There’s still time to register for the Security IT Summit

The Security IT Summit takes place in London next month – there’s still time to secure your place at this summer’s essential cyber security industry event. It takes place on July 3rd 2018 at the Hilton London Canary Wharf – and, as one of just 60 VIP guests, you can attend the Security IT Summit […]
Do you specialise in Browser/Web Security? We want to hear from you!

Each month on IT Security Briefing we’re shining the spotlight on a different part of the cyber security market – in July we’re focussing on Browser/Web Security solutions. It’s all part of our ‘Recommended’ editorial feature, designed to help IT security buyers find the best products and services available today. So, if you’re a Browser/Web Security specialist and would […]
INDUSTRY SPOTLIGHT: EveryCloud – Email Security

EveryCloud partners with Gartner and Forrester cloud security leaders to access, compare and improve your cloud security capabilities. We assist you to build combined solutions from products that suit your needs and goals and assist with GDPR data protection compliancy. From Cloud Access Security (CASB), Identity Access Management (IAM) and Email & Web Security, our […]
Study highlights demand for phishing attack simulation and training

A global study has highlighted market demand for simulation and training to combat phishing attacks. The research, commissioned by Barracuda Networks, revealed several points highlighting the need for organisations to include simulation and training as part of their email security posture. It includes responses from over 630 participants who all had a responsibility for email security […]
Third of C-Suite execs would pay hacker’s ransom demands rather than invest in more security

One third of global business decision makers report that their organisation would try to cut costs by considering paying a ransom demand from a hacker rather than invest in information security. In the UK, this figure drops to a fifth (21 per cent) of respondents. The findings from the 2018 Risk:Value Report, commissioned by security […]
INDUSTRY SPOTLIGHT: EveryCloud – Identity Access & Management

EveryCloud partners with Gartner and Forrester cloud security leaders to access, compare and improve your cloud security capabilities. We assist you to build combined solutions from products that suit your needs and goals and assist with GDPR data protection compliancy. From Cloud Access Security (CASB), Identity Access Management (IAM) and Email & Web Security, our […]
GUEST BLOG: 5 tips for a winning risk management strategy

By Gallagher Risk comes in many forms, with varying degrees of cost to your business and recovery times. Here are a few items worth considering when it comes to producing a risk management strategy: 1. Take care of your people Staff really are the most important asset within an organisation. From a risk management perspective, […]
GUEST BLOG: 60 must-know cybersecurity statistics for 2018

By Varonis Cybersecurity issues are becoming a day-to-day struggle for businesses. Trends show a huge increase in hacked and breached data from sources that are increasingly common in the workplace, like mobile and IoT devices. Additionally, recent research suggests that most companies have unprotected data and poor cybersecurity practices in place, making them vulnerable to […]
GUEST BLOG: The anatomy of a phishing email

By Varonis Phishing scams are one of the most common ways hackers gain access to sensitive or confidential information. In fact, according to the Verizon’s 2018 Data Breach Investigations Report, phishing is involved in 70 percent of breaches that feature a social engineering component. What is Phishing? At the most basic level, a phishing scam […]
INDUSTRY SPOTLIGHT: EveryCloud Cloud Access Security

EveryCloud partner with Gartner and Forrester, cloud security leaders to access, to compare and improve your cloud security capabilities. We assist you to build combined solutions from products that suit your needs and goals and assist with GDPR data protection compliancy. From Cloud Access Security (CASB), Identity Access Management (IAM) and Email & Web Security, […]