TECHNOLOGY > > Resilience


« Back to News

2025-08-21

Grapplling With Security Alert Overload

A new report reveals that businesses are struggling with cyber security and that it takes an average of 11 person-hours to resolve a single incident.

2025-08-20

Sprawling Non-Human Identities Are the Next Big Cyber Risk

The Mess We Made: Validating non-human identities is just as important – if not more so – than validating human ones. By Nicolas Fort

2025-08-19

Why Resilience Must Replace Ransom

From Passive Defense To Active Resilience: Organisations must rethink how they plan for, respond to & recover from cyber incidents. By Jamie Moles

2025-08-18

SAP Security In The Age Of AI

Systems powered by SAP are valuable targets for cyber criminals. Now, AI can shift the advantage from attackers to defenders. By Joris van de Vis

2025-08-15

2025 Data Health Check - Rising Cybersecurity Risks & A Changing Threat Landscape

Heightened Awareness: Cybersecurity threats are escalating, and organisations must invest more strategically in their defensive measures.

2025-08-13

IT Leaders Overwhelmed By Tool Management

Fragmentation: Some IT departments oversee as many as 15 tools, putting enormous pressure on resources, security & operational efficiency.

2025-08-09

Upskilling Must Be A Strategic Priority

UK Tech Stands At A Crossroads: Upskilling should be embedded in digital strategy, budget planning, and leadership KPIs. By Alexia Pedersen

2025-08-11

Ransomware Hits Major Brands. Lessons For Active Directory Management.

Active Directory credentials are as valuable as the crown jewels, so why are so many teams treating them like an afterthought? By Eric Clay

2025-08-08

A Brief Guide To Navigating Ransomware & Extortion 

Upon discovering a ransom note, businesses face the critical decision of whether to remain silent or engage with the threat actors. By Dan Saunders

2025-08-08

What Businesses Should Be Doing Instead Of Buying More Tech

No tools or training can replace situational awareness and real-time visibility across your entire digital infrastructure. By John McLoughlin

2025-08-07

Ransomware Evolution: AI, Identity Gaps & Leadership Blind Spots Are Shaping The Threat

While AI gives defenders better tools, it also shortens the time they have to respond. That's why prevention must be the focus. By Spencer Young

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

ACME Communications

ACME Communications

ACME Communications specialises in the field of data centre, implementation, maintenance & operation and all aspects of other IT service.

Guardtime

Guardtime

Guardtime's Black Lantern platform provides real-time cybersecurity and data-centric asset protection.

Oppida

Oppida

Oppida provides tailored IT security services to help you identify security gaps and assist in finding the most effective remediation.

NPCore

NPCore

NPCore is specialized in defense solution against unknown APT and Ransomware and provides two-level defense on network and endpoint based on behavior.

LaoCERT

LaoCERT

LaoCERT is the national Computer Incident Response Team for Laos.

Belden

Belden

Belden is a global leader in signal transmission and security solutions for mission-critical applications in enterprise and industrial markets. Belden brands include Hirschmann and Tofino Security.

National Initiative for Cybersecurity Education (NICE) - USA

National Initiative for Cybersecurity Education (NICE) - USA

NICE is a partnership between government, academia, and the private sector focused on cybersecurity education, training, and workforce development.

eResilience

eResilience

eResilience is a division of Referentia Systems, a pioneer in an ultra-secure information safeguarding technique known as “Enclaving”, in which data can be segmented and protected within a network.

Cybersecurity Center for Secure Evolvable Energy Delivery Systems (SEEDS)

Cybersecurity Center for Secure Evolvable Energy Delivery Systems (SEEDS)

SEEDS conducts research and develops innovative cybersecurity technologies, tools, and methodologies that advance the energy sector’s ability to survive cyber incidents.

Reliance Cyber

Reliance Cyber

Reliance Cyber (formerly Reliance ACSN) help to monitor and manage your organisation’s security infrastructure 24/7, so you can make sure all threats and issues are dealt with.

Polestar Industrial IT

Polestar Industrial IT

Polestar work on both sides of the IT & OT divide. Network, Data & Asset Security is our priority. Polestar installations are robust and resilient and comply with the appropriate security.

Alethea

Alethea

Alethea is a technology company helping companies, nonprofits, and democracies protect themselves from harms stemming from disinformation and social media manipulation.

ISO WISH

ISO WISH

Take your Business to the Next Level with ISO Certification in UAE.

Contextal

Contextal

Contextal develops cutting-edge open-source cybersecurity solutions, designed to connect the dots and detect complex threats, which slip through the existing protections.

Rebellion Defense

Rebellion Defense

Rebellion Defense is a technology company developing advanced software to ensure mission-critical organizations stay ahead of emerging threats.

Synergetika

Synergetika

Synergetika is a leading pure-play Privileged Access Management (PAM) consultancy and systems integrator.