec’s broader development programmes to provide a clear […]

The fastest growing threat

By Atech Did you hear about the hackers who got away from the scene of the crime? They just ransomware. There are countless evolved versions of this joke out there. Just as the jokes are evolving, ransomware attacks are evolving, too, and they are not funny. The true cost of an attack consists of both […]

Do you specialise in Browser Security? We want to hear from you!

Each month on IT Security Briefing we’re shining the spotlight on a different part of the cyber security market – and in June we’re focussing on Browser Security solutions. It’s all part of our ‘Recommended’ editorial feature, designed to help IT security buyers find the best products and services available today. So, if you’re a Browser Security solutions specialist […]

The Security IT Summit is almost here – Make sure you register today!

Have you claimed you free place at the next Security IT Summit. If not, sign up today, as delegate spots are being snapped up quickly! Wednesday 29th June – Hilton London Canary Wharf This unique event is entirely FREE for you to attend – simply reserve your place here. Source new innovative and budget-saving suppliers Attend inspirational […]

‘Simplicity is the ultimate sophistication’ for Access Control

By Tim Boivin (pictured), Marketing Director, PortSys Leonardo DaVinci’s philosophy in the headline has never rung so true as it does today in IT – especially when we’re talking about providing users secure access in our perimeterless world. If your access approach is wrong, your risk of being hacked ramps up exponentially. Counterintuitively, installing more security […]

Security IT Summit: Don’t miss June’s essential event for cybersecurity leaders

We have a free place waiting for you at next month’s Security IT Summit. Can you join us? Wednesday 29th June – Hilton London Canary Wharf This unique event is entirely FREE for you to attend – simply reserve your place here. Source new innovative and budget-saving suppliers Attend inspirational seminar sessions from industry thought-leaders Network with […]

5 Minutes With… PortSys CEO Michael Oldham

For the latest instalment of our cybersecurity executive interview series we spoke to Michael Oldham, CEO of PortSys, where he works on access control solutions across many industries, including finance, government, defense, utilities, healthcare, education, non-governmental organizations (NGOs), construction, retail, and other market segments where secure access to enterprise information is vital… Tell us about your company, products and […]

What an Endpoint is, and how EDR can benefit business

By Eleanor Barlow, Content Manager, SecurityHQ An endpoint, in its simplest form, is any device that can be connected to a given network, including, and not limited to laptops, computers, mobiles, servers, IoT devices, switches, cameras, digital printers, smart watches, and more. What constitutes as an endpoint is growing by the day. Be it in […]