TECHNOLOGY > > Resilience


« Back to News

2024-11-18

Managing API Sprawl: The Growing Risk Of Shadow APIs & How To Mitigate It

Improve your API governance posture and eliminate API security blind spots with a deeply integrated service catalogue. By Miko Bautista

2024-11-15

USB Attacks: The Threat Putting Critical Infrastructure At Risk

Insights into the challenges organisations face in securing removable media, along with practical advice for enhancing its security. By James Neilson

2024-11-13

Network Pen Testing Is A Cybersecurity Secret Weapon

Here’s How To Use It: Six reasons why pen testing should be a regular part of an organization’s security strategy. By Alton Johnson

2024-11-12

Empowering Employees To Prevent Data Leaks

Process Over Top-Down Enforcement: Many workers are beginning to feel overwhelmed by complex security rules. By Anita Mavridis & Sue Musumeci

2024-11-07

The Importance Of Ensuring Domain Infrastructure Security

Domain names play an important role in protecting our digital infrastructure in more ways than one. Q&A Interview with Ram Mohan

2024-11-05

Generating Competitive Advantage Through Compliance

Managing cyber risk is a powerful business enabler, helping businesses to become more efficient and more competitive. By James Eason

2024-11-05

Safeguarding Your Business: 10 Best Practices For Mobile Device Safety

Smartphones, tablets and laptops are essential for communication, data access & collaboration but are equally attractive targets for cyberattacks.

2024-10-30

Eight Updated Smartphone Security Hacks For 2025

Your smartphone isn’t just a device - it’s a digital vault. Keeping your mobile device secure is essential but doesn’t need to be complicated.

2024-10-31

The Developer’s Guide To Preventing Data Leaks & Breaches In Software

With the level of cyber threats so advanced, any weak spots in the code may result in exposed sensitive data & significant financial losses.

2024-11-01

Are Businesses Adopting A ‘Titanic Mindset’ To Data Recovery?

Sinking Feeling: One in five UK companies test their data recovery systems just once a year. Only 5% say they test monthly. By Stephen Young

2024-10-31

Preparing IT Teams For The Next AI Wave

The growing importance of AI has created a compelling reason for IT departments to address risk and compliance with renewed urgency.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Detectify

Detectify

Detectify is a web security service that simulates automated hacker attacks on your website, detecting critical security issues before real hackers do.

Verimuchme

Verimuchme

Verimuchme is a digital wallet and exchange platform to secure, verify and re-use personal information.

Bericon Forensics

Bericon Forensics

Bericon is one of the longest established forensic science consultancies in the UK. Activities include computer and mobile phone forensics.

Shape Security

Shape Security

Shape Security provide best-in-class defense against malicious automated cyberattacks on web and mobile applications.

Calian Group

Calian Group

Calian is a diverse Canadian company offering professional services in areas including Advanced Technologies, Health, Learning and IT & Cyber Solutions.

ClearBlade

ClearBlade

ClearBlade is the Edge Computing software company enabling enterprises to rapidly engineer and run secure, real-time, scalable IoT applications.

Quest Software

Quest Software

Simple IT management for a complex world. Whether it’s digital transformation, cloud expansion, security threats or something new, Quest helps you solve complex problems with simple solutions.

SoSafe

SoSafe

SoSafe empowers organizations to build a security culture and mitigate risk with its GDPR-compliant awareness programs.

Verodin

Verodin

Verodin is a business platform that provides organizations with the evidence needed to measure, manage and improve their cybersecurity effectiveness.

SWAT Systems

SWAT Systems

SWAT Systems is an IT support and cyber security managed service provider.

Cytellix

Cytellix

Cytellix is an industry-standards-based, managed cybersecurity service provider, specializing in proactive behavioral analytics and situational awareness of an organization’s cyber posture.

Coveware

Coveware

Coveware helps businesses remediate ransomware. We help companies recover after files have been encrypted, and our analytic, monitoring and alerting tools help companies prevent ransomware incidents.

Palmchip

Palmchip

Palmchip is a Cyber Security, SOC and Software consulting company. We design and develop high performance and secure applications.

Gorilla Technology Group

Gorilla Technology Group

Gorilla specializes in video analytics, OT network security and big data to support a wide range of solutions for commercial, industrial, cities and government purposes.

Sycope

Sycope

Sycope is focused on designing and developing highly specialised IT solutions for monitoring and improving network and application performance.

Solid8 Technologies

Solid8 Technologies

Solid8 Technologies is a value added distributor and innovation incubator partnering with leading global Cyber Security software Vendors.