TECHNOLOGY > > Resilience


« Back to News

2022-02-01

Britain's Cyber Security Strategy Focuses On Resilience

The British government has announced its Cyber Security Strategy to protect vital public services from the growing risk of destructive cyber attacks.

2022-01-26

Top Tips For SMEs To Dodge Hackers

Small business owners and their employees often lack basic training in cyber security measures and make risky mistakes that could cost them. 

2022-01-26

How To Secure Web Gateway & Web Filtering

A secure web gateway offers protection against online security threats by enforcing company security policies & filtering malicious traffic.

2022-01-25

Defending Against Log4j Vulnerabilities

Concealed Log4j vulnerabilities call for effective measures to reduce the frequency of disruptive events and to reduce the potential damage.

2022-01-25

Making Open-Source Software Safer

Open-source software has unique security challenges, because of its widespread use and the fact its security maintenance is reliant on volunteers.

2022-01-18

Corporate Cyber Attacks Up 50% Last Year

2021 saw a 50% increase in cyber attacks per week on corporate networks compared to 2020, peaking in December, largely due to Log4J exploits. 

2022-01-15

Process Sensor Cyber Security Is A Vital Issue

The gap in process sensor cyber security and process safety is a critical vulnerability in many industries, calling for expert scrutiny. By Joe Weiss

2022-01-12

Azure Active Directory Recycle Bin Won’t Save Your Critical Data

Failing to monitor activity across all Active Directory environments without an effective backup strategy can lead to disaster.  By Greg Jones

2022-01-10

Cyber Security Threats In 2022

Ransomware & Remote Working: The key issue for business cyber security is to make  the transition from reactive to proactive behaviour. 

2022-01-10

Avoid Being A Victim Of Cyber Crime – Get Audited

A cyber security audit is a systematic evaluation of a company's information security by measuring how well it conforms to established criteria. 

2022-01-09

The Complexities Of Operational Technology Make It Vulnerabe

Industrial organisations need to adapt quickly to the expansion of cyber security threats to protect complex Operational Technology systems.

Quartz Conference
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Sapphire

Sapphire

Sapphire provides solutions designed to protect your infrastructure, assets, data and users against current and emerging threats. We are founders of the National Information Security Conference (NISC)

CoSoSys Endpoint Protector

CoSoSys Endpoint Protector

Endpoint Protector by CoSoSys is an advanced all-in-one DLP solution for Windows, macOS, and Linux, that puts an end to unintentional data leaks and protects from malicious data theft.

La Playa

La Playa

La Playa is an award-winning independent insurance broker offering specialist cover in areas including cyber and privacy.

CloudCodes Software

CloudCodes Software

CloudCodes is a cloud security solutions provider focused on providing cloud security solutions to enterprise customers.

Vectra Networks

Vectra Networks

Vectra provides real-time attack visibility and non-stop automated threat hunting powered by artificial intelligence.

Ikerlan

Ikerlan

Ikerlan is an R&D technology centre specialising in areas including embedded systems, industrial automation and industrial cybersecurity.

Illuria Security

Illuria Security

Illuria's fully automated solution detects and sandboxes incoming attacks before they ever reach your servers.

Drainware

Drainware

Drainware is an innovative solution designed to replace legacy traditional AV and deliver advanced protection pre and post-infection to your endpoints.

th4ts3cur1ty.company

th4ts3cur1ty.company

th4ts3cur1ty.company specialize in delivering intelligence lead adversary emulation purple teaming & the bespoke building of Security Operation Centers.

Data Terminator

Data Terminator

Data Terminator provide a comprehensive range of secure data destruction equipment and services are in compliance to US Department of Defense (DoD) and National Security Agency (NSA) standards.

Gijima

Gijima

Gijima is one of SA’s leading ICT companies in Cloud & Outsourcing, Systems integration, Human Capital Management & Training, Cybersecurity, and Unified Communications.

Cider Security

Cider Security

Cider Security - It’s time to revolutionize the way Security, Dev and DevOps teams work together to supercharge security at the speed of engineering.

Araali Networks

Araali Networks

Araali is a proactive risk mitigation solution for cloud workloads. With Araali, you can enforce explicit policies for "who can do what" in your virtual private cloud.

Mission Critical Partners (MCP)

Mission Critical Partners (MCP)

Mission Critical Partners is committed to delivering innovative solutions that help our clients enhance and evolve their critical-communications systems and operations.

NXM Labs

NXM Labs

NXM is a leader in a leader in advanced cybersecurity software for connected devices.

Security BSides Cayman Islands

Security BSides Cayman Islands

Security BSides is a non-profit, community-driven event built for and by information security community members. Our aim is to help build an Information Security community in the Cayman Islands.