TECHNOLOGY > > Resilience


« Back to News

2024-06-06

The Cybersecurity Risks Of Generative AI

GenAI security risks are revealing themselves as multi-faceted threats that stem from how different users interact with the tools. By Jaimen Hoopes

2024-06-04

You’ve Got Mail

Why Secure & Responsible Email Is Key to Safeguarding Our Data: The consequences of misusing it can be severe. By Anita Mavridis

2024-06-04

Identities Are The Highest Priority Risk Area

Focus On Identity Management: Senior security leaders’ support for Zero Trust is increasing, but skills and budgets aren’t keeping pace.

2024-06-03

Increasing Software Cyber Resilience

A new ‘Code of Practice for Software Vendors’ will ensure that security is fundamental to developing and distributing products and services. 

2024-06-04

The Devastating Effects Of A Man-in-the-Middle Attack

Man-in-the-middle attacks are effective & worrisome because in many cases, the victim will have no clue that their communication has been compromised.

2024-05-31

Telecoms - Beware Of The DDoS Threat Actor

Combatting the wave of DDoS attacks against the telecommunications industry is critical to protecting global connectivity. By Richard Hummel

2024-05-24

New Guidance For Business Email Compromise

Britain's NCSC has issued new BEC guidance, including practical steps to reduce the chances your organization suffering from these attacks.

2024-05-21

MOD Data Breach Shows Supply Chain Security Continues To Be A Top Priority

The most critical data assets need the highest level of protection. That means prioritizing data based on the potential impact if it is compromised. 

2024-05-21

Cloud Threats Require New Advanced Defenses

Surge In Cloud Security Incidents: Although cloud attacks are increasing very few organisations are able to mitigate risks easily and quickly.

2024-05-20

Focus On Black Basta Ransomware

US cyber defence agencies have issued a joint advisory intended to help organizations mitigate the impact of prolific & costly 'Black Basta' malware.

2024-05-16

A Way To Build A Comprehensive Backup Strategy 

Jira Backup Best Practices: Organizations that implement these practices improve task accessibility & guarantee quick recovery with a few clicks.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Mega

Mega

Mega is a secure cloud data storage provider with browser-based high-performance end-to-end encryption.

ATSEC Information Security

ATSEC Information Security

ATSEC is an independent, privately-owned company that focuses on providing laboratory and consulting services for information security.

Aporeto

Aporeto

The Aporeto platform protects cloud applications from attack by authenticating and authorizing all communications with a cryptographically signed identity assigned to every workload.

Q-Net Security

Q-Net Security

Protect your critical networks. Q-Net Security make hardware that provides the strongest drop-in security for your existing critical infrastructure.

Maven Security Consulting

Maven Security Consulting

Maven Security Consulting helps companies secure their information assets and digital infrastructure by providing a wide range of customized consulting and training services.

Sentinel

Sentinel

Sentinel works with governments, media and defence agencies to help protect democracies from disinformation campaigns by developing a state-of-the-art AI detection platform.

LogMeIn

LogMeIn

LogMeIn makes it possible for millions of people and businesses around the globe to do their best work simply and securely—on any device, from any location and at any time.

AdaCore

AdaCore

AdaCore is focused on helping developers build safe, secure and reliable software.

IN4 Group

IN4 Group

IN4 Group is a skills, innovation and start-up services provider that specialises in supporting businesses with the training, communities, networks and advice they need to scale.

Grove Group

Grove Group

Grove provides businesses with the tools that work best for their unique operations, through cybersecurity and cloud services, custom software development and our big data analytics expertise.

Eureka Security

Eureka Security

Eureka help organizations securely use any cloud data storage technology they need without having to compromise on security.

Symptai Consulting

Symptai Consulting

Symptai Consulting is a leading Cyber Security, Digital Transformation and Anti-Money Laundering firm serving the Caribbean and the wider world.

TatvaSoft

TatvaSoft

TatvaSoft is a custom software development company delivering business IT solutions and related services to customers across the globe.

GrayMatter

GrayMatter

GrayMatter provides Advanced Industrial Analytics, OT Cybersecurity, Digital Transformation and Automation & Control services to clients across the U.S. and Canada.

CYDEF

CYDEF

CYDEF provides comprehensive, state-of-the-art cybersecurity protection that is accessible and affordable to organizations of any size.

NOYB

NOYB

NOYB is a non-profit organization aiming to close the gap between privacy laws and the reality of corporate practice.