TECHNOLOGY > > Resilience


« Back to News

2024-09-16

What Android Users Need To Know About New Malware

SpyAgent: A new Android mobile malware which targets mnemonic keys by scanning your device for recognisable images. By Oliver Devane

2024-09-13

Unlocking A Unified Digital Identity For Europe

eIDAS 2.0: Empowering EU citizens by ensuring their personal data is protected throughout the digital identity ecosystem. By Tim Callan

2024-09-11

NIS2 - Countdown To Compliance

How CISOs Can Lead The Charge: Immediate actions CISOs must take to ensure their organisations fully comply with NIS2. By Andrew Lintell

2024-09-10

The Obstacles That Security Teams Face In Vulnerability Management

The Big Five: To stay ahead of adversaries, teams must use advanced technologies and prioritise the most critical vulnerabilities. By Sylvain Cortes

2024-09-03

Bolster Security Using Dark Web Intelligence

Transferring unknown risk into known and mitigated risk, preventing threat actors before they strike and taking immediate actions in response.

2024-08-30

Understanding Social Engineering Attack Methods 

Social Engineering Targets Human Vulnerabilities: Deceiving unsuspecting users into dropping their security & giving up sensitive information.

2024-08-28

For Many Businesses Experiencing MultiCloud Data Breach, Multi-Cloud Security Could Be The Answer

There are common challenges associated with securing multi-cloud environments and multi-cloud security can help prevent these breaches.

2024-08-29

The NIS2 Directive Will Impact The Security Ecosystem Across The EU

NIS2: Protecting networks and information systems through proactive measures and responding quickly when under a cyberattack. By Jos Beernink

2024-08-28

Enhancing SaaS Security: Leveraging VPNs & ITDR to Combat Identity Theft:

Organizations can establish a strong barrier against the various dangers aimed at their networks by adopting ITDR and VPNs in their security plan.

2024-08-27

Prioritizing Data Security In The Age Of Generative AI

The integration of generative AI brings a wave of innovation, but it also introduces new cybersecurity risks to protecting your data. By Samer Diya

2024-08-19

Resilience As Regulation: Preparing For The Impact Of CER

EU Critical Entities Resilience Directive: Along with NIS2, the CER will change the way organisations think about security. By Andrea Monteleone

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ITQ

ITQ

ITQ is an IT consulting firm with a focus on the entire VMware-product portfolio with three main services: Professional Services, Support Services and Managed Services.

DriveLock

DriveLock

Our security solution is designed to prevent external attacks, which are evermore sophisticated as well as monitor, document and even prevent internal incidents.

Clusit

Clusit

Clusit is the Italian Association for Information Security, a nonprofit organization devoted to promoting every aspect of information security.

Assured Information Security (AIS)

Assured Information Security (AIS)

AIS is committed to providing our customers with critical information security products, services, and training. We support diverse needs throughout business and industry.

Ideagen

Ideagen

Ideagen provides information management, safety, risk and compliance software solutions that allow organisations to achieve operational excellence, regulatory compliance and reduce risk.

CloudMask

CloudMask

CloudMask patent technology provides Dynamic Data Masking (DDM) that masks sensitive data, structured or non-structured, in real-time.

Nakivo

Nakivo

NAKIVO is dedicated to delivering the ultimate backup, ransomware protection and disaster recovery solution for virtual, physical, cloud and SaaS environments.

Aries Security

Aries Security

Aries Security provides a premiere cyber training range and skills assessment suite and develops content for all levels of ability.

Vantea SMART

Vantea SMART

Vantea SMART have decades of experience in cybersecurity resulting in an approach of proactive prevention - Security by Design and by Default.

RNTrust

RNTrust

RNTrust provide solutions to meet today’s digital challenges utilizing digital technologies and services to make you more secured in digitally connected environment.

Deeper Network

Deeper Network

Deeper Network represents the world's first decentralized blockchain network for building a truly private, secure and fair Internet.

Onwardly

Onwardly

For everyday folks tasked with implementing security and privacy. Do it faster with Onwardly - build, launch and scale your cyber resilience program in 30 minutes per week.

Appranix

Appranix

Appranix delivers Cloud App Resilience with app-centric entire cloud resources backup, restore, and cross-region disaster recovery.

CODA Intelligence

CODA Intelligence

CODA's AI-powered attack surface management platform helps you sort out the important remediations needed in order to avoid exploits on your systems.

Aberrant

Aberrant

A radically new approach to managing information security. Aberrant is the single pane of glass through which a security program can be viewed.

Tototheo Global

Tototheo Global

Tototheo Global harness the power of connectivity and technology to bridge technological divides, driving progress, security, and sustainability for a seamlessly connected world.