Can you join 60 peers at the Security IT Summit?

There’s a free VIP place reserved for you at the Security IT Summit. Claim yours today! 2 July 2019 – Hilton Canary Wharf, London This unique event is entirely FREE for you to attend – simply reserve your place here to secure these benefits:- Source new innovative and budget-saving suppliers Attend inspirational seminar sessions from […]
Do you specialise in Browser Security? We want to hear from you!

Each month on IT Security Briefing we’re shining the spotlight on a different part of the cyber security market – and in June we’re focussing on Browser Security solutions. It’s all part of our ‘Recommended’ editorial feature, designed to help IT security buyers find the best products and services available today. So, if you’re a Browser Security solutions […]
The YubiKey: Setting the global standard for two-factor and passwordless authentication

How do you currently authenticate and manage users within your organisation? Discover how your business compares against the industry standard with our free self-assessment and get a relevant, actionable, executive report! Our assessment takes less than 4 minutes and the first 10 people to complete it will receive a £5 Amazon Voucher! Click here for your FREE […]
Digital skills shortages ‘costing UK £63bn a year’

A lack of technical expertise has fuelled skills shortages across the UK for the last two decades. That is according to comparative analysis of the professional jobs market by The Association of Professional Staffing Companies (APSCo). A 1999 report from University College London said almost half (47%) of all ‘skill-shortage vacancies’ that year could be […]
NCSC outlines data breach roles

Data breach roles have been outlined to help victims of cyber incidents and form an improved approach between the UK’s technical authority for cyber threats and its independent authority for data protection. Speaking at the second day of the National Cyber Security Centre (NCSC) annual conference CYBERUK, Chief Executive Ciaran Martin and Information Commission Office […]
Network with the best at the Security IT Summit

Join senior cyber security professionals from Arcadia Group, EDF Energy, Tesco and more at the Security IT Summit on July 2nd. It’s entirely free for you to attend – simply register here. As our VIP guest, you’ll be provided with an itinerary of face-to-face meetings with suppliers who match your requirements. You can also attend […]
Evolving mobile device management strategies

By Dom Hume, VP Product & Technical Services, Becrypt As organisations continue to innovate to realise efficiencies through the use of increasingly sophisticated and pervasive mobile technologies, many are continually challenged by the risks associated with managing an ever growing device estate. Successfully managing the complexity of multiple software and hardware mobile platforms necessitates a […]
WEBINAR: 6 Critical Steps for Securing Office 365, Thursday 9th May at 10am BST

Microsoft Office 365 continues to be the most used cloud-based application adopted by organisations worldwide. As a popular productivity suite, its capabilities are broad and help users collaborate with people both inside and outside their organisation. A broad set of capabilities, however, creates challenges in accessing and protecting the data that is used across the […]
Cyber attacks rise as readiness levels fall

A sharp increase in the number and cost of cyber attacks is the key finding in a study of more than 5,400 organisations across seven countries, commissioned by insurer Hiscox. More than three out of five firms (61 per cent) report one or more attacks in the past year, yet the proportion achieving top scores […]
Dstl challenges potential cyber recruits with online game

The Defence Science and Technology Laboratory (Dstl) has launched an online game to recruit more than 60 staff to work in Cyber and Information Systems. There are opportunities across a range of areas including in Data Science, Cyber & Electronics Warfare, as well as Space, Sensors & Security Systems. Supporting the campaign is a new online […]
 
								