24th June 2025
Hilton London Canary Wharf
11th November 2025
Hilton London Canary Wharf
Search
Close this search box.

TLS/SSL Decryption – One of the main pillars of zero trust model

By Stephen Dallas AVP Emerging Europe / Africa Sales & EMEA Channels at A10 Networks In a world where everything and everyone is connected to the internet, in one way or another, it’s hard to imagine a network that is truly secure. Data, large amounts of it, are at the centre of it all. With industries from […]

Learn from these expert speakers at the Security IT Summit

Make sure you claim you place at the Security IT Summit – Alongside your 1-2-1 meetings and networking, you’ll also enjoy access to seminar sessions with the latest tips and challenges from leading industry experts. Lunch and refreshments are also included with your pass to the Security IT Summit – click here to RSVP. Here are just some of […]

84% of security and IT teams ‘don’t have a positive relationship’

Almost two thirds (59%) of European IT heads believe it is challenging to gain end-to-end visibility of their network, with almost half saying this lack of visibility is a major concern. That’s according to a new poll by IDC/Forrester/VMware, which says more than a third (37%) feel the challenges associated with this lack of visibility […]

WEBINAR: How to Tackle Working From Home Security Threats

Learn the secrets to securing your organization’s communications while safeguarding against costly data leaks with a remote workforce.  This April 30 webinar from ZIVVER features three industry experts who will bring you up to speed on the new threat landscape.  Stay alert to WFH security threats  Be in the know and hear about the following: […]

Top 5 business telecoms trends for 2020

By Laura Health, Head of Product Development at TSG As with several business technologies, the 2010s saw huge advancements in telecommunications. Whilst VoIP (Voice over Internet Protocol) telephony had been around long before this decade, this is when it really took off as a viable, modern and futureproof solution for businesses around the world. A […]

Do you specialise in Advanced Threat Dashboards? We want to hear from you!

Each month on IT Security Briefing we’re shining the spotlight on a different part of the cyber security market – and in May we’re focussing on Advanced Threat Dashboard solutions. It’s all part of our ‘Recommended’ editorial feature, designed to help IT security buyers find the best products and services available today. So, if you’re an Intrusion Phishing […]

Learn new things on lockdown with our online courses!

Why not use lockdown downtime to learn new skills and improve existing ones with our newly available and unlimited annual courses? These are specially-curated online courses designed to help you and your team, improve expertise and learn new things. The IT and Personal Development online learning bundle provides you with over 50 courses, which cover all areas […]

Security IT Summit: We’ll get through this together!

 Have you confirmed your place at this June’s Security IT Summit? If not, hurry as we only have limited spaces available! Your complimentary pass includes; an itinerary of 1-2-1 meetings with budget-saving suppliers, access to a series of seminars led by industry experts, networking with peers who share your challenges, plus lunch and refreshments throughout. RSVP here to register your […]

McAfee flags autonomous vehicle hacking risks

IT security giant McAfee’s has successfully tricked an autonomous vehicle to accelerate up to 85 MPH in a 35 MPH zone using just two inches of electrical tape. The McAfee Advanced Threat Research (ATR) team and McAfee Advanced Analytic Team (AAT) partnered to explore how artificial intelligence can be manipulated through research known by the analytics […]

69% of SAP users: projects do not prioritise IT security

More than two thirds (68.8%) of SAP users believe their organisations put insufficient focus on IT security during previous SAP implementations, while 53.4% indicated that it is ‘very common’ for SAP security flaws to be uncovered during the audit process. That’s according to the SAP Security Research Report by risk management consultancy, Turnkey Consulting, which […]