24th June 2025
Hilton London Canary Wharf
11th November 2025
Hilton London Canary Wharf
Search
Close this search box.

Going phishing? Five emails you don’t want in your inbox

Phishing attacks are the most common form of cyber attack. Why? The simplicity of email gives cyber criminals an easy route in, allowing them to reach users directly with no defensive barriers, to mislead, harvest credentials and spread malicious elements. All organisations think it won’t happen to them, but phishing isn’t a trap that only […]

SAVE THE DATE: Security IT Summit 2020

If you couldn’t make the Security IT Summit this week, don’t panic! The first of two 2020 events will take place on June 30th. It’s free for you to attend and could help you reduce your expenditure by matching you up with innovative suppliers who match your business requirements. So register today to secue your […]

Unwanted apps high on 2020 cyber threat list

So-called ‘fleeceware’ apps and aggressive adware software are among the key cyber threats posed to businesses and the public in 2020. That’s according to the 2020 Threat Report, produced by SophosLabs to explore changes in the threat landscape over the past 12 months. The Report focuses on six areas where researchers noted particular developments during this past year […]

Research highlights cyber threat to schools

There have been 301 attacks against UK and US schools so far in 2019, compared to 124 in 2018 and 218 in 2017.  That’s according to Barracuda analysis of data compiled by the K-12 Cybersecurity Resource Center (K-12 CRC), which has been tracking reported attacks against U.S. schools since 2016. This only accounts for the reported cases, however, […]

£36m public funding for hack-resistant chips

The UK government has partnered with Arm to develop chip technologies that are more resistant to cyber threats, backed by £36 million in funding. The move kicks off the the next phase of the government’s Digital Security by Design initiative, which is also backed by Google and Microsoft. Official figures say the average cost of a cyber-attack on […]

Building an effective cyber security culture

There are three methods that make an effective defence against cybersecurity: tools, processes and arguably the most important factor, people. And the vast majority of data breaches take advantage of your people in order to succeed, whether it be an employee opening a malicious attachment, letting a criminal tailgate into the office, or revealing their […]

Do you specialise in Anti-Malware solutions? We want to hear from you!

Each month on IT Security Briefing we’re shining the spotlight on a different part of the cyber security market – and in November we’re focussing on Anti-Malware solutions. It’s all part of our ‘Recommended’ editorial feature, designed to help IT security buyers find the best products and services available today. So, if you’re an Anti-Malware solutions specialist and […]

GUEST BLOG: The Growing DDoS Landscape

By Anthony Webb, EMEA Vice President at A10 Networks A new wave of DDoS attacks on South Africa’s internet service provider has highlighted that these attacks continue to grow in frequency, intensity and sophistication. A10 Networks’ recent report on the Q2 2019: The State of DDoS Weapons has shed more light on the loud, distributed nature of DDoS […]

Does your MSSP add value? Unsure? Switch

It goes without saying that employing a MSSP should make managing your cyber security easier. But that’s not always the case. Ask yourself these five questions to determine whether your MSSP is actually adding the value it claims to be adding. If you aren’t confident, take the first step towards working with a reputable partner […]

Claim the last guest pass to the Security IT Summit

Make sure your name is on the guest list for the Security IT Summit.  Attendance at the Summit will give you the highest ROT (Return on Time), providing 12 months’ worth of meetings and connections in just one day. And it’s FREE for you to attend. Receive a bespoke itinerary of pre-arranged, 1-2-1 meetings, based […]