24th June 2025
Hilton London Canary Wharf
11th November 2025
Hilton London Canary Wharf
Search
Close this search box.

GUEST BLOG: 60 must-know cybersecurity statistics for 2018

By Varonis Cybersecurity issues are becoming a day-to-day struggle for businesses. Trends show a huge increase in hacked and breached data from sources that are increasingly common in the workplace, like mobile and IoT devices. Additionally, recent research suggests that most companies have unprotected data and poor cybersecurity practices in place, making them vulnerable to […]

GUEST BLOG: The anatomy of a phishing email

By Varonis Phishing scams are one of the most common ways hackers gain access to sensitive or confidential information. In fact, according to the Verizon’s 2018 Data Breach Investigations Report, phishing is involved in 70 percent of breaches that feature a social engineering component. What is Phishing? At the most basic level, a phishing scam […]

INDUSTRY SPOTLIGHT: EveryCloud Cloud Access Security

EveryCloud partner with Gartner and Forrester, cloud security leaders to access, to compare and improve your cloud security capabilities. We assist you to build combined solutions from products that suit your needs and goals and assist with GDPR data protection compliancy. From Cloud Access Security (CASB), Identity Access Management (IAM) and Email & Web Security, […]

Just a third of UK firms will be GDPR compliant by May 25

UK companies are hugely ill-prepared for this week’s General Data Protection Regulation (GDPR) enforcement deadline, according to new research. Less than a third (29%) of organisations surveyed by USB drive specialist Apricorn felt confident they would comply, and when questioned further and asked whether there were any areas they might be likely to fail, 81% […]

Bomgar updates Privileged Identity offering following Lieberman acquisition

Bomgar has released the latest version of its Privileged Identity solution, including enhanced integrations with Bomgar Privileged Access, as well as improved manageability over SSH keys and Linux systems. The platform is a rebranded and updated version of the award-winning RED Identity Management solution from Lieberman Software, which Bomgar acquired earlier this year. The company says advanced […]

Security IT Summit – Don’t miss out!

Security IT Summit

There are only a handful of delegate places left for this summer’s essential cyber security industry event. It takes place on July 3rd 2018 at the Hilton London Canary Wharf – and, as one of just 60 VIP guests, you can attend the Security IT Summit for FREE. REGISTER FOR YOUR FREE PLACE HERE Your […]

GUEST BLOG: Having the right connections – Are VPNs really fit for purpose?

Stuart Sharp, Global Director of Solutions Engineering at OneLogin Remote working has fast become commonplace in today’s business landscape. Free from the stress of the modern-day workplace, employees are increasingly keen to opt for the laptop and crack on with work uninterrupted, all from the comfort of their own home. In fact, the Office for […]

Do you specialise in Advanced Threat Dashboards? We want to hear from you!

Each month on IT Security Briefing we’re shining the spotlight on a different part of the cyber security market – in June we’re focussing on Advanced Threat Dashboard solutions. It’s all part of our ‘Recommended’ editorial feature, designed to help IT security buyers find the best products and services available today. So, if you’re an Advanced Threat Dashboard […]

INFOGRAPHIC: Is your biggest security threat already inside your organization?

The person in the cubicle next to you could be your company’s biggest security threat. The large-scale attacks we’re accustomed to seeing in the news — Yahoo, Equifax, WannaCry ransomware — are massive data breaches caused by cyber criminals, state-sponsored entities or hacktivists. They dominate the news cycle with splashy headlines that tell an all-too […]

Less than half of firms detect a cyber breach within an hour

A recent report by security intelligence firm LogRhythm has revealed that less than half of the organisations it monitored was able to detect a cyber security breach within an hour. The research study, ‘Cybersecurity: Perceptions & Practices’, also found that less than one-third said that even if they detected a major incident, they would be […]