TECHNOLOGY > > Resilience


« Back to News

2024-12-02

Is Zero Trust The Future Of Cybersecurity?

A zero-trust architecture is especially effective for organizations that use cloud applications and have lots of remote workers and locations.

2024-12-02

2025: A New Year Of Cybersecurity Challenges

Certainty Of Cyberthreats: Leaders should cultivate a culture of vigilance, encouraging employees to be beware of the unexpected. By John Mutuski

2024-11-27

Cybersecurity Essentials For Laptop Gamers

Understanding the basics of cybersecurity for laptop gamers allows you to enjoy online gaming without fear of a compromised device & stolen identity.

2024-11-29

From Credentials To Identity: Understanding Digital Identity & Access

Proactive security strategies, continuous monitoring & education are key to combat the threat of credential misuse & identity theft. By Ford Merril

2024-11-26

Taking The You Out Of USB

How Businesses Can Reduce Risk: USBs are a particular concern for air gapped networks where defence relies on segregation.  By Jon Fielding

2024-11-25

Why Insider Threats Remain The “Wild Card” In Cybersecurity

There has been a big surge in insider threat incidents, with the average cost of each occurrence now reaching $15.38 million. By Miguel Clarke

2024-11-22

Google Invests In U.S. Education With 15 New Cybersecurity Clinics

Google aims to supercharge fifteen US universities & colleges by investing $1 million in in their capacity to improve cybersecurity standards.

2024-11-22

Practice Makes Perfect For Incident Response

In any pressured situation, being practiced and prepared removes a lot of the stress and makes people more effective. By Gemma Moore

2024-11-22

The Importance Of Cyber Security In Safeguarding E-Commerce Businesses

The stability of e-commerce platforms cannot be considered ‘one and done’ measures. They require constant vigilance & adaptability from providers.

2024-11-18

Managing API Sprawl: The Growing Risk Of Shadow APIs & How To Mitigate It

Improve your API governance posture and eliminate API security blind spots with a deeply integrated service catalogue. By Miko Bautista

2024-11-15

USB Attacks: The Threat Putting Critical Infrastructure At Risk

Insights into the challenges organisations face in securing removable media, along with practical advice for enhancing its security. By James Neilson

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

4ARMED

4ARMED

4ARMED specializes in penetration testing, information security consultancy and security training

Information Security Media Group (ISMG)

Information Security Media Group (ISMG)

Information Security Media Group is the world’s largest media organization devoted solely to information security and risk management.

Northbridge Insurance

Northbridge Insurance

Northbridge is a leading Canadian business insurance provider. Services offered include Cyber Risk insurance.

Odix

Odix

Odix security software neutralizes file embedded targeted cyber attacks before they enter your organization’s network.

Sangfor Technologies

Sangfor Technologies

Sangfor is a global leader of IT infrastructure, security solutions, and cloud computing.

Online Business Systems

Online Business Systems

Online Business Systems is an information technology and business consultancy. We design improved business processes enabled with robust and secure information systems.

iONLINE

iONLINE

iONLINE delivers high quality IT services and solutions to businesses in Azerbaijan.

R2S Technologies

R2S Technologies

R2S can help you implement a cyber security framework to ensure your business is more resilient towards the growing threat of cyber crime. We provide Web and Mobile Application Security Assessment..

Abnormal Security

Abnormal Security

Abnormal is an API-based email security platform providing protection against the entire spectrum of targeted email attacks.

Huntress Labs

Huntress Labs

Huntress provides managed threat detection and response services to uncover and address malicious footholds that slip past your preventive defenses.

iSolutions

iSolutions

iSolutions is an official reseller and engineering company of leading products and solutions for cybersecurity and information protection, optimization, visualization and control of applications

Ultra Electronics

Ultra Electronics

Ultra specialises in providing application-engineered bespoke solutions. We focus on mission critical and intelligent systems in the defence, security, critical detection & control markets.

AnaVation

AnaVation

AnaVation is a trusted partner delivering high-value, cost-effective solutions that solve the most complex technical and analytical problems for our customers.

Darktrace

Darktrace

Darktrace is a global leader in cybersecurity AI, delivering complete AI-powered solutions in its mission to free the world of cyber disruption.

Druva

Druva

Druva is the industry’s leading SaaS platform for data resiliency, and the only vendor to ensure data protection across the most common data risks backed by a $10m guarantee.

Flow Security

Flow Security

Enterprises run on data, Flow secures it at runtime. With a runtime-first approach, Flow is a game-changer in the data security space, securing data itself, beyond the infrastructure it resides in.