10th November 2026
Hilton London Canary Wharf
10th November 2026
Hilton London Canary Wharf
Days
Hours
Minutes

Do you specialise in Network Security Management? We want to hear from you!

Each month on IT Security Briefing we’re shining the spotlight on a different part of the cyber security market – and in December we’re focussing on Network Security Management solutions. It’s all part of our ‘Recommended’ editorial feature, designed to help IT security buyers find the best products and services available today. So, if you’re an Network Security […]

Security IT Summit: Registration open for 2021

The Security IT Summit brings together industry buyers with innovative and budget-saving solution providers, via a series of online meetings. Date: 10th & 11th March 2021Time: 09:00 – 13:05Location: Virtual This unique, virtual event will take place across two mornings and is the most time-effective way to meet suppliers, whilst working from your home or office. Your attendance is entirely free and completely […]

The state of the security team: Are executives the problem?

By LogRhythm A global survey of security professionals and executives by LogRhythm Amid a slew of statistics on how job stress is impacting security professionals, we sought to learn the causes of the tension and anxiety — as well understand potential ways teams might alleviate and remediate the potential of job burnout.  We ran a […]

Joiner-Mover-Leaver process: Solve it once and for all?

By Tenfold Security JML processes give IT and HR departments regular headaches and often create quite hefty conflicts between those two departments. What is this all about? When a new employee joins your organization, HR will know about them first, as they sign the contracts and do the onboarding. Today, many employees will require IT […]

STUDY: Covid-19 technologies must be regulated to stop ‘big brother’ society

Technologies, such as track and trace apps, used to halt the spread of covid-19 have to be thoroughly examined and regulated before they are rolled out for wider adoption, to ensure they do not normalise a big-brother-like society post-covid-19. That’s according to research conducted by Jeremy Aroles, Assistant Professor in Organisation Studies at Durham University […]

Why endpoint security matters more than ever

The swiftly evolving threat landscape, combined with the huge increase in remote working, means that securing your organisation’s endpoints has never been more critical. Here, George Glass, Head of Threat Intelligence at Redscan, explains the importance of endpoint security and why detecting and responding to the latest threats demands greater endpoint visibility and specialist expertise… […]

Security IT Summit: Save the date!

The next Security IT Summit will take place virtually on March 10th & 11th – make sure you register to attend today! Still offering you the same benefits as the live event – we will bring together the industry’s leading buyers and suppliers together for business collaboration. Your bespoke place is entirely free and includes benefits such as; Prepare for every […]

Identity Access Management vs. Access Rights Management – What’s the Difference?

The terms access management (short: AM; also referred to as access rights management or just rights management) and identity & access management (short: IAM) are often used synonymously. In practice, however, they do not stand for the same thing. In this article, we are going to take a closer look at the difference between access rights management software and identity/access management solutions. Check out the article at https://www.tenfold-security.com/en/identity-access-management-vs-permission-management-whats-the-difference/ If you are […]

Meeting the Tests to get out of Data Lockdown

Digital transformation of any business has always been hampered by making sense of underlying data. And that data has been growing in volume at an unprecedented rate driven by the growth of IoT. It’s the perfect storm – the need for real-time information being increasingly distanced by the rate at which the data volume is […]

Power utilities ‘prioritising cybersecurity’ as threats grow

Power utilities have become more prone to cyberattacks amid the COVID-19 pandemic as attackers have strived to benefit from the rush to remote systems and undermanned facilities. Utilities need to comprehend the new cyber risks involved with home-based work such as social engineering attacks and less reliable internet connections in order to accordingly set up baseline defences and […]