ManagedXDR Combines Talent and Technology to Deal with Microsoft Exchange Threat

By Carolyn Reuss, director, product management at Secureworks & Pierre-David Oriol, senior consultant, product management at Secureworks The explosion of data and devices is expanding the attack surface from the core to the edge. Cyber threats continue to rise, and cybercrime continues to accelerate. To achieve better security outcomes, security administrators need broad visibility across […]
Call for Speakers: Security IT Summits 2021

We are looking for industry thought leaders to participate in the seminar programme at the Security IT Summits, which take place on June 29th and November 4th this year. The Summits are highly-focused events that attract senior professionals in a variety of cyber security verticals for unrivalled networking, learning and debate. So if you have experience […]
Do you specialise in Advanced Threat Dashboards? We want to hear from you!

Each month on IT Security Briefing we’re shining the spotlight on a different part of the cyber security market – and in May we’re focussing on Advanced Threat Dashboard solutions. It’s all part of our ‘Recommended’ editorial feature, designed to help IT security buyers find the best products and services available today. So, if you’re an Advanced Threat […]
Agari Report: New BEC scam 7X more costly than average, bigger phish start angling in

Sophisticated threat actors, evolving phishing tactics, and a $800,000 business email compromise (BEC) scam in the second half of 2020 all signal trouble ahead, according to analysis from the Agari Cyber Intelligence Division (ACID). After attacks on Magellan Health, GoDaddy, and the SolarWinds “hack of the decade,” one thing is distressingly clear. Phishing, BEC, and […]
5 Minutes With… Veriato’s Chris Gilkes

In the latest instalment of our IT security industry executive interview series we spoke to Chris Gilkes (pictured), Director EMEA at Veriato, about the company and its solutions, key challenges posed by a remote workforce, the importance of innovation and why you should never stop listening to customers… Tell us about your company, products and […]
WEBINAR: Solorigate/SUNBURST – Chronology of a supply chain nightmare

By SentinelOne and ReliaQuest SUNBURST was one of the most devastating cyberattacks in recent years and has sent shockwaves like no other attack before. Solorigate/SUNBURST impacted more than 420 of the Fortune 500 companies and thousands of government and commercial organizations. The attack on the ‘digital supply chain’ was uncovered in December 2020, although the […]
Cyber Threat Intelligence – Solutions Guide & Best Practices

By Digital Shadows Cyber threat intelligence (CTI) improves the resilience of your business against emerging cyber threats. The best CTI program informs preventative and proactive security actions and is intimately tied to business concerns and effective reduction of risk. This guide serves to: Navigate you through the jargon surrounding cyber threat intelligence Outline some of […]
Security IT Summit: Registration now open for June 2021

The Security IT Summit is a unique event that has been created to help you build business connections with the latest innovative and budget-saving suppliers in the industry. Date & Venue: 29th June – Hilton London Canary Wharf You can attend this one-day event entirely for FREE.BOOK YOUR PLACE HERE (Virtual attendance options are available) What does your free […]
WEBINAR REWIND: Ransomware Attack Simulation

In a special attack simulation, this Cybereason webinar looked at how multi-stage attack campaigns operate today – and you can now watch the entire session again online. Presented by Cybereason Product Director Eric Sun, the webinar enables the audience to witness an attacker’s infiltration and watch the malicious operation as it moves across the entire […]
WHITE PAPER: Active Directory security – AD monitoring and proactive security detection combined

“Active Directory security” generates a few different reactions, depending on who you ask. Get the new guide from Microsoft 17x MVP Derek Melber to discover: The attacker-shaped holes in common monitoring solutions The 8 key features to proactively secure AD How Alsid can strengthen your security posture Start reading the free guide