TECHNOLOGY > > Resilience


« Back to News

2025-07-04

Cyber Resilience Must Start With Visibility

New Rules, New Risks: If organisations don’t have a live picture of their digital environment, then they are already vulnerable.  By Dan Jones

2025-07-02

Why DevOps Security Must Be On Every Leader's Agenda

Embracing Secure DevOps: By embedding security into DevOps processes, organisations can reduce risk, maintain compliance & build digital services.

2025-07-01

Securing Cyber-Physical Systems

A Control Engineering Perspective: Breaches in connected devices or automated decision-making can have risky consequences. Q&A with Dr. Francesca Boem

2025-06-30

Supercharge AI: GPU Power Meets Cyber Resilience

The future of AI infrastructure lies in high-throughput, low-latency storage systems built around object storage paradigms. By Paul Speciale

2025-06-30

Cybersecurity Threats In The Automotive Industry

Data breaches, ransomware & emerging vulnerabilities expose the need for stronger defences, as vehicles become more digitally integrated.

2025-06-30

The UK’s Software Security Code Of Practice Is More Than Just A Guidance

Organisations risk legal action within 12 months if they don't act now to strengthen their systems and prevent attacks. By Andreas Vermeulen

2025-06-27

Cybersecurity: The New Catalyst For SMB Growth 

Threats can become opportunities as cyber strategies shift from defensive necessity to a business catalyst, propelling growth. By Adriaan Bekker

2025-06-24

How Retailers Can Combat The Rising Cyberthreat

Retail Under Siege: Industry experts give their valuable insights on resilience & recovery in the wake of the recent attacks on high-profile brands.

2025-06-24

The Corporate Risk Of Deepfake Deception

When Seeing Isn't Believing: Businesses face a sharp learning curve – one that spans technology, training & organizational culture. By Neil Weller

2025-06-20

The UK’s Defence Shift & The Urgency Of Sovereign Digital Infrastructure

Rethinking The Stack: Resilience today is not just about redundancy. It is about ownership of code, protocols, and platforms. By Matthew Hodgson

2025-06-23

The Future Of Digital Leadership Starts With The Website

Downgrading website strategy misses a critical opportunity to unite technology governance with business outcomes. By Doug Cunningham

CyberSecurity Jobsite
Check Point

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

QinetiQ

QinetiQ

QinetiQ is one of the world's leading defence technology and security companies. Areas of activity include air, land, sea and space systems, weapons, robotics, C4ISR and cyber security.

ReadWrite

ReadWrite

ReadWrite is a leading media platform dedicated to IoT and the Connected World.

Promon

Promon

Promon is an application security vendor providing Self-Protection abilities to Mobile apps and Desktop applications.

Avansic

Avansic

Avansic is a leading provider of e-discovery and digital forensics services to attorneys, litigation support teams, and business communities.

Berwick Partners

Berwick Partners

Berwick Partners’ Cyber Security Practice is a leading recruiter of senior management positions in this field; we have an exceptional understanding of the constantly changing Cyber landscape.

Harel Mallac Technologies

Harel Mallac Technologies

Harel Mallac Technologies is a Mauritian organisation that has developed a strong network of ICT specialists with nodes across the African continent.

AppTec

AppTec

AppTec is a leading software vendor in the field of Unified Endpoint Management and Mobile Security.

Cybersecurity Professionals

Cybersecurity Professionals

Search vacancies from top cyber security jobs worldwide on CyberSecurity Professionals. View IT security jobs or upload your CV to be seen by recruiters from industry leading firms.

Eaton

Eaton

Eaton provides comprehensive cybersecurity services for operational technology (OT) to help keep your operations and personnel safe.

Fasken

Fasken

Fasken is one of the largest business law firms in Canada and a recognized leader in privacy and cybersecurity law.

Sprint Networks

Sprint Networks

Sprint Networks is a trusted compliance and risk program advisor which deliver cost-effective technology to reduce enterprise-wide risk.

BCN Group

BCN Group

BCN Group is an agile IT solutions provider. We are experts in delivering and managing business-critical technology solutions.

Airiam

Airiam

Airiam provides cybersecurity, managed IT, consulting, incident response, and digital transformation services so you can focus on what matters most.

Papua New Guinea National Cyber Security Centre (PNG NCSC)

Papua New Guinea National Cyber Security Centre (PNG NCSC)

PNG NCSC is a jointly funded initiative enabling PNG to benefit with the most advanced cyber protection of its critical information and communications technology infrastructure.

Evolver

Evolver

Evolver delivers technology services and solutions that improve security, promote innovation, and maximize operational efficiency in support of government and commercial customers.

Cybersecurity Elastic Laboratory (CEL)

Cybersecurity Elastic Laboratory (CEL)

CEL specialize in providing top-tier services in vulnerability diagnosis and penetration testing, offering a comprehensive suite of solutions to mitigate cyber risks.