WEBINAR: 6 Critical Steps for Securing Office 365, Thursday 9th May at 10am BST
Microsoft Office 365 continues to be the most used cloud-based application adopted by organisations worldwide. As a popular productivity suite, its capabilities are broad and help users collaborate with people both inside and outside their organisation. A broad set of capabilities, however, creates challenges in accessing and protecting the data that is used across the […]
Cyber attacks rise as readiness levels fall
A sharp increase in the number and cost of cyber attacks is the key finding in a study of more than 5,400 organisations across seven countries, commissioned by insurer Hiscox. More than three out of five firms (61 per cent) report one or more attacks in the past year, yet the proportion achieving top scores […]
Dstl challenges potential cyber recruits with online game
The Defence Science and Technology Laboratory (Dstl) has launched an online game to recruit more than 60 staff to work in Cyber and Information Systems. There are opportunities across a range of areas including in Data Science, Cyber & Electronics Warfare, as well as Space, Sensors & Security Systems. Supporting the campaign is a new online […]
Add your name to this list of VIP cyber security professionals
Register today for the Security IT Summit and you’ll be joining a guest list of just 60 senior cyber security professionals. It’s entirely free for you to attend – simply register here. As our VIP guest, you’ll be provided with an itinerary of face-to-face meetings with suppliers who match your requirements. You can also attend […]
Do you provide Advanced Threat Dashboard solutions? We want to hear from you!
Each month on IT Security Briefing we’re shining the spotlight on a different part of the cyber security market – and in May we’re focussing on Advanced Threat Dashboard solutions. It’s all part of our ‘Recommended’ editorial feature, designed to help IT security buyers find the best products and services available today. So, if you’re a Advanced Threat […]
Your personalised schedule at the Security IT Summit
The Security IT Summit is a highly-focused one-day event that will help underpin your cyber security strategy for 2019 and beyond. It takes place on July 2nd at the Hilton Canary Wharf, London and is entirely FREE for you to attend. This will be your schedule: 8.00am: Registration8.45am: Opening presentation9.40am: Seminar sessions10.30am: Pre-arranged 1-2-1 meetings […]
READER OFFER: Benchmark yourself against the industry standard for vulnerability management
How do you currently manage vulnerabilities within your organisation? Discover where you stand against your peers with our free self-assessment and get a relevant, actionable executive report! Our assessment takes less than 4 minutes and the first 10 people to complete it will receive a £5 Amazon Voucher! Click here for your free self-assessment.
Redscan criticises new Government cybersecurity stats
Redscan has disputed the findings of the Department for Digital, Culture, Media and Sport’s latest Cyber Security Breaches Survey. The firm has argued that response bias and the sample of participants makes it impossible to fully trust the data. The DCMS report found that the cost of breaches has gone up for the third year in […]
GUEST BLOG: SME collaboration delivering effective Public Sector IT security
Written by Bernard Parsons, CEO, Becrypt When Becrypt began developing security technology for government more than a decade ago, relationships with Systems Integrators were the only viable route to understanding and accessing customer requirements. Our experiences today are of a vastly more diverse supply chain, with some major government programmes consuming our services as part of […]
Document-based malware increase ‘alarming’
Researchers have uncovered what they’re calling an ‘alarming’ rise in the use of document-based malware. A recent email analysis conducted by Barracuda Networks revealed that 48% of all malicious files detected in the last 12 months were some kind of document. More than 300,000 unique malicious documents were identified. Since the beginning of 2019, however, […]