[Webinar] Secure access simplified: Unlocking Zero Trust with Microsoft Entra tools

Identity is now the primary attack vector with 600 million identity attacks daily, with more than 99% being password-based.1 Whilst MFA blocks most password-based attacks, threat actors continue to shift their focus moving up the kill chain by attacking infrastructure, bypassing authentication and exploiting applications. Join ITC and Microsoft in a webinar that will provide insight […]
[Webinar] Secure access simplified: Unlocking Zero Trust with Microsoft Entra tools

Identity is now the primary attack vector with 600 million identity attacks daily, with more than 99% being password-based.1 Whilst MFA blocks most password-based attacks, threat actors continue to shift their focus moving up the kill chain by attacking infrastructure, bypassing authentication and exploiting applications. Join ITC and Microsoft in a webinar that will provide insight […]
[Webinar] Secure by design: Your pathway to a secure future

Today, 80% of organisations have attack paths that expose critical assets1 whilst the cost of a data breach has risen to $4.88m2 . Threat actors continue to become better resourced and prepared, challenging even the world’s best defenders. Improved defences are no longer enough: the increasing volume of attacks calls for effective deterrence, combined with collaborative […]
[Webinar] Secure by design: Your pathway to a secure future

Today, 80% of organisations have attack paths that expose critical assets1 whilst the cost of a data breach has risen to $4.88m2 . Threat actors continue to become better resourced and prepared, challenging even the world’s best defenders. Improved defences are no longer enough: the increasing volume of attacks calls for effective deterrence, combined with collaborative […]
Getting ready for Microsoft Security Copilot

As we have seen over the last six to 12 months, Microsoft has been releasing Copilot solutions for various workloads (Microsoft Copilot for M365, Copilot for Power Platform, etc). At Microsoft Secure in March 2023, Microsoft Security Copilot, also known as Security Copilot, was announced, and recently more information has surfaced regarding its features, benefits […]
Critical F5 BIG-IP bug

Multiple vulnerabilities have been found in the F5’s BIG-IP network software (BIG-IP iControl REST) authentication. Disclosed last week, the bug affects multiple versions of the network management software, which is being tracked as CVE-2022-1388. Patch ASAP! Although CVE-2022-1388 is a proof-of-concept (PoC), there is still a high chance that this vulnerability could expose thousands of users to a remote […]
In partnership with Condatis: Outlook for Identity and Access Management

ITC’s 8th annual Cyber Summit 2022 centres around the theme BEYOND – From resilience to risk. 2021 was the year where resilience was a must for organisations to survive, and whilst this will continue, 2022 is the year where organisations will need to go beyond surviving to thriving – by innovating and strengthening their approach to […]
Panel: Resilience to Risk

ITC’s 8th annual Cyber Summit 2022 centres around the theme BEYOND – From resilience to risk. 2021 was the year where resilience was a must for organisations to survive, and whilst this will continue, 2022 is the year where organisations will need to go beyond surviving to thriving – by innovating and strengthening their approach to […]
ITC Secure announces strategic partnership with Condatis to extend identity and security capabilities

ITC Secure forms new partnership with Condatis to enrich current identity and access management and managed security services London, UK – December 16, 2021 – ITC Secure (ITC), a leading advisory-led cyber security services company, announced today that it has formed a strategic partnership with Condatis, a UK leader for Microsoft external identity solutions and a thought leader […]
The Importance of Fostering A Culture of Cyber Security

With many organisations around the world shifting gear to a hybrid working model and accelerating cloud adoption at speed, we continue to witness a surge of sophisticated cyber attacks backed by increased adversary motivation and capability. Therefore, it is not a surprise that cyber security has been identified as the top priority for businesses post-pandemic, […]