Exhibitor Press Releases

CCSE

Loading
  • Darktrace Becomes the Official AI Cyber Security Partner of McLaren Racing

  • Reports of vulnerabilities and exploits are likely to rise in 2020. The number of CVEs has increased steadily over the past couple of years, and it has never fallen two years in a row. Also, given the increased fragmentation of hardware and software, and the adoption of large-scale open source and “tweaked” hardware design, we can likely expect a cascade effect when a vulnerably is found in a component and used en masse. These vulnerabilities will affect many vendors and manufacturers, potentially with profound consequences on consumers and organizations.

  • Building on 2019 market-leading momentum, new funding advances Snyk’s mission to bring developer-first security to every software-driven business.

     

  • Digital transformation is a force, propelling businesses to move faster and faster. Organisations that embrace it, implementing DevOps well and embracing the Cloud, are building a competitive gap in the market, while those who lag behind may never be able to recover. 

    However, the journey is not complete until Security joins the ride. As was with DevOps, organisations looking ahead and embracing DevSecOps and a dev-first security approach will see better business results than their peers. Right now it’s a leap of faith – in a few years it will be science.  

  • One of the first Certificate Authorities to retain both ISO27001 and ISO22301 certification

  • Protects Cloud Workloads in Runtime Against the Leading Cause of Cyber Attacks: Unauthorized and Malicious Code

  • CHELTENHAM, UK – January 8, 2020 – Information Risk Management (IRM) today announces the appointment of Matt Griffiths as Sales Director.

  • Significant growth of digital signature usage and customers, IoT initiatives and integrations mark another year of expansion for leading certificate authority

  • Financing Accelerates Automated Penetration Testing Platform Market Expansion

  • According to Tripwire’s survey, 93% of ICS security professionals at energy, manufacturing, chemical, dam, nuclear, water, food, automotive and transportation organizations were concerned about cyberattacks causing operational shutdown or customer-impacting downtime. In an effort to prepare against such threats, 77% have made ICS cybersecurity investments over the past two years, but 50% still feel that current investments are not enough.

  • Avast’s Global PC Risk Report uncovers global risk ratio of the most ‘at risk’ countries

  • In September last year, Facebook confirmed a massive data breach, where attackers had access to 50 million accounts. We do not know exactly what attackers did with the stolen data, but in most cases i ...
  • SentinelOne, the autonomous endpoint protection company, today released the S1 Mobile Admin app, its first-ever mobile application enabling management of the SentinelOne platform directly from the convenience of iOS and Android devices. SentinelOne’s S1 Mobile Admin app allows authorized administrators to view active endpoint threats detected via SentinelOne’s agent, disconnect compromised endpoints and gather advanced threat information directly from their mobile device to be reported back to enterprise SOC teams.

  • SentinelOne, the autonomous endpoint protection company, today unveiled SentinelOne Ranger – turning every protected endpoint into a network detection device capable of identifying and controlling every IoT and connected device on a network. Converging EPP and EDR into a proprietary single agent architecture, SentinelOne is the first and only cybersecurity vendor to expand into the IoT space with the same single codebase and deployment model. 

  • Improved configuration, scalability and availability of nShield Connect XC benefits cloud, IoT and blockchain HSM deployments

  • Introducing Active EDR

    28 Feb 2019 Migo Kedem

    Today we are pleased to announce the revolutionary technology of ActiveEDR. ActiveEDR solves the problems of EDR as you know it by tracking and contextualizing everything on a device. ActiveEDR is able to identify malicious acts in real time, automating the required responses and allowing easy threat hunting by searching on a single IOC.  Read more to understand how we got here and how we created the first and only EDR that is truly active.

  • Over the two-day event, NTT Security will have five speakers participating in conference sessions, including Nathan Britton, Manager Application and Cloud Security Practice for the UK, who will call on businesses to bring their ‘A game’ to cloud security during his session on Tues 12 March (11:25-11:50) in the Cloud Security Innovation Strategies & Service Providers Theatre. Nathan will share examples of how NTT Security’s practical approach to cloud security has helped organisations design and deploy the right controls and focus time and resources to reduce the risk of cloud adoption.

    He comments: “Fears around cloud security have not held back rates of adoption, just increased the anxiety of security professionals. We want to help cloud and security professionals understand what is being deployed in the cloud and how to ensure the right security controls are in place. Importantly, we will highlight the need for a consistent and secure approach, while continuously monitoring cloud security and compliance.”

    Additional speakers sessions include:

    ‘How to avoid reinventing the GRC wheel in the cloud’ 
    (13:10-13:35 on Tues 12 March, Cyber Innovations & GRC Theatre) 
    Majid Ali, Principal Security Consultant, GRC Practice UK and Abdul Nyoka, Principal Security Consultant, GRC Practice, NTT Security will share their experience of common pitfalls in cloud compliance, how to avoid them and take advantage of cloud providers’ technical and governance expertise to reduce cost/risk.

    ‘The terrain to actionable intelligence’ 
    (13:25-13:50 on Tues 12 March, Cloud & Cyber Security Expo Keynote Theatre) 
    Azeem Aleem, VP Consulting & Head of UK Business, NTT Security will analyse the maturity journey required to achieve intelligence-driven security. Explaining the value of adopting the right, proven tactical approach and predictive analytics, he will encourage discussion on how to develop innovative cyber defence, discovery, architectural design, testing, implementation, and operations.

