TECHNOLOGY > > Resilience


« Back to News

2025-03-19

Exploring The Growing Popularity Of Data Security Posture Management

Decoding DSPM: A security model that protects data directly, instead of securing the environment in which data is housed, moved or processed.

2025-03-19

Protecting Business From The Infostealer Threat

Infostealers are an ever-growing threat, with cybercriminals finding new ways to harvest credentials & infiltrate corporate networks. By Joel Rennich

2025-03-17

From Static Defenses To Dynamic Systems

Resilience isn’t just about enduring threats - it’s about maintaining the ability to operate and recover under any circumstances. By Engin Kirda

2025-03-14

Shadow IT In Remote Work

Portable Storage: Businesses that fail to address shadow IT risk losing control of their sensitive data and put themselves at risk. By Jon Fielding

2025-03-16

Continuous Cybersecurity Learning Is Business-Critical

Security has shifted from IT mandate to executive imperative, this is why continuous learning is a business-critical function. By Alexia Pedersen

2025-03-13

Protecting Digital Infrastructure Without Going Broke

A modern, data-driven age requires modern, data-storage infrastructures that protect the interests of our nation's citizens. By Adrian Fern

2025-03-11

How CISOs Can Demonstrate The Value Of Their Investments

CISOs Face Many Budget Challenges: Key strategies CISOs can adopt to communicate the value of their investments effectively. By Chad LeMaire

2025-03-10

ZTNA - Back To Basics

Zero Trust Network Architecture: Redefining cybersecurity by treating every user, device & connection as inherently untrustworthy. By Christian Have

2025-03-09

Data Breaches Cause A Financial Burden

A Multi-Faceted Approach: Risk leaders identify data breaches as a leading source of man-made disruptions causing financial burdens.

2025-03-05

Getting Ready To Stop Ransomware Attacks

Look For Warning Signs: Ransomware attacks are a process that gradually invade defensive systems in stages and need to be adequately prepared for.

2025-02-24

Cyber Doomsday Warnings Do More Harm Than Good

The constant escalation of doomsday language is a distraction from more urgent and practical cybersecurity priorities. By Joyce Hakmeh

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

IS Decisions

IS Decisions

IS Decisions builds affordable and easy-to-use Access Management software solutions, allowing IT teams to effectively secure access to Active Directory infrastructures, SaaS apps and data within.

PSC

PSC

PSC is a leading PCI and PA DSS assessor and Approved Scanning Vendor.

Cyber Aware

Cyber Aware

Cyber Aware aims to drive behaviour change amongst small businesses and individuals, so that they adopt simple secure online behaviours.

Compass Security

Compass Security

Compass Security is a specialist IT Security consultancy firm based in Switzerland. Services include pentesting, security assessments, digital forensics and security training.

Preempt Security

Preempt Security

The Preempt Platform delivers adaptive threat prevention that continuously preempts threats based on identity, behavior and risk.

Digital Arts

Digital Arts

Digital Arts provides internet security software and appliance products for companies and individuals.

Belle de Mai Incubator

Belle de Mai Incubator

Belle de Mai Incubator supports and funds innovative startup ideas in digital industries.

C5 Capital

C5 Capital

C5 Capital is a specialist investment firm that exclusively invests in the secure data ecosystem including cybersecurity, cloud infrastructure, data analytics and space.

SafeTech Informatics & Consulting

SafeTech Informatics & Consulting

Safetech's OTShield detects, prevents and analyses cyber-attacks in SCADA and Industrial IoT systems by utilising state of the art deception techniques.

KETS Quantum Security

KETS Quantum Security

KETS harnesses the properties of quantum mechanics to solve challenging problems in randomness generation and secure key distribution and enable ultra secure communications.

Content+Cloud

Content+Cloud

Content+Cloud is a leading technology services business and Managed Services Provider (MSP) with a genuine passion for helping your organisation to succeed, whatever your ambitions.

The Citadel Department of Defense Cyber Institute (CDCI)

The Citadel Department of Defense Cyber Institute (CDCI)

CDCI is established to address the critical national security needed for a skilled cybersecurity workforce.

Cyber Security Services

Cyber Security Services

Cyber Security Services is a cyber security consulting firm and security operations center (SOC).

Avalor

Avalor

Avalor are on a mission to help security teams make faster, more accurate decisions by making sense of their data. With Avalor you can bring in data from anywhere, normalize it and analyze it.

Forensic IT

Forensic IT

Forensic IT is a specialised cyber security firm with expertise in Digital Forensics and Incident Response (DFIR).

SOCRadar

SOCRadar

SOCRadar is an Extended Threat Intelligence (XTI) SaaS platform that combines External Attack Surface Management (EASM), Digital Risk Protection Services (DRPS), and Cyber Threat Intelligence (CTI).