WHITE PAPER: Active Directory security – AD monitoring and proactive security detection combined

“Active Directory security” generates a few different reactions, depending on who you ask. Get the new guide from Microsoft 17x MVP Derek Melber to discover: The attacker-shaped holes in common monitoring solutions The 8 key features to proactively secure AD How Alsid can strengthen your security posture Start reading the free guide
WEBINAR REWIND: Managing The Compliance & Security Nightmares Caused By A Remote Workforce

Don’t worry if you missed last week’s brilliant webinar from Veriato – You can now watch the entire session again online! In an in-depth and wide ranging talk, Veriato’s Director of EMEA Sales Director Chris Gilkes takes us through how your organisation can maintain compliance while employees are working remotely. Why is this important? Put […]
WHITE PAPER: Future-proofing endpoint management

By Quest New devices, platforms, applications, and technologies connecting to the network are overwhelming IT’s ability to manage endpoints across the enterprise. Adding to the complexity, many organizations have disparate systems or processes for managing desktop and mobile devices. This white paper examines endpoint management issues and reviews best practices for administering, managing and securing […]
What’s the average time to identify a security breach? 280 days, according to IBM’s 2020 Cost of a Data Breach report

By Accedian Today, it’s not a matter of “if”, but “when”, organizations operating in today’s digital world will be breached. But, once cyber criminals manage to get past the network perimeter, do you have the visibility to detect them and see what the bad actors are doing? In this guide, find out how next-generation Intrusion […]
Do you specialise in Phishing Detection? We want to hear from you!

Each month on IT Security Briefing we’re shining the spotlight on a different part of the cyber security market – and in April we’re focussing on Phishing Detection solutions. It’s all part of our ‘Recommended’ editorial feature, designed to help IT security buyers find the best products and services available today. So, if you’re a Phishing Detection solutions […]
Join us at the Security IT Summit this June

The next Security IT Summit, which will take place in London this June – both live and virtual attendance options will be available! 29th June – Hilton London Canary Wharf – Booking form (flexible attendance options) Benefits of attending include: Receive a bespoke itinerary of relaxed, 1-2-1 meetings with innovative and budget savings suppliers who you would […]
The cloud security challenge every CISO must overcome

By Keith Glancey, Systems Engineering Manager at Infoblox Cloud adoption has never been higher. Whether it’s public, private, multi- or even hybrid-cloud environments, organisations of all sizes, across all sectors are benefiting from the enhanced flexibility, reduced cost and greater stability that cloud can bring. However, whilst cloud can be an enabler in many areas, it can also […]
How AI stopped a WastedLocker intrusion before ransomware deployed

By Max Heinemeyer, Director of Threat Hunting, Darktrace Since first being discovered in May 2020, WastedLocker has made quite a name for itself, quickly becoming an issue for businesses and cyber security firms around the world. WastedLocker is known for its sophisticated methods of obfuscation and steep ransom demands. Its use of ‘living off the […]
White Paper: Maximize Your SIEM with Precise Active Directory Security Details

Filling the Active Directory Security Gaps in Your SIEM Lateral movement and privilege escalations through Active Directory are the root cause of all breaches. SIEM solutions are not new, and most organizations rely on them to measure the overall security of the network and devices that the SIEM is monitoring. SIEMs can gather log information […]
WEBINAR: Live Attack Simulation – Ransomware

Wednesday, March 24th @10:00 GMT If you’re concerned about ransomware, whether it’s beating Ryuk, stopping data exfiltration, or preventing the latest trend of “double extortion”, this session is for you. Join Cybereason for a live attack simulation, where we’ll discuss the latest ransomware trends, walk through a multi-stage attack, and show the side by side […]