    ‘Changing old thinking about operational technology to manage new risks’ 
    (16:05-16:30 on Tues 12 March, Security of Things Theatre) 
    David Gray, Senior Manager & Practice Lead, NTT Security will examine how organisations are establishing and assessing the internet of risk within their operational technology (OT) landscape, what impact the right threat intelligence can make to detect and disrupt OT attacks, and why forensic analysis really matters for long term OT resilience.

    ‘Make the first 24 hours count!’ 
    (14:10-14:35 on Weds 13 March, Cyber Threats, Intelligence & Response Theatre) 
    Daniel Saunders, Senior Incident Response Consultant, NTT Security, will show the value of implementing an effective incident response plan that helps organisations respond effectively within those first 24 hours and beyond to minimise the impact and cost of an incident, as well as protecting valuable data and intelligently adapting to prevent further attacks.


    Additional information

    For more information on NTT Security at Cloud Expo: 
    https://www.cloudsecurityexpo.com/exhibitors/ntt-security?&azletter=N&searchgroup=libraryentry-exhibitors 

    For information on NTT Communications at Cloud Expo: 
    https://www.cloudexpoeurope.com/exhibitors/ntt-communications 
    https://www.cloudexpoeurope.com/welcome 
    https://www.cloudsecurityexpo.com
     

  • GMO GlobalSign (www.globalsign.com), a global Certificate Authority and leading provider of identity and security solutions for the Internet of Things (IoT), today announced two of the company’s secur ...
  • Heficed’s innovative service makes controlling and managing an IP estate much easier for organisations needing to deploy a large volume and wide variety of IP addresses (unique identifiers which all devices require to access the internet).

     

  • Bot attacks have an increasing impact on the online gambling industry. The biggest threat is now identity spoofing, when hackers takeover accounts and steal money. Fraudsters also register lots of bot accounts aiming to get hold of new players` bonuses. Traditional methods to mitigate bot activity  block by IP addresses, but this is ineffective as it also stops real customers from accessing gambling sites. Variti’s solution saves sites both money and customer experience.

  • KLife

    13 Feb 2019 Ana Sousa

    The company's activity is based on the sale of computer security services and products. In addition, it has the know-how to evaluate and develop strategies to help protect companies and individuals by providing computer assistance and custom software development.

    We are a company with great capacity of adaptation and flexibility using several technologies.

  • Alert Logic, the leading provider of SIEMless Threat Management™, announced today that CRN® selected Christopher Rajiah, Senior Vice President of Worldwide Alliances and Partnerships, to its prestigious list of 2019 Channel Chiefs. The list recognizes top IT channel leaders who continually strive to drive growth and revenue in their organizations through their channel partners.

  • Breakthrough in vulnerability management enables organizations to focus on the three percent of vulnerabilities that have been or will likely be exploited in the next 28 days Tenable®, Inc., the Cyber ...
  • Variti is excited to take part in Cloud & Cybersecurity Expo, the UK's highest attendee technology event, from 12th-14th March in London and Variti will be on stand S4350.

Latest News

  • 17-Feb-2020
    18:36

    Register here for our 3-part webinar series, starting on 25th February. Join to understand how to use the dashboards, how the data was prepared using Tableau Prep, and how it all came together in Tableau Desktop Introduction “People can be said to be deprived if they lack the types of diet, clothing, housing, household facilities... Read More

    The post Using data-driven insights to understand deprivation in England appeared first on Techerati.

  • 17-Feb-2020
    17:54

    As DevOps Technical Lead at Virgin Atlantic, Martyn Coupland has two primary responsibilities. First, he is one of the subject matter experts for the airline’s Microsoft Azure platform and the subject matter expert for the Azure toolset which enables its DevOps program.

    In addition to the technical legwork, Martyn also provides expertise “around the softer side of DevOps” - in other words, the people and process side of things: “As technology changes, people change and processes change. DevOps will always be here to ensure all three sit together and provide real value,” he explains. “This allows not just technology teams at Virgin Atlantic but other parts of the business to adopt DevOps methodologies.”

    The post How to chart DevOps success (securely) with Virgin Atlantic’s Martyn Coupland appeared first on Techerati.

  • 17-Feb-2020
    17:24

    In August 2019, Russian media reports began to emerge that orphans were being brought to summer camps in Lithuania and taught to kill. The catch? The story wasn’t true – it was ‘fake news’. Although summer camps do exist in Lithuania (as they do the world over), the young attendees weren’t being taught warfare techniques.

    Misinformation campaigns have long been used by hostile governments against enemies and competitors, yet in the past few years the problem of ‘fake news’ has grown dramatically in scale. Facilitated by social media, it’s easier than ever to spread lies and confusion online. But concerned citizens are starting to take a stand - and they’re using AI to help.

    The post “Fake news!” How AI is countering a major threat to democracy appeared first on Techerati.

Sponsors

Diamond Sponsor

Headline Sponsor

Platinum Sponsor

Stream Sponsors


 

Stream Sponsors

Gold Sponsors

Gold Sponsors


 

Silver Sponsors


 

Silver Sponsors


 

Silver Sponsors


 

Partners

Security Education Partner


 

Event Partner


 

Event Partner


 

Media Partner


 

Media Partner


 

Media Partner


 

Media Partner


 

Media Partner


 

Media Partner


 

Media Partner


 

Media Partner


 

Media Partner


 

Media Partner


 

Media Partner