TECHNOLOGY > > Resilience


« Back to News

2024-04-25

Creating Successful Cybersecurity Solutions

From Bolt-On To Built-In: Not all cyber security resilience products are equal. What issues should software designers be focusing on? By Vincent Lomba

2024-04-24

Defending Your Supply Chain From Cyber Threats

Securing The Links: The implementation of best practices for supply chain security is a critical step in mitigating cyber risks. By Spencer Starkey

2024-04-22

The Benefits Of Sharing Threat Intelligence

Companies must get a step ahead of malicious actors and using effective threat intelligence software can give proactive protection.

2024-04-23

The Risks Of NIST Non-Compliance

Failing to adhere to NIST regulations can expose organisations’ sensitive data to a myriad of cyber threats & lead to long-term damage.

2024-04-29

Securing The Paris Olympic Games

Disinformation & Cyber Crime: The 2024 Paris Summer Olympics are imminent and the organisers are focusing on the cybersecurity challenge.

2024-04-22

The Evolving Cybersecurity Vulnerability Landscape

Only by continually updating their security posture can businesses ensure they are well-equipped to handle dynamic cyber threats. By Douglas McKee

2024-04-18

Overcoming Security Alert Fatigue

Overload: The relentless barrage of security alerts inundating SOC teams constitutes a real threat to enterprise security. By Brandon Rochat

2024-04-19

Large Language Models Are An Inflection Point For Cyber Security

The LLM Step Change: A technology event comparable to the invention of the Internet, driving a $multi‐billion race to dominate this market.

2024-04-11

The AI Future: Three Tips For SMBs

SMBs must get proficient in using the best AI tools, processes & training to ensure they don’t fall victim to AI-powered criminals. By John Mutuski

2024-04-10

Mitigating The Growing Insider Risk

User Activity Monitoring & Behavioral Analytics: Helping organizations meet the goal of being more informed and more secure. By Mike Crouse

2024-04-10

Make Sure Your Disaster Recovery Plan Works When You Need It Most

Disaster Recovery Testing: Conduct detailed tests to verify your plan’s functionality and readiness for any type of crisis. By Nazy Fouladirad

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CERT.GOV.AZ

CERT.GOV.AZ

Azerbaijan Government Computer Incident Response Team

Rafael

Rafael

Rafael has more than 15 years of proven experience in the cyber arena providing solutions for national security as well as commercial applications.

Trapezoid

Trapezoid

Trapezoid is a cybersecurity company developing Firmware Integrity Management solutions designed to detect unauthorized changes to firmware & BIOS across the entire data center infrastructure.

ClearBlade

ClearBlade

ClearBlade is the Edge Computing software company enabling enterprises to rapidly engineer and run secure, real-time, scalable IoT applications.

DigiByte (DGB)

DigiByte (DGB)

DigiByte (DGB) is a rapidly growing global blockchain with a focus on cybersecurity for digital payments & decentralized applications.

ShorePoint

ShorePoint

ShorePoint is an elite cybersecurity firm dedicated to improving the cyber resilience of Federal agencies and their missions.

CYBRScore

CYBRScore

CYBRScore is a premium, performance-based cyber skills training and assessment provider that quantifies a user’s ability to defend a network.

TPx Communications

TPx Communications

TPx is a leading managed services provider offering a full suite of managed IT, unified communications, network connectivity and security services.

Colt Technology Services

Colt Technology Services

Colt Technology Services (Colt) is a global digital infrastructure company which creates extraordinary connections to help businesses succeed.

Radiant Security

Radiant Security

Radiant Security offers an AI-powered security co-pilot for Security Operations Centers (SOCs). Reinforce your SOC with an AI assistant.

The Hacking Games

The Hacking Games

The Hacking Games' Mission is to inspire, educate and mobilise a generation of ethical hackers to make the world a safer place.

Amplix

Amplix

In the race to create value for your enterprise, Amplix is your best asset for making technology decisions and optimizing your IT infrastructure, cloud usage, and security posture.

Couno

Couno

Couno is a trusted provider of IT support services throughout the UK and Europe.

Neeve

Neeve

Neeve is an edge cloud platform transforming smart buildings and spaces, making them more secure, smarter, and more sustainable.

Soteria LLC

Soteria LLC

Soteria LLC are a client-focused organization providing expert advisory, consulting services, and tailored solutions to prevent, detect, and respond to cybersecurity incidents.

CR Group

CR Group

CR Group is a Swedish-owned, cyber-security company oriented towards the European market. We offer solutions for vital societal functions that are both easy-to-buy and easy-to-use.