24th June 2025
Hilton London Canary Wharf
11th November 2025
Hilton London Canary Wharf
Search
Close this search box.

Accountancies take lion’s share of cyber security recruitment

The UK’s so-called ‘Big Four’ accountancy firms account the for majority of cyber security recruitment in the country. Job search site Indeed.com has released data that shows PwC, KPMG, EY and Deloitte take the top four places in its Top 10 ranking, ahead of the likes of Vodafone, Aviva and Barclays (see table below). Indeed […]

Survey reveals increasing IT investment in containers

87 percent of IT professionals are now running container technologies, with 90 percent of those running in production and 7 in 10 running at least 40 percent of their application portfolio in containers. That’s up considerably from two years ago, when just 67 percent of teams were running container technologies in production, according to the […]

INDUSTRY SPOTLIGHT: CurrentWare AccessPatrol

Use the latest technology to prevent employees causing data breaches  Data theft can rob you of thousands of dollars and countless hours of hard work and effort. So how should a company protect itself from cyber threats? CurrentWare’s AccessPatrol helps secure company endpoints like USBs, DVDs, Bluetooth devices. AccessPatrol allows you to generate comprehensive reports that highlight endpoint device usage […]

Can you join 60 peers at the Security IT Summit?

There’s a free VIP place reserved for you at the Security IT Summit. Claim yours today! 2 July 2019 – Hilton Canary Wharf, London This unique event is entirely FREE for you to attend – simply reserve your place here to secure these benefits:- Source new innovative and budget-saving suppliers Attend inspirational seminar sessions from […]

Do you specialise in Browser Security? We want to hear from you!

Each month on IT Security Briefing we’re shining the spotlight on a different part of the cyber security market – and in June we’re focussing on Browser Security solutions. It’s all part of our ‘Recommended’ editorial feature, designed to help IT security buyers find the best products and services available today. So, if you’re a Browser Security solutions […]

The YubiKey: Setting the global standard for two-factor and passwordless authentication

How do you currently authenticate and manage users within your organisation? Discover how your business compares against the industry standard with our free self-assessment and get a relevant, actionable, executive report!  Our assessment takes less than 4 minutes and the first 10 people to complete it will receive a £5 Amazon Voucher! Click here for your FREE […]

Digital skills shortages ‘costing UK £63bn a year’

A lack of technical expertise has fuelled skills shortages across the UK for the last two decades. That is according to comparative analysis of the professional jobs market by The Association of Professional Staffing Companies (APSCo). A 1999 report from University College London said almost half (47%) of all ‘skill-shortage vacancies’ that year could be […]

NCSC outlines data breach roles

Data breach roles have been outlined to help victims of cyber incidents and form an improved approach between the UK’s technical authority for cyber threats and its independent authority for data protection.  Speaking at the second day of the National Cyber Security Centre (NCSC) annual conference CYBERUK, Chief Executive Ciaran Martin and Information Commission Office […]

Network with the best at the Security IT Summit

Join senior cyber security professionals from Arcadia Group, EDF Energy, Tesco and more at the Security IT Summit on July 2nd. It’s entirely free for you to attend – simply register here. As our VIP guest, you’ll be provided with an itinerary of face-to-face meetings with suppliers who match your requirements. You can also attend […]

Evolving mobile device management strategies

By Dom Hume, VP Product & Technical Services,  Becrypt As organisations continue to innovate to realise efficiencies through the use of increasingly sophisticated and pervasive mobile technologies, many are continually challenged by the risks associated with managing an ever growing device estate. Successfully managing the complexity of multiple software and hardware mobile platforms necessitates a […]