TECHNOLOGY > > Resilience


« Back to News

2024-09-23

Combating Cyber Attacks With Threat Intelligence 

Navigating Cybersecurity: Threat intelligence has a key role in reducing risks and can be integrated with other tools to reach better solutions.

2024-09-12

Which US States Are Most At Risk From Cyber Attacks? 

Colorado, New York, Nevada & California Top The List: Three out of four companies in the US are found to be at risk of a material cyber attack.

2024-09-16

What Android Users Need To Know About New Malware

SpyAgent: A new Android mobile malware which targets mnemonic keys by scanning your device for recognisable images. By Oliver Devane

2024-09-13

Unlocking A Unified Digital Identity For Europe

eIDAS 2.0: Empowering EU citizens by ensuring their personal data is protected throughout the digital identity ecosystem. By Tim Callan

2024-09-11

NIS2 - Countdown To Compliance

How CISOs Can Lead The Charge: Immediate actions CISOs must take to ensure their organisations fully comply with NIS2. By Andrew Lintell

2024-09-10

The Obstacles That Security Teams Face In Vulnerability Management

The Big Five: To stay ahead of adversaries, teams must use advanced technologies and prioritise the most critical vulnerabilities. By Sylvain Cortes

2024-09-03

Bolster Security Using Dark Web Intelligence

Transferring unknown risk into known and mitigated risk, preventing threat actors before they strike and taking immediate actions in response.

2024-08-30

Understanding Social Engineering Attack Methods 

Social Engineering Targets Human Vulnerabilities: Deceiving unsuspecting users into dropping their security & giving up sensitive information.

2024-08-28

For Many Businesses Experiencing MultiCloud Data Breach, Multi-Cloud Security Could Be The Answer

There are common challenges associated with securing multi-cloud environments and multi-cloud security can help prevent these breaches.

2024-08-29

The NIS2 Directive Will Impact The Security Ecosystem Across The EU

NIS2: Protecting networks and information systems through proactive measures and responding quickly when under a cyberattack. By Jos Beernink

2024-08-28

Enhancing SaaS Security: Leveraging VPNs & ITDR to Combat Identity Theft:

Organizations can establish a strong barrier against the various dangers aimed at their networks by adopting ITDR and VPNs in their security plan.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Zanasi & Partners

Zanasi & Partners

Zanasi & Partners is a security research and advisory company active in the EU and MENA areas. Services focus on technology solutions.

SISSDEN

SISSDEN

SISSDEN will improve cybersecurity through the development of increased awareness and the effective sharing of actionable threat information.

DocAuthority

DocAuthority

DocAuthority automatically discovers and accurately identifies unprotected, sensitive documents, enabling a broad yet business-friendly security policy.

Open Systems International (OSI)

Open Systems International (OSI)

Our innovative Operations Technology (OT) solutions are highly scalable and can be deployed by various utility companies to monitor, control and optimize their real-time operations.

Gospel Technology

Gospel Technology

Gospel presents a totally new way of accessing and controlling data which is enterprise grade scalable, highly resilient, and secure.

CSC Digital Brand Services

CSC Digital Brand Services

Our brand protection and security expertise give our customers peace of mind that no matter how fast the digital world changes, their intellectual property and digital assets will be secure.

Knovos

Knovos

Knovos is a leading technology innovator developing solutions for automating, integrating, and innovating Information Governance.

Blue Cedar

Blue Cedar

Blue Cedar's mobile app security integration platform secures and accelerates mobile app deployment for enterprises and government organizations around the world.

Lifetech

Lifetech

Lifetech is a software development, product engineering and system integration company. Cybersecurity services include SIEM deployment and training.

Grayshift

Grayshift

Grayshift is the leading provider of mobile device digital forensics, specializing in lawful access and extraction.

Cognyte

Cognyte

Cognyte is a global leader in investigative analytics software that empowers a variety of government and other organizations with Actionable Intelligence for a Safer World.

Gulf Business Machines (GBM)

Gulf Business Machines (GBM)

GBM is a leading end-to-end digital solutions provider, offering the broadest portfolio, including industry-leading digital infrastructure, digital business solutions, security and services.

Netcraft

Netcraft

Netcraft is a global leader in cybercrime detection and disruption, combining cutting-edge technology with decades of experience to protect organizations of all sizes from digital threats and attacks.

Neosoft

Neosoft

Néosoft is an independent digital transformation consulting group with expertise in Consulting & Agility, Cybersecurity, Data, DevOps, Infrastructure & Cloud and Software Engineering.

CODA Intelligence

CODA Intelligence

CODA's AI-powered attack surface management platform helps you sort out the important remediations needed in order to avoid exploits on your systems.

Phone Monitoring Service

Phone Monitoring Service

Phone Monitoring Service provides cyber security services, ethical hacking services, social media hacking services in the USA, Canada, Europe.