TECHNOLOGY > > Resilience


« Back to News

2021-04-20

Cyber Threats & Nuclear Dangers

The threat to nuclear weapons systems, materials and facilities which are vulnerable to cyber attacks, sabotage and theft is a serious present danger.

2021-04-20

Easy-to-Guess Passwords Are Risky

Making It Easy For Thieves: Too many people are using easy-to-guess passwords, including their pet's name, football team or a memorable date.

2021-04-15

Making 2FA More Secure

2FA provides a way of 'double checking' that you really are the person you are claiming to be and new technology applies this to facial movements.

2021-04-14

Cyber Attacks Target SAP Applications

Attackers are better informed about many organisation’s SAP systems than some of their internal teams, who have a limited time to repsond.

2021-04-14

UK Cyber Security Council Officially Launched

The Council is a self-regulatory organisation responsible for boosting professional standards & career prospects for cyber security professionals.

2021-04-12

Industrial Control System Security Is Overlooked

Not My Job: Conventional IT-led network security often does not view control system devices and processes as their problem. By Joe Weiss

2021-04-09

Credentials Phishing Attacks

Attackers are adapting and have some new tactics to serve up credential phishing pages as way to bypass existing Office365 detection measures.

2021-04-06

Cybersecurity For Financial Industries: Latest Trends For Fraud Prevention

Financial services companies need to anticipate and prevent fraud by unearthing and fixing loopholes faster than the bad guys. By David Lukić

2021-04-05

Your Employee's Cyber Awareness Is Critical

Organisations need a culture of data security and employees are the caretakers of their own organisation’s most valuable and sensitive data.

2021-04-05

The European Union Adopts A Cyber Security Strategy

An agreed EU framework to defend businesses, organisations and citizens from cyber attacks and to promote secure information systems.

Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Free Access: Cyber Security Supplier Directory listing 5,000+ specialist service providers.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Cylance Smart Antivirus

Cylance Smart Antivirus

An antivirus that works smarter, not harder, from BlackBerry. Lightweight, non-intrusive protection powered by artificial intelligence. BUY NOW - LIMITED DISCOUNT OFFER.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

eBook: Practical Guide to Security in the AWS Cloud

eBook: Practical Guide to Security in the AWS Cloud

AWS Marketplace would like to present you with a digital copy of the new book, Practical Guide to Security in the AWS Cloud, by the SANS Institute.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Mako Group

Mako Group

The Mako Group specializes in protection - providing security through auditing, testing, and assessments. And, we do it all with the highest quality standards possible.

CISPA Helmholtz Center for Information Security

CISPA Helmholtz Center for Information Security

The CISPA Helmholtz Center for Information Security is a German national Big Science Institution within the Helmholtz Association. Our research encompasses all aspects of Information Security.

Secure Crossing

Secure Crossing

Secure Crossing specializes in critical infrastructure and industrial control system security technology.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

ITRenew

ITRenew

ITRenew is a leading global IT lifecycle management solutions company, specializing in onsite data center decommissioning and data erasure services.

Threat Status

Threat Status

Threat Status are a Threat Intelligence company. We are the developers of Trillion. A cloud based Security As A Service (SaaS) platform.

Cloudburst Security

Cloudburst Security

Cloudburst Security specialize in providing a full spectrum of high-quality, innovative cybersecurity services to both government and commercial organizations.

TierPoint

TierPoint

TierPoint delivers secure, reliable, and connected infrastructure solutions at the internet’s edge. We meet you where you are in your journey to solve for data storage, compute, and recovery.

Secured Communications

Secured Communications

Secured Communications has developed the only unified secure communications platform trusted by public safety and counter terrorism professionals around the world.