TECHNOLOGY > > Resilience


« Back to News

2024-10-31

What Industrial Organisations Can Learn From Nation-State Cyber Attacks

Risk Management: Often conceived without cybersecurity in mind, many industrial devices lack basic security measures and controls. By Edgardo Moreno

2024-10-30

Making Insider Threats A Year Round Priority

The Danger Within: The biggest risk to an organization's cyber security comes from the inside - and that needs to be a top priority all year round.

2024-10-26

Getting A Return On Cybersecurity Investment

Can Businesses Really Put a Price on Prevention? A deep dive on investing in cybersecurity tools. By Frank Horneberg & Simon Newman

2024-10-28

Dark Data Helps Boost Business

Unveiling Hidden Insights: Dark data represents a vast reservoir of untapped potential for businesses across industries. By Jacques du Preez

2024-10-28

Zero Trust Architecture: The Key To Securing Hybrid Environments 

Securing hybrid environments, which blend on-premise, public cloud and private cloud resources, presents a complex challenge. By Asher Benbenisty

2024-10-24

The Financial Impact Of Cybercrime

A CFO's Nightmare: Many organizations continue to underestimate the financial consequences of a breach. By John Mc Loughlin

2024-10-22

How Can Cloud Risk Management Elevate Your Cybersecurity Posture?

With cloud computing, cybercrime has become more sophisticated, with unique risks like misconfigurations & insider threats. By Narendra Sahoo

2024-10-21

The UK Needs To Reevaluate Its Cybersecurity Strategy

It is time for the Labour Government to introduce the measures required to safeguard businesses, consumers and their data. By Paul Holland

2024-10-14

CISOs Guide To Compliance & Cyber Hygiene 

Back To Basics: The key concern is to make sure the organisation has the right mechanisms to mitigate risks. By Michael Covington

2024-10-14

A Landmark Ransom Attack On Healthcare

$2.3 Billion In Costs: What one of the worst attacks to ever hit the US healthcare industry can teach us about cybersecurity in 2024. By Claud Bilbao

2024-09-26

A Critical Flaw Exposing Google Cloud Servers

CloudImposer: The flaw could potentially expose millions of servers operating on Google Cloud Platform to Remote Code Execution attacks. 

CyberSecurity Jobsite
Check Point

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Globalscape

Globalscape

Globalscape is a leader in secure data exchange solutions.

Sysmosoft

Sysmosoft

Sysmosoft specializes in providing highly secured telecommunication solutions for mobile devices for companies requiring protected access to sensitive data remotely.

Tenzir

Tenzir

Tenzir's primary focus lies on network forensics: the systematic investigation of cyber attacks with big data analytics.

Uleska

Uleska

Uleska is a scalable platform that provides automated and continuous software security testing whilst translating cyber risk.

Finosec

Finosec

Finosec's mission is to change the way information security and cybersecurity are managed in banking.

SIRP Labs

SIRP Labs

SIRP is a Risk-based Security Orchestration, Automation and Response (SOAR) platform that fuses essential cybersecurity information to enable a unified cyber response.

Phy-Cy.X Security Group

Phy-Cy.X Security Group

Phy-Cy.X specialize in the “Physics” of Information Security through both physical and cyber domains. We are not an IT company, we ARE an Information Security company.

Quantum Armor

Quantum Armor

Quantum Armor is a next-gen cyber security monitoring platform that allows you to continuously stay aware of your security posture, and proactively spot trends, vulnerabilities and potential attacks.

Cybrella

Cybrella

Cybrella offers professional cybersecurity services for small to medium sized businesses and to larger enterprises looking to expand their cybersecurity capabilities.

Abertay cyberQuarter

Abertay cyberQuarter

The Abertay cyberQuarter is a cybersecurity research and development centre housed within Abertay University.

Cybecs Security Solutions

Cybecs Security Solutions

Cybecs was founded to address rapid technological advancement, changing business models, global privacy regulations, and increasing cyber threats for global organizations.

Netcraft

Netcraft

Netcraft is a global leader in cybercrime detection and disruption, combining cutting-edge technology with decades of experience to protect organizations of all sizes from digital threats and attacks.

Dedagroup (Deda)

Dedagroup (Deda)

Dedagroup provide application solutions and IT services to bring innovation at the core of business processes.

Tyto Athene

Tyto Athene

At Tyto Athene, we harness the power of technology to provide solutions that shape the future.

Potech

Potech

Potech provides masterful services in Information & Technology and Cybersecurity to multiple markets across the world.

ecfirst

ecfirst

ecfirst's mission is to establish AI platforms and service capabilities to assess and manage client compliance with global mandates on a continual basis to secure business data and assets.