[Webinar] Secure access simplified: Unlocking Zero Trust with Microsoft Entra tools

Identity is now the primary attack vector with 600 million identity attacks daily, with more than 99% being password-based.1 Whilst MFA blocks most password-based attacks, threat actors continue to shift their focus moving up the kill chain by attacking infrastructure, bypassing authentication and exploiting applications. Join ITC and Microsoft in a webinar that will provide insight […]

[Webinar] Secure access simplified: Unlocking Zero Trust with Microsoft Entra tools

Identity is now the primary attack vector with 600 million identity attacks daily, with more than 99% being password-based.1 Whilst MFA blocks most password-based attacks, threat actors continue to shift their focus moving up the kill chain by attacking infrastructure, bypassing authentication and exploiting applications. Join ITC and Microsoft in a webinar that will provide insight […]

[Webinar] Secure by design: Your pathway to a secure future

Today, 80% of organisations have attack paths that expose critical assets1 whilst the cost of a data breach has risen to $4.88m2 . Threat actors continue to become better resourced and prepared, challenging even the world’s best defenders.  Improved defences are no longer enough: the increasing volume of attacks calls for effective deterrence, combined with collaborative […]

[Webinar] Secure by design: Your pathway to a secure future

Today, 80% of organisations have attack paths that expose critical assets1 whilst the cost of a data breach has risen to $4.88m2 . Threat actors continue to become better resourced and prepared, challenging even the world’s best defenders.  Improved defences are no longer enough: the increasing volume of attacks calls for effective deterrence, combined with collaborative […]

Getting ready for Microsoft Security Copilot

As we have seen over the last six to 12 months, Microsoft has been releasing Copilot solutions for various workloads (Microsoft Copilot for M365, Copilot for Power Platform, etc). At Microsoft Secure in March 2023, Microsoft Security Copilot, also known as Security Copilot, was announced, and recently more information has surfaced regarding its features, benefits […]

Critical F5 BIG-IP bug​

Multiple vulnerabilities have been found in the F5’s BIG-IP network software  (BIG-IP iControl REST) authentication. Disclosed last week, the bug affects multiple versions of the network management software, which is being tracked as CVE-2022-1388.​ ​Patch ASAP! ​ ​Although CVE-2022-1388 is a proof-of-concept (PoC), there is still a high chance that this vulnerability could expose thousands of users to a remote […]

In partnership with Condatis: Outlook for Identity and Access Management

ITC’s 8th annual Cyber Summit 2022 centres around the theme BEYOND – From resilience to risk. 2021 was the year where resilience was a must for organisations to survive, and whilst this will continue, 2022 is the year where organisations will need to go beyond surviving to thriving – by innovating and strengthening their approach to […]

Panel: Resilience to Risk

ITC’s 8th annual Cyber Summit 2022 centres around the theme BEYOND – From resilience to risk. 2021 was the year where resilience was a must for organisations to survive, and whilst this will continue, 2022 is the year where organisations will need to go beyond surviving to thriving – by innovating and strengthening their approach to […]

The Importance of Fostering A Culture of Cyber Security

With many organisations around the world shifting gear to a hybrid working model and accelerating cloud adoption at speed, we continue to witness a surge of sophisticated cyber attacks backed by increased adversary motivation and capability. Therefore, it is not a surprise that cyber security has been identified as the top priority for businesses post-pandemic, […]