TECHNOLOGY > > Resilience


« Back to News

2021-10-13

The Many Dangers Of WFH

70% of remote workers have experienced IT problems during the pandemic and 54% had to wait up to three hours for the issue to be resolved.

2021-10-05

Data Is Your Most Valuable Asset. How Are You Protecting Yours?

Backup: Keeping a copy of data is not sufficient, you need an effective system that can protect and support it, everywhere. By Colin Tankard

2021-09-29

Cyber Security Priorities For The New Normal

New Normal: CISOs have the simultaneous challenges of building cyber preparedness, minimising risks & ensuring business continuity.

2021-09-22

The CISO's Job Is Getting More Complex

Evidence suggests that the the role of a CISO has never been more complex, challenging & critical to the resilience of the organisation they work for.

2021-09-21

Zero Trust Architecture - No Longer A ‘Nice to Have’

A Zero Trust mindset is now an operational necessity & there are some essential components organisations must adopt. By Paul German

2021-09-15

British Organisations Are Unready For Remote Work

Risky Business: Research shows that half of British companies lack the basic cyber security skills and employers need to take urgent action. 

2021-09-14

National Cybersecurity Failings: How Businesses Can Improve Their Security

Despite the UK scoring highly for cybersecurity in the past, in the latest index the country ranks as 8th worst across Europe. By Hayley Kershaw

2021-09-14

Secure Network Access For The Modern Distributed Workforce

When a company’s digital assets have to travel long distances over the Internet to share between remote workers, you can trust nothing and no one.

2021-09-13

Mēris Botnet Goes Global

The Mēris botnet is comprised of around 250K malware-infected devices and lies behind a damaging wave of large scale DDoS attacks.

2021-09-10

Privacy Concerns In CRM: 3 Key Ways To Avoid Security Risks

CRM software contains valuable data on customer behavior and buying patterns, usually considered to be jackpots by hackers. By Myrah Abrar

Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

WEBINAR: How to build a secure access service edge (SASE) model in AWS

WEBINAR: How to build a secure access service edge (SASE) model in AWS

Thursday, 21 October, 2021 - In this webinar, SANS and AWS Marketplace will explore SASE and share how organizations can move to a SASE model to enhance security for modern infrastructures.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Cylance Smart Antivirus

Cylance Smart Antivirus

An antivirus that works smarter, not harder, from BlackBerry. Lightweight, non-intrusive protection powered by artificial intelligence. BUY NOW - LIMITED DISCOUNT OFFER.

Perimeter 81

Perimeter 81

Perimeter 81 is a Zero Trust Network as a Service designed to simplify secure network, cloud and application access for the modern and distributed workforce.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

King & Spalding

King & Spalding

King & Spalding is an international law firm with offices in the United States, Europe and the Middle East. Practice areas include Data, Privacy & Security.

Infiltrate

Infiltrate

INFILTRATE is a deep technical conference that focuses entirely on offensive security issues.

Great Bay Software

Great Bay Software

Great Bay's Beacon Suite is an endpoint security solution for continuous visibility, onboarding, monitoring and enforcement of all network devices.

Glasswall Solutions

Glasswall Solutions

Glasswall Solutions has developed a disruptive, innovative security technology which provides unique protection against document based cyber threats.

CERT-UA

CERT-UA

CERT-UA is the national Computer Emergency Response Team for Ukraine.

SlashNext

SlashNext

The SlashNext Internet Access Protection System (IAPS) provides Zero-Day protection against all internet access threats including Social Engineering & Phishing, Malware, Exploits and Callback Attacks.

Lumen Technologies

Lumen Technologies

Lumen is an enterprise technology platform that enables companies to capitalize on emerging applications and power the 4th Industrial Revolution (4IR).

Ustels

Ustels

Ustels provides brand protection strategy, intelligence, monitoring and enforcement services.