11th November 2025
Hilton London Canary Wharf
June 2026
Hilton London Canary Wharf

WEBINAR: How to Tackle Working From Home Security Threats

Learn the secrets to securing your organization’s communications while safeguarding against costly data leaks with a remote workforce.  This April 30 webinar from ZIVVER features three industry experts who will bring you up to speed on the new threat landscape.  Stay alert to WFH security threats  Be in the know and hear about the following: […]

Top 5 business telecoms trends for 2020

By Laura Health, Head of Product Development at TSG As with several business technologies, the 2010s saw huge advancements in telecommunications. Whilst VoIP (Voice over Internet Protocol) telephony had been around long before this decade, this is when it really took off as a viable, modern and futureproof solution for businesses around the world. A […]

Do you specialise in Advanced Threat Dashboards? We want to hear from you!

Each month on IT Security Briefing we’re shining the spotlight on a different part of the cyber security market – and in May we’re focussing on Advanced Threat Dashboard solutions. It’s all part of our ‘Recommended’ editorial feature, designed to help IT security buyers find the best products and services available today. So, if you’re an Intrusion Phishing […]

Learn new things on lockdown with our online courses!

Why not use lockdown downtime to learn new skills and improve existing ones with our newly available and unlimited annual courses? These are specially-curated online courses designed to help you and your team, improve expertise and learn new things. The IT and Personal Development online learning bundle provides you with over 50 courses, which cover all areas […]

Security IT Summit: We’ll get through this together!

 Have you confirmed your place at this June’s Security IT Summit? If not, hurry as we only have limited spaces available! Your complimentary pass includes; an itinerary of 1-2-1 meetings with budget-saving suppliers, access to a series of seminars led by industry experts, networking with peers who share your challenges, plus lunch and refreshments throughout. RSVP here to register your […]

McAfee flags autonomous vehicle hacking risks

IT security giant McAfee’s has successfully tricked an autonomous vehicle to accelerate up to 85 MPH in a 35 MPH zone using just two inches of electrical tape. The McAfee Advanced Threat Research (ATR) team and McAfee Advanced Analytic Team (AAT) partnered to explore how artificial intelligence can be manipulated through research known by the analytics […]

69% of SAP users: projects do not prioritise IT security

More than two thirds (68.8%) of SAP users believe their organisations put insufficient focus on IT security during previous SAP implementations, while 53.4% indicated that it is ‘very common’ for SAP security flaws to be uncovered during the audit process. That’s according to the SAP Security Research Report by risk management consultancy, Turnkey Consulting, which […]

Your place awaits at the Security IT Summit

There’s a complimentary guest place reserved for you at the Security IT Summit on June 30th – make sure you claim it before it’s too late! Confirm you will be joining us here. This small and niche event is far removed from the traditional busy and crowded exhibitions and conferences, and takes place at the […]

Join your peers at the Total Security Summit

Security IT Summit

Due to the current situation relating to the outbreak of COVID-19, we have taken the decision to postpone the Total Security Summit until June. The Summit will now take place on the 29th & 30th June at the Radisson Blu, London Stansted. This event is small & niche unlike other large, busy exhibitions and conferences. If you were unable to attend the […]

The rise of the Chief Cybercrime Officer

Matt Cable, VP Solutions Architects & MD Europe, Certes Networks, discusses the role of the CCO and how the CCO and CISO should work in harmony to achieve the common cyber security goals… The TalkTalk data breach in 2015 was monumental for the cyber security industry. At the time, data breaches were hardly new, but […]