TECHNOLOGY > > Resilience


« Back to News

2025-04-29

Five Top-Rated Threat Intelligence Platforms

Cyber Threat Intelligence: High quality analytics are priceless in curating thoughtful risk management and business continuity plans.

2025-04-29

British Government Needs To Lean On Automation To Bolster Cyber Resilience

Autonomous Endpoint Management: A precise overview of government IT assets & vulnerabilities, immediately improving cybersecurity. By Dan Jones

2025-04-28

Cybersecurity Risks In Legacy Scheduling Systems & How To Mitigate Them

Scheduling Software: Relying on legacy systems without actively investing in updates and patches can open businesses to cybersecurity risks.

2025-04-24

How CISOs Can Speak The Language Of Risk & Resilience 

Boardroom Lingo & Accountability: The most effective CISOs today aren’t just securing infrastructure, they’re securing trust. By Tim Grieveson

2025-04-17

Protecting Your Website From SEO Fraud

Effective Tips To Know About: If you become the victim of SEO fraud there can be unpleasant consequences for both your credibility & reputation.

2025-04-11

Unlocking Business Potential With Strategic IT Evaluations

Technology Assessment: Ensuring the appropriate decisions, matching technology to strategic objectives, improving efficiency, and reducing risks.

2025-04-14

How Companies Can Manage Third-Party Vendor Risk

Risk Gateways: In the age of digital connectivity, a business’s cybersecurity is only as strong as its weakest vendor. By Vishaal Hariprasad

2025-04-11

Do You Need Security That Starts With “Prove It”?

Deciding Between A Software-Defined Perimeter And A VPN: Both aim to secure remote access, by quite different routes. By Don Boxley

2025-04-11

Neurodiversity - The Untapped Talent Pool Solving Cybersecurity's Skills Gap 

Neurodiverse Talent: Embracing neurodiversity represents both an ethical imperative and a strategic opportunity. By Glen Williams

2025-04-07

Britain Is Unprepared To Defend Itself From Nation-State Hackers

The rising sophistication of cyber attacks and state-backed incidents has exposed many vulnerabilities within UK public sector organisations.

2025-04-08

Rethinking Cyber Defence For Tomorrow's Threats

Restricting access through identity management & authorisation can help organisations face cybersecurity challenges. By Spencer Young

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Civica

Civica

Civica provides cloud-based managed IT services, hosting and outsourcing.

QATestLab

QATestLab

QATestLab is a leading International software testing company offering a full range of software testing services including security testing.

Copper Horse Solutions

Copper Horse Solutions

Copper Horse specialises in mobile and IoT security, engineering solutions throughout the product lifecycle from requirements to product security investigations.

Cyber Security Recruiters

Cyber Security Recruiters

Cyber Security Recruiters is a niche recruiting firm who finds impact players for our clients in the Information Security Space.

APrivacy

APrivacy

APrivacy provides information and communication security products for the financial services industry.

Claroty

Claroty

Claroty was conceived to secure and optimize OT networks that run the world’s most critical infrastructures.

Comarch

Comarch

Comarch is a provider of IT business solutions to optimize operational and business processes. Cyber security solutions are focused on Identity Management and Security Assessment services.

Approach

Approach

Approach is a leading provider of cyber security consulting and secure application development services in Belgium.

RealCISO

RealCISO

RealCISO is a CISO grade cloud platform to help companies understand, manage, and mitigate their cyber risk.

Kyndryl

Kyndryl

Kyndryl has a comprehensive portfolio that leverages hybrid cloud solutions, business resiliency, and network services to help optimize your IT workloads and transformations.

Quad9 Foundation

Quad9 Foundation

Quad9 is a free security solution that uses DNS to protect your system against the most common cyber threats. It improves your system's performance, plus, it preserves and protects your privacy.

Ibento Global

Ibento Global

Ibento organises the CyberX series of cybersecurity conferences.

Xceptional

Xceptional

Xceptional is a multi-award-winning technology services firm that celebrates the unique strengths of people with autism.

Teleskope

Teleskope

Teleskope are on a mission to empower businesses to protect sensitive data by default.

FoxPointe Solutions

FoxPointe Solutions

FoxPointe Solutions is a full-service cyber risk management and compliance firm.

LEPHISH

LEPHISH

LePhish is a French cybersecurity solution specializing in automated phishing campaigns.