TECHNOLOGY > > Resilience


« Back to News

2025-01-17

Tackling Cyber Threats In The Public Sector

Phishing-Resistance Is Key: Public sector organisations need to have the necessary tools to protect against cyber threats. By Niall McConachie

2025-01-15

Understanding The Importance of Kernel-Level Security

Is Your ICS Kernel Vulnerable?: The kernel is at the core of any industrial operating system - protecting its security is essential. By Tim Reilly

2025-01-08

Which Cybersecurity Trends Will Dominate 2025?

Organisations need to brace for a wave of threats driven by advanced technologies and increasingly sophisticated attack vectors. By Paul McLatchie

2025-01-09

How To Streamline Compliance With NIS2 & DORA 

Managed Detection & Response: A proactive approach that enables organisations to meet the demands of NIS2 & DORA effectively. By Notis Iliopoulos

2025-01-10

How “Right-Sizing” Cybersecurity Initiatives Can Prevent Data Loss

Striking a balance between data protection, cost-effectiveness, usability, and discovering an approach to cybersecurity that works for your business.

2025-01-09

Looking Ahead Of The OMB Zero Trust Mandate In 2025

The Benefits Are Clear: Zero Trust is revolutionizing how organizations safeguard their environments. By Dylan Owen

2025-01-08

What SMBs Already Know About Ransomware & How To Build On It

Despite their differences, ransomware criminals and small business owners manage operations similarly. Let's explore their commonalities.

2025-01-06

How Small & Medium Businesses Can Safeguard Their Critical Assets Against Evolving Cyber Threats

Understanding security threats coupled with concrete, affordable strategies is key to enabling SMBs to build a resilient cybersecurity culture.

2024-12-27

Means, Motives & Opportunities

Relentless Cyber Criminals: Exploring the risk factors that will drive cyber attacks and the threats they will generate in 2025. By Kurt Thomas

2024-12-30

Cybersecurity Measures To Enhance Data Security In 2025

As we enter 2025, here are four predictions for organisations who want to take steps to protect themselves from cyber attacks. By Rick Goud

2024-12-30

How CISOs Can Master Cyber Attack Communications

Under Pressure: The modern CISO's responsibility goes beyond technical leadership, especially when things go wrong. By Mark Bowling

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

IASME Consortium

IASME Consortium

IASME is one of five companies appointed as Accreditation Bodies for assessing and certifying against the UK Government's Cyber Essentials Scheme.

Clearpath Solutions Group

Clearpath Solutions Group

Clearpath Solutions Group expertise covers virtualization and data storage technologies, networking, security and cloud computing.

AvePoint

AvePoint

AvePoint is an established leader in enterprise-class data management, governance, and compliance software solutions.

PubNub

PubNub

PubNub enables developers to build secure realtime Mobile, Web, and IoT Apps.

STMicroelectronics

STMicroelectronics

ST is a global semiconductor leader delivering intelligent and energy-efficient products and solutions that power the electronics at the heart of everyday life.

limes datentechnik

limes datentechnik

limes datentechnik is an authority in the fields of cryptography and data compression. The FLAM product family is an internationally accepted standard for efficient and safe handling of data.

Cyber Army Indonesia (CyberArmyID)

Cyber Army Indonesia (CyberArmyID)

Cyber Army Indonesia (CyberArmyID) is the first platform in Indonesia to collect and validate reports from hackers (referred to as Bug Hunter) regarding vulnerabilities that exist in an organization.

Sera-Brynn

Sera-Brynn

Sera-Brynn is one of the highest-ranked, pure-play cybersecurity compliance and advisory firms in the world.

HorizonIQ

HorizonIQ

HorizonIQ (formerly Internap Corp / INAP) maximizes efficiency and innovation with flexible infrastructure solutions.

Zuratrust

Zuratrust

Zuratrust provide protection for all kinds of email related cyber attacks.

Insight Partners

Insight Partners

Insight Partners is a leading global private equity and venture capital firm investing in growth-stage technology, software and Internet businesses.

SECUINFRA

SECUINFRA

SECUINFRA has been supporting companies in detecting, analyzing and defending against cyber attacks since 2010.

FourthRev

FourthRev

FourthRev is an education-technology start-up with a mission to solve the skills crisis of the Fourth Industrial Revolution.

Turk Telekom

Turk Telekom

Turk Telekom is the first integrated telecommunications operator in Turkey.

Illustria

Illustria

Illustria is your agent-less “watchdog” for all open source libraries. Our mission is becoming a dev-velocity company, enabled via cyber security.

United Nations Office of Counter-Terrorism (UNOCT)

United Nations Office of Counter-Terrorism (UNOCT)

UNOCT provides UN Member States with the necessary policy support of the UN Global Counter-Terrorism Strategy, and wherever necessary, expedites delivery of technical assistance.