TECHNOLOGY > > Resilience


« Back to News

2024-11-22

The Importance Of Cyber Security In Safeguarding E-Commerce Businesses

The stability of e-commerce platforms cannot be considered ‘one and done’ measures. They require constant vigilance & adaptability from providers.

2024-11-18

Managing API Sprawl: The Growing Risk Of Shadow APIs & How To Mitigate It

Improve your API governance posture and eliminate API security blind spots with a deeply integrated service catalogue. By Miko Bautista

2024-11-15

USB Attacks: The Threat Putting Critical Infrastructure At Risk

Insights into the challenges organisations face in securing removable media, along with practical advice for enhancing its security. By James Neilson

2024-11-13

Network Pen Testing Is A Cybersecurity Secret Weapon

Here’s How To Use It: Six reasons why pen testing should be a regular part of an organization’s security strategy. By Alton Johnson

2024-11-12

Empowering Employees To Prevent Data Leaks

Process Over Top-Down Enforcement: Many workers are beginning to feel overwhelmed by complex security rules. By Anita Mavridis & Sue Musumeci

2024-11-07

The Importance Of Ensuring Domain Infrastructure Security

Domain names play an important role in protecting our digital infrastructure in more ways than one. Q&A Interview with Ram Mohan

2024-11-05

Generating Competitive Advantage Through Compliance

Managing cyber risk is a powerful business enabler, helping businesses to become more efficient and more competitive. By James Eason

2024-11-05

Safeguarding Your Business: 10 Best Practices For Mobile Device Safety

Smartphones, tablets and laptops are essential for communication, data access & collaboration but are equally attractive targets for cyberattacks.

2024-10-30

Eight Updated Smartphone Security Hacks For 2025

Your smartphone isn’t just a device - it’s a digital vault. Keeping your mobile device secure is essential but doesn’t need to be complicated.

2024-10-31

The Developer’s Guide To Preventing Data Leaks & Breaches In Software

With the level of cyber threats so advanced, any weak spots in the code may result in exposed sensitive data & significant financial losses.

2024-11-01

Are Businesses Adopting A ‘Titanic Mindset’ To Data Recovery?

Sinking Feeling: One in five UK companies test their data recovery systems just once a year. Only 5% say they test monthly. By Stephen Young

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Centre for International Governance Innovation (CIGI)

Centre for International Governance Innovation (CIGI)

CIGI research areas include Conflict Management & Security which encompass cyber security and cyber warfare.

CERT.AZ

CERT.AZ

The national Cyber Security Center of the Republic of Azerbaijan.

Hewlett Packard Enterprise (HPE)

Hewlett Packard Enterprise (HPE)

HPE is an information technology company focused on Enterprise networking, Services and Support.

Maritime Cybersecurity Center (MCC)

Maritime Cybersecurity Center (MCC)

Maritime Cybersecurity Center is a not-for-profit organization focused on regional cybersecurity excellence and readiness, with a special emphasis on the maritime community.

totemo

totemo

Totemo offers solutions for the secure exchange of business information.

Echoworx

Echoworx

Echoworx primary and exclusive focus is providing organizations with secure email services.

Gita Technologies

Gita Technologies

Gita Technologies works to create integrated solutions to the thorniest problems in the field of intelligence and cyber today.

Connectitude

Connectitude

Connectitude IIoT Platform ™ is a complete solution for industrial IIoT.

AXELOS

AXELOS

AXELOS develops best practice frameworks and methodologies used globally by professionals working primarily in IT management and cyber resilience.

Connectria

Connectria

Connectria provides cloud hosting, remote monitoring, and compliant cloud security solutions and services to enterprises, medium and small businesses.

Strike Graph

Strike Graph

The Strike Graph GRC platform enables Security Audits & Certifications.

SolidRun

SolidRun

SolidRun is a leading provider of computing and network technology designed to streamline the deployment of edge computing infrastructure and support embedded and IoT markets.

Eden Data

Eden Data

Eden Data is on a mission to break the outdated mold of traditional cybersecurity consulting. We handle all of your security, compliance & data privacy needs.

Total Secure Technology

Total Secure Technology

Total Secure Technology provides trusted Managed IT Security and Managed IT Services for organizations looking to increase their cybersecurity defensive posture.

Fusion5

Fusion5

Fusion5 is a leading ANZ Business Services and IT Solutions provider. Our customers trust us to make their potential reality by providing advisory, IT project deployment, and managed services.

Cyber Solutions Inc

Cyber Solutions Inc

Cyber Solutions has been providing professional IT Support for businesses since 1998.