TECHNOLOGY > > Resilience


« Back to News

2023-05-22

Web Application Security Testing: A Complete Guide

Web application security testing plays a vital role in protecting sensitive data from potential threats like SQL injection and cross-site scripting.

2023-05-19

How Unsupported Technologies Threaten Business Security

Obsolete software cannot be updated or patched and hackers know that unsupported applications are their opportunity. By Steve Whiter

2023-05-18

How Can We Realise Cyber Resilience Through Education?

Education is key to enabling organisations to navigate the complex and ever-evolving landscape of cybersecurity threats. By Will Dixon

2023-05-15

Effective Enterprise Vulnerability Management & Compliance

ManageEngine Vulnerability Manager Plus: The comprehensive and effective enterprise vulnerability management and compliance solution 

2023-05-12

What Is The Difference Between Phishing, Smishing & Vishing? 

An Internet user falls victim to cybercrime every 37 seconds: The more we understand scams, the better equipped we are to avoid becoming victims. 

2023-05-11

What The Latest Cybersecurity Trends Mean For Your SME 

Prevention Is Better Than Cure: Employee awareness, a protected domain name and strong authentication protocols can help manage risk.

2023-05-05

Encryption, Security & Privacy

The Intrusive Nation State: How can fully homomorphic encryption advance security practices while preserving privacy? By Ghazi Ben Amor

2023-05-15

Cyber Security And Ransomware Attacks - Problems & Solutions

Stay Ahead Of The Criminals: Five best practices will help you create a roadmap for a comprehensive ransomware prevention strategy. 

2023-05-03

Retrofixing The Remote Workforce

Combining technologies over a single platform can provide a cohesive security solution that can monitor endpoints & network access. By Tim Wallen

2023-05-03

Is ISO 27001 Worth It?

The Only Auditable International Standard For Information Security: What are the relative pros & cons of ISO 27001 - is it worth it? By Phil Robinson

2023-05-03

Why Zero Trust Is Fundamental In Today’s Economic Climate

Harnessing affordable zero trust architecture based solutions is preferable to investing in multiple expensive solutions. By Dominik Birgelen

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

4ARMED

4ARMED

4ARMED specializes in penetration testing, information security consultancy and security training

Crypta Labs

Crypta Labs

Crypta Labs is an Award Winning IOT Security startup that is developing a quantum-based encryption chip to secure the Internet of Things.

Wind River

Wind River

Wind River delivers the technology and expertise that enables the deployment of safe, secure, and reliable intelligent connected systems.

Assured Enterprises

Assured Enterprises

Assured Enterprises provides comprehensive cyber risk identification, management and mitigation across all platforms.

Auxilium Cyber Security

Auxilium Cyber Security

Auxilium Cyber Security is independent information security consultancy company.

Very Good Security (VGS)

Very Good Security (VGS)

VGS is the modern approach to data security. Our SaaS solution gives you all the benefits of interacting with sensitive and regulated data without the liability of securing it.

Oceania Cyber Security Centre (OCSC)

Oceania Cyber Security Centre (OCSC)

OCSC engages with government and industry to conduct research, develop training opportunities and build capacity for responding to current and emerging cyber security issues.

National CyberWatch Center

National CyberWatch Center

National CyberWatch Center is a cybersecurity consortium working to advance cybersecurity education and strengthen the national workforce.

AiCULUS

AiCULUS

AiCULUS is a global technology company that specializes in API security and Risk Management products.

Rayzone Group

Rayzone Group

Rayzone Group offers a wide range of Cyber Security solutions and services, providing hollistic protection suitable for both enterprises and National cyber security centers.

IT-Seal

IT-Seal

IT-Seal GmbH specializes in sustainable security culture and awareness training.

Progress Partners

Progress Partners

Progress Partners is a corporate advisory firm that works with buyers and sellers of emerging growth companies to complete M&A or private placement transactions. Our sectors include cybersecurity.

OX Security

OX Security

OX is a DevOps software supply chain security solution. Teams can verify the integrity and security of every artifact using a pipeline bill of materials (PBOM).

Protect AI

Protect AI

Protect AI is a cybersecurity company focused on AI & ML systems. Through innovative security products and thought leadership in MLSecOps, we help our customers build a safer AI powered world.

Censinet

Censinet

Censinet provides the first and only third-party risk management platform for healthcare organizations to manage the threats to patient care that exist within an expanding ecosystem.

NVISO Security

NVISO Security

NVISO is a pure-play cyber security consulting firm, focused mainly on the Financial Sector, the Technology Sector, and Government & Critical Infrastructure.