TECHNOLOGY > > Resilience


« Back to News

2023-03-22

Jackpotting Attacks Are Back - But Banks Can Fight Back

FiXS infects multiple ATM models, corrupting the middleware which runs the hardware - including the cash dispenser. By Juan Ramon Aramendia

2023-03-16

Deepfakes Are Making Business Email Compromise Worse

Bad actors have upped their game with a new weapon in the arsenal: AI-generated deepfake phishing. How can it be stopped? By Tim Callan

2023-03-16

Why Cutting Cybersecurity Jobs Is Shortsighted

Business leaders should make smarter investments to strengthen existing security, not short-term attempts to save money. By Dan Davies

2023-03-16

British Cyber Security - New Threats Call For Action

Three cybersecurity experts talk about what the UK government needs to include in its updated advice & regulation to ensure better national security.

2023-03-23

A 'Golden Pipeline' To Secure The Supply Chain

Building security into the development process is a priority for organisations aiming to avoid the risks of supply chain compromise. By Nurit Bielorai

2023-03-09

Which CI/CD Tools Can Promote Supply Chain Security?

Incorporating these tools into a supply chain security strategy can reduce risk, increase transparency & maintain the integrity of the supply chain.

2023-03-07

Keeping Up With The Increase In Phishing Attacks

Outwitting Employees: More than 80% of organisations experienced at least one successful criminal phishing email attack in 2022. 

2023-03-02

The Office Workplace ln The Hybrid World

Remote Teamwork In Multiple Locations & Settings: What should a modern office look like in today's world of hybrid work. By Samir Desai

2023-02-28

Securing Valuable Data

Crypto-segmentation is a vital tool in creating a security model that truly supports the need to safeguard valuable data assets. By Simon Pamplin

2023-02-27

Start Thinking Like A Hacker

Curiosity Aggression & Persistence: To get inside the mind of a hacker, you need to think like a hacker and this is known as "white hat" hacking.

2023-02-27

Securing Hybrid Workplaces

Network Access: More organisations are working on streamlining their operations by connecting physical and digital security systems.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

GTB Technologies

GTB Technologies

GTB Technologies is a cyber security company that focuses on providing enterprise class data protection and data loss prevention solutions.

Infocyte

Infocyte

Infocyte's unique, agentless threat hunting platform for Windows and Linux is designed to rapidly assess network endpoints for evidence of compromise.

Cyber Exchange

Cyber Exchange

Cyber Exchange provides a focal point for UK organisations connected with, or with an interest in, cyber security to connect, engage and collaborate.

Cyber Risk & Insurance Forum (CRIF)

Cyber Risk & Insurance Forum (CRIF)

CRIF helps organisations understand cyber risks and the damage that might occur by supporting the development of effective insurance solutions.

Cognni

Cognni

Cognni (previously Shieldox) will make your InfoSec think like a human, right out of the box, so you can focus on the bigger picture, keeping the information flow safe.

Seqrite

Seqrite

Seqrite offers a highly advanced range of enterprise and IT security solutions to protect your organization's most critical data.

Vdoo

Vdoo

Vdoo provides an end-to-end product security platform for automating all software security tasks throughout the entire product lifecycle.

ArcusTeam

ArcusTeam

ArcusTeam is at the forefront of the firmware and applications security industry, with a mission to increase the level of security on all IoT devices and applications.

Conviso

Conviso

Conviso is a consulting company specialized in Application Security and Security Research.

DigiByte (DGB)

DigiByte (DGB)

DigiByte (DGB) is a rapidly growing global blockchain with a focus on cybersecurity for digital payments & decentralized applications.

BicDroid

BicDroid

BicDroid is a world leader in data and cyber security with innovative solutions that protect your data anywhere, anytime, against everything.

Tyler Technologies

Tyler Technologies

Tyler Technologies is a leading provider of end-to-end information management solutions and services for local governments.

Hudson Cybertec

Hudson Cybertec

Hudson Cybertec are an internationally recognized Subject Matter Expert for cyber security in the Industrial Automation & Control Systems (IACS) domain.

Zyston

Zyston

Zyston's solutions provide end-to-end management of your cybersecurity needs. Our range of services help protect your business where it needs it the most.

Moore ClearComm

Moore ClearComm

Moore ClearComm is part of Moore Kingston Smith a leading UK firm of accountants and business advisers. Our services include Data Privacy, Cyber Security, Business Continuity and Information Security.

Endure Secure

Endure Secure

Endure Secure is a managed cyber security & information security consultancy. Our passion for IS and our understanding of the threat landscape is reflected in the services that we provide.