Cyber Threat Intelligence – Solutions Guide & Best Practices

By Digital Shadows Cyber threat intelligence (CTI) improves the resilience of your business against emerging cyber threats. The best CTI program informs preventative and proactive security actions and is intimately tied to business concerns and effective reduction of risk. This guide serves to: Navigate you through the jargon surrounding cyber threat intelligence Outline some of […]
Security IT Summit: Registration now open for June 2021

The Security IT Summit is a unique event that has been created to help you build business connections with the latest innovative and budget-saving suppliers in the industry. Date & Venue: 29th June – Hilton London Canary Wharf You can attend this one-day event entirely for FREE.BOOK YOUR PLACE HERE (Virtual attendance options are available) What does your free […]
WEBINAR REWIND: Ransomware Attack Simulation

In a special attack simulation, this Cybereason webinar looked at how multi-stage attack campaigns operate today – and you can now watch the entire session again online. Presented by Cybereason Product Director Eric Sun, the webinar enables the audience to witness an attacker’s infiltration and watch the malicious operation as it moves across the entire […]
WHITE PAPER: Active Directory security – AD monitoring and proactive security detection combined

“Active Directory security” generates a few different reactions, depending on who you ask. Get the new guide from Microsoft 17x MVP Derek Melber to discover: The attacker-shaped holes in common monitoring solutions The 8 key features to proactively secure AD How Alsid can strengthen your security posture Start reading the free guide
WEBINAR REWIND: Managing The Compliance & Security Nightmares Caused By A Remote Workforce

Don’t worry if you missed last week’s brilliant webinar from Veriato – You can now watch the entire session again online! In an in-depth and wide ranging talk, Veriato’s Director of EMEA Sales Director Chris Gilkes takes us through how your organisation can maintain compliance while employees are working remotely. Why is this important? Put […]
WHITE PAPER: Future-proofing endpoint management

By Quest New devices, platforms, applications, and technologies connecting to the network are overwhelming IT’s ability to manage endpoints across the enterprise. Adding to the complexity, many organizations have disparate systems or processes for managing desktop and mobile devices. This white paper examines endpoint management issues and reviews best practices for administering, managing and securing […]
What’s the average time to identify a security breach? 280 days, according to IBM’s 2020 Cost of a Data Breach report

By Accedian Today, it’s not a matter of “if”, but “when”, organizations operating in today’s digital world will be breached. But, once cyber criminals manage to get past the network perimeter, do you have the visibility to detect them and see what the bad actors are doing? In this guide, find out how next-generation Intrusion […]
Do you specialise in Phishing Detection? We want to hear from you!

Each month on IT Security Briefing we’re shining the spotlight on a different part of the cyber security market – and in April we’re focussing on Phishing Detection solutions. It’s all part of our ‘Recommended’ editorial feature, designed to help IT security buyers find the best products and services available today. So, if you’re a Phishing Detection solutions […]
Join us at the Security IT Summit this June

The next Security IT Summit, which will take place in London this June – both live and virtual attendance options will be available! 29th June – Hilton London Canary Wharf – Booking form (flexible attendance options) Benefits of attending include: Receive a bespoke itinerary of relaxed, 1-2-1 meetings with innovative and budget savings suppliers who you would […]
The cloud security challenge every CISO must overcome

By Keith Glancey, Systems Engineering Manager at Infoblox Cloud adoption has never been higher. Whether it’s public, private, multi- or even hybrid-cloud environments, organisations of all sizes, across all sectors are benefiting from the enhanced flexibility, reduced cost and greater stability that cloud can bring. However, whilst cloud can be an enabler in many areas, it can also […]