TECHNOLOGY > > Resilience


« Back to News

2025-06-20

Cybersecurity Has Become Britain's Top Defence Priority

Cybersecurity Is Not Just A Technical Issue: To stay ahead means investing in smarter, faster, & more autonomous defences. By Dan Jones

2025-06-17

How To Spot Phishing, Vishing & Smishing

Be alert to tactics that exploit personal information to craft convincing fraudulent communications & extract sensitive data. By John Mc Loughlin

2025-06-10

The CVE Program’s Close Call

A Wake-Up Call: The future demands a decentralized, resilient, & context-rich vulnerability intelligence infrastructure. By Jonathan Sar Shalom

2025-06-03

Enterprises Can Learn From Government Cyber Defence

DNS As A Strategic Asset: Used properly, DNS becomes both shield and sensor; blocking threats and helping to detect them. By Craig Sanderson

2025-06-16

Understanding Identity & Access Management

The Front Door Of Cyber Defence: IAM is becoming the essential first line of defence against cyberattacks targeting identities. By Sidra Mobeen

2025-06-03

DORA - The Regulatory Awakening

Identity Threat Detection & Response: Identity security can help financial services deal with the challenges of DORA compliance. By Mo Joueid

2025-06-09

The Email Security Threats Businesses Can’t Ignore

Caution: Simple mistakes like sending an email to the wrong person or attaching the wrong file can lead to serious data breaches. By Rick Goud

2025-06-09

Securing Spend To Address API Attacks

Despite their critical importance, APIs are still failing to be configured correctly or adequately tested during development. By Mohammad Ismail

2025-05-28

Failure Happens, But Recovery Can Be Managed Intelligently

Better resilience & response to disruption requires equal parts critical thinking, culture, and practice, as much as technology. By Eduardo Crespo

2025-05-26

The Future Of Passwords In Retail

Cyber criminals know passwords are a weak-link they can exploit. Retailers must take action to prevent themselves falling victim. By Doriel Abrahams

2025-05-16

Examining The NIS2 Directive From Outside The EU

The EU Network & Information Systems Directive 2: Its strengths, weaknesses, and a possible alternative path for the UK. By Notis Iliopoulos

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

SecureNow Insurance Broker

SecureNow Insurance Broker

SecureNow is a commercial insurance broker based in India. Services offered include Cyber Risk insurance.

Keyfactor

Keyfactor

Keyfactor is a leader in cloud-first PKI as-a-Service and crypto-agility solutions. Our Crypto-Agility Platform seamlessly orchestrates every key and certificate across the enterprise.

Electric Imp

Electric Imp

Electric Imp offers an innovative and powerful Internet of Things platform that securely connects devices with advanced cloud computing resources.

QuintessenceLabs

QuintessenceLabs

QuintessenceLabs offers a suite of Data Security technology, products and solutions to secure digital information in-transit, at-rest or in-use.

VKANSEE

VKANSEE

VKANSEE offer the world's thinnest optical fingerprint sensor for mobile device protection.

SEON Technologies

SEON Technologies

At SEON we strive to help online businesses reduce the costs, time, and challenges faced due to fraud.

Haventec

Haventec

Haventec’s internationally patented technologies reduce cyber risk and enable pervasive trust services with a decentralised approach to authentication.

Greylock Partners

Greylock Partners

Greylock Partners is a leading venture capital firm based in Silicon Valley. We invest in all sectors of enterprise software technology including applications, cloud/SaaS, networking and security.

Secberus

Secberus

SECBERUS creates cloud security technology to help organizations stay secure & compliant in the public cloud.

Kratos Defense & Security Solutions

Kratos Defense & Security Solutions

The Kratos Space, Training, and Cybersecurity division addresses key cybersecurity challenges, including cloud security, continuous monitoring, IT security, and risk management.

Digitpol

Digitpol

Digitpol’s Cyber Crime Investigation experts investigate hacking incidents, ransomware, extortion and conduct security audits and IT upgrades.

Open Data Security (ODS)

Open Data Security (ODS)

Open Data Security is a market leader in the information security sector, offering services to companies, governments and individuals, helping them shield from hackers and cyber attacks.

One Step Secure IT

One Step Secure IT

One Step provide Managed IT Services, Cybersecurity Protections, and Compliance to businesses in the USA nationwide.

DATS Project

DATS Project

DATS Project enables the utilization of high computing power across a number of cybersecurity services, all on a pay-as-you-go basis, eliminating the need for upfront investment costs.

MIND

MIND

MIND is the first-ever data security platform that puts data loss prevention and insider risk management programs on autopilot, so you can automatically identify, detect and prevent data leaks.

Algoritha

Algoritha

Algoritha is a pioneering entity in the realm of security and forensic services.