11th November 2025
Hilton London Canary Wharf
June 2026
Hilton London Canary Wharf

WHITE PAPER: Get total endpoint security with KACE

As an IT professional, you’re likely under pressure to manage an increasingly complex environment, while also protecting your network and devices from cyberthreats. Read this white paper to discover how the KACE Unified Endpoint Manager by Quest enables you to streamline complex endpoint management tasks and gain greater control of both traditional and modern managed […]

53% of manufacturers say operational tech is vulnerable to cyber attack

Manufacturing industry security teams are seeing the information technology (IT) and operational technology (OT) environments converging at a rapid pace, but are struggling to safeguard OT assets as they are using the same tools to safeguard their IT infrastructure. As a result, IT teams can’t keep up with growing volumes of security data or the […]

Joiner-Mover-Leaver process: Solve it once and for all?

By Tenfold Security JML processes give IT and HR departments regular headaches and often create quite hefty conflicts between those two departments. What is this all about? When a new employee joins your organization, HR will know about them first, as they sign the contracts and do the onboarding. Today, many employees will require IT […]

Meeting the Tests to get out of Data Lockdown

Digital transformation of any business has always been hampered by making sense of underlying data. And that data has been growing in volume at an unprecedented rate driven by the growth of IoT. It’s the perfect storm – the need for real-time information being increasingly distanced by the rate at which the data volume is […]

84% of security and IT teams ‘don’t have a positive relationship’

Almost two thirds (59%) of European IT heads believe it is challenging to gain end-to-end visibility of their network, with almost half saying this lack of visibility is a major concern. That’s according to a new poll by IDC/Forrester/VMware, which says more than a third (37%) feel the challenges associated with this lack of visibility […]

Retailers ‘struggling to balance customer experience with IT security’

Retailers are struggling to balance the challenges of delivering increased footfall, bigger basket sizes, and an enhanced customer experience with their fundamental technology and IT security needs. That’s the conclusion of a survey conducted in May 2019 at RetailEXPO 2019 by Cybera, which revealed that offering a differentiated customer experience (31 percent) and increasing footfall (28 […]

Digital skills shortages ‘costing UK £63bn a year’

A lack of technical expertise has fuelled skills shortages across the UK for the last two decades. That is according to comparative analysis of the professional jobs market by The Association of Professional Staffing Companies (APSCo). A 1999 report from University College London said almost half (47%) of all ‘skill-shortage vacancies’ that year could be […]

RECOMMENDED: ANTI VIRUS

IT Security Briefing highlights some of the industry’s key suppliers of anti-virus solutions… Glasswall  Glasswall’s patented deep file inspection, remediation, sanitisation and document regeneration technology eliminates the threat from document-based malware. Glasswall processes files such as PDF, Word, Excel and image files in milliseconds, without relying on detection signatures. Glasswall does not look for bad […]

‘Brute force’ cyber attack on Scottish Parliament

Officials have confirmed that the Scottish Parliament has been targeted by a “brute force” cyber attack, similar to that which affected Westminster in June. Chief executive Sir Paul Grice confirmed the attack in a message to MSPs and staff with parliamentary email addresses, and said the attack was from “external sources” and urged all members […]

Employees are companies’ biggest data security risk

A consensus study commissioned by data security specialist HANDD Business Solutions (HANDD) has revealed that nearly a quarter of IT professionals believe that the behaviour of employees and their reactions to social engineering attacks – which can trick them into sharing user credentials and sensitive data – poses a big challenge to data security. The […]