TECHNOLOGY > > Resilience


« Back to News

2025-05-14

Cyber Attacks Are Threatening The Survival Of Small Business

An Existential Threat: SMBs must take proactive steps to protect themselves, because the cost of inaction may be too great to recover from.

2025-05-14

The CVE Funding Crisis Is A Wake-Up Call For Cyber Resilience

If the CVE ecosystem falters, enterprises must ensure that asset visibility, vulnerability context, & response workflows don’t stop. By Ryan Knisley

2025-05-13

Are Student Laptops A Security Risk?

The Hidden Dangers Of Malware On Campus: Today's threats are as mobile and diverse as the devices students bring to campus.

2025-05-12

Reimagining Cybersecurity In The Age Of Organised Threats

Imagine an operating model where businesses, governments & critical infrastructure providers deal with cyber attacks collectively. By Dan Bridges

2025-05-12

Anti-Ransomware Day 2025

Expert Advice: Anti-Ransomware Day on 12th May is an opportunity to reframe resilience as a priority for every person, department and supplier.

2025-05-02

Five Key Lessons For Building A Resilient Cyber Security Department

Building A Team: In times of crisis, UK businesses should prioritise the onboarding & training of cybersecurity professionals. By Kevin Vashi

2025-05-01

Legal Steps To Take When Facing A Cybersecurity Breach In Your Business

Quickly understanding the legal steps to take after a breach can help business owners minimize their liability and protect their customers.

2025-05-02

Cybersecurity In Smart Buildings

The Overlooked Risk In Digital Facility Management: By taking proactive steps today, building owners can avoid costly consequences tomorrow.

2025-05-01

Mastering Security In An Era Of Regulatory Shifts

Organisations need to change how they view email security and compliance, which is too often seen as a burden. By Nadine Hoogerwerf

2025-04-29

Five Top-Rated Threat Intelligence Platforms

Cyber Threat Intelligence: High quality analytics are priceless in curating thoughtful risk management and business continuity plans.

2025-04-29

British Government Needs To Lean On Automation To Bolster Cyber Resilience

Autonomous Endpoint Management: A precise overview of government IT assets & vulnerabilities, immediately improving cybersecurity. By Dan Jones

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Assure Technical

Assure Technical

Assure Technical offers a holistic approach to Technical Security. Our expertise and services span across the Physical, Cyber and Counter Surveillance domains.

Imperva

Imperva

Imperva is a leading provider of data and application security solutions including DDoS protection, Web application security, Data security and Cloud security.

SharkGate

SharkGate

SharGate provide a cloud-based website security solution to protect websites from being hacked.

SCADAfence

SCADAfence

SCADAfence offers cutting edge cybersecurity solutions designed to ensure the operational continuity of industrial (ICS/SCADA) networks.

Magix Security

Magix Security

Magix Security assesses the cyber threat, gives you visibility of how vulnerable your business is to attack, and provides cybercrime detection and prevention services.

Safetica

Safetica

Safetica Technologies is a Czech software company that delivers data protection solutions for businesses of all types and sizes.

SecureNation

SecureNation

SecureNation offers a wide variety of cutting-edge technologies and IT services to address almost any of your information security, network security and information assurance needs.

HMS Networks

HMS Networks

HMS stands for Hardware meets Software. Our technology enables industrial hardware to communicate and share information with software and systems.

Internet Security Research Group (ISRG)

Internet Security Research Group (ISRG)

ISRG's mission is to reduce financial, technological, and educational barriers to secure communication over the Internet.

Mosaic Insurance

Mosaic Insurance

Mosaic is a next-generation global specialty insurer distinguished by an exceptional team, agile technology, and a structure that combines Lloyd’s of London strength with a global distribution network

Private Client Cyber Security (PCCS)

Private Client Cyber Security (PCCS)

PCCS provides enterprise-grade cybersecurity consulting and services to professional practices, executives, athletes, and high net worth families.

Inspectiv

Inspectiv

Inspectiv offers a turn-key solution to continuously identify security vulnerabilities and provide security assurance.

VicOne

VicOne

With a vision to secure the vehicles of tomorrow, VicOne delivers a broad portfolio of cybersecurity software and services for the automotive industry.

Logiq Consulting

Logiq Consulting

Logiq Consulting provide a full range of Cyber Security, Information Assurance and System Engineering services.

Mitra Informatics Integration (MII)

Mitra Informatics Integration (MII)

Mitra Informatics Integration is the information communication technology solution business of the Metrodata Group.

Cyber Castellum

Cyber Castellum

Cyber Castellum is a cybersecurity consulting firm that specializes in the identification of security vulnerabilities in an organization’s technology landscape.