Looking for new cyber security solutions? Start at the Security IT Summit

We understand that your time is precious, that sourcing new suppliers is tough. The Security IT Summit is our solution. This one-day event, which takes place on July 3rd at the Hilton London, Canary Wharf, will give you the opportunity to meet with innovative and budget-saving suppliers, face-to-face, based on your own individual requirements. No time […]
GUEST BLOG: Social Media Security – How safe is your information?

By Varonis In 2012 a massive cyber attack by a hacker named “Peace” exploited over 117 million LinkedIn users’ passwords. After the dust settled from the initial attack, new protocols were put in place and the breach was all but forgotten in the public eye, the same hacker reared their head again. Nearly five years […]
Big expansion of UK cyber security sector predicted

Property management group Savills has predicted that cyber security firms will occupy 1m sq ft of offices in UK regions by 2023. That’s up from 148,000 sq ft of office space leased in 2017. Savills says the demand from business for extra IT security measures, plus investment from the VC community into cyber security to the […]
GUEST BLOG: Do Americans Ever Change Their Passwords?

By Varonis Just how cautious are Americans when it comes to cybersecurity? In today’s hyper-connected, highly-digitized society, data breaches are becoming increasingly commonplace. And they affect both corporations and individuals. In 2017 alone, the Equifax breach — considered by some to be the worst security breach in recent history — put 145.5 million Americans at […]
Corero inks UK deal for SmartWall Threat system

Specialist cyber threat blocking company Corero Network Security has announced two new orders for its SmartWall Threat Defence System technology, with a combined worth of over $900,000. The agreements consist of a new deal with a UK-based multi-brand media company, plus ongoing development and support for an existing client. The company also said that further orders […]
Do you offer Intrusion Detection & Prevention solutions? We want to hear from you!

Each month on IT Security Briefing we’re shining the spotlight on a different part of the cyber security market – in April we’re focussing on Intrusion Detection & Prevention solutions. It’s all part of our new ‘Recommended’ editorial feature, designed to help IT security buyers find the best products and services available today. So, if you’re an Intrusion Detection […]
Network your way to success at the Security IT Summit

The Security IT Summit will provide you with a rare full working day of networking, learning and connection building – plus cost-saving solutions. Taking place on July 3rd at the Hilton London Canary Wharf, this unique event will enable you to lay the groundwork for your organisation’s cyber security strategy for the rest of 2018 […]
GUEST BLOG: GDPR and CCTV – This will impact your business!

By 2020 CCTV Is your business prepared for the implementation of the General Data Protection Regulation (GDPR)? Set to be introduced on the 25th May 2018, considering what actions you must take is essential to ensuring your company does not face the tough consequences that have been set out. GDPR is set to replace the Data […]
More women needed for cybersecurity roles

New research from Forrester has revealed a significant shortage of women currently employed in the cybersecurity industry. Women represent just 11% of cybersecurity professionals worldwide – and with projections predicting 1.8 million unfilled jobs globally by 2022, it appears the industry is calling for a change to address the gender bias. The research also revealed that decision makers […]
RECOMMENDED: Access Control Systems – Device Authority

IT Security Briefing places the spotlight on Device Authority, a leader supplier of solutions which address the challenges of identity and access management for the Internet of Things (IoT) without human intervention… Device Authority helps its customers and partners simplify the process of establishing trust for the IoT, enabling end-to-end security architecture and scale for […]