TECHNOLOGY > > Resilience


« Back to News

2024-07-03

Treading A Safe Path - Navigating Hidden Ransomware Risks

Urgent Decisions - To Pay Or Not To Pay?: It’s not just a financial transaction, but a complex legal & ethical minefield. By Rob Smith

2024-07-11

Rising AI Security Threats To Small Businesses

Be Prepared: What are the top AI-driven cybersecurity threats that small businesses must be aware of and be prepared to combat in 2024?

2024-07-01

Safeguarding Enterprises & Individuals In The IoT Era

The Internet of Things introduces significant privacy & security risks that must be addressed to safeguard enterprises. By John Linford

2024-07-01

Cybersecurity Is A Serious Concern For The Mid-Market

Many mid-market businesses that handle their own security suffer from alarming gaps in basic protections & a lack of expertise. By Pravesh Kara

2024-06-28

The Crucial Role Of AI Red Teaming In Safeguarding Systems & Data

Red teaming exercises are one of the best ways to identify security & safety concerns in emerging technologies like generative AI. By Dane Sherrets

2024-06-25

How To Effectively Detect & Prevent SAP Threats

Porous Entry Points: SAP systems contain IT-enabled or overlooked vulnerabilities which leave them open to exploitation. By Christoph Nagy

2024-06-24

Five Reasons Your Organization Needs API Security Testing

API security testing is a key component in safeguarding digital assets, ensuring the integrity & confidentiality of data transmitted across systems.

2024-06-19

Combatting Zero-Day Exploits In Financial Services

Best Practices For Finance Institutions: Zero-day attacks disrupt critical systems, causing downtime & big operational challenges. By Dominik Birgelen

2024-06-18

Top Ten IoT Security Challenges & Solutions

The interconnected nature of IoT devices amplifies the importance of maintaining strong security practices across all levels of the network.

2024-06-11

Is Encryption Falling Out Of Favour?

An alarming number of organisations have gone backwards in protecting vital information, heightening the risk of data exposure. By Jon Fielding

2024-06-11

Business Email Compromise Warning Signs

Don't Fall For The Trap: Understanding common social engineering tactics and the threat groups behind them. By John McLoughlin

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Exploit Database (EDB)

Exploit Database (EDB)

The Exploit Database is a CVE compliant archive of public exploits and corresponding vulnerable software, developed for use by penetration testers and vulnerability researchers.

Titus

Titus

Titus is a global leader in enterprise-grade data protection solutions.

Truth Technologies Inc (TTI)

Truth Technologies Inc (TTI)

TTI is a premier provider of worldwide anti-money laundering, anti-fraud, customer identification, and compliance products and services.

ISF Annual World Congress

ISF Annual World Congress

ISF Annual World Congress, our flagship global event, offers attendees an opportunity to discuss and find solutions to current security challenges.

Security Network Munich

Security Network Munich

Security Network Munich brings together leading players in the field of information and cyber security through joint research and innovation projects.

Purple Security

Purple Security

Purple Security arises from the association of specialists in offensive security (ethical hackers, white hats) and experts in insurance, compliance and implementation of industry standards.

Luxembourg Office of Accreditation & Surveillance (OLAS)

Luxembourg Office of Accreditation & Surveillance (OLAS)

OLAS is the national accreditation body for Luxembourg. The directory of members provides details of organisations offering certification services for ISO 27001.

IT Security Jobs

IT Security Jobs

IT Security Jobs is a dedicated portal for everything related to IT professionals looking for IT Security jobs.

Hacken

Hacken

Hacken provide a range of cybersecurity services including security assessments, blockchain security audits, and secure software development.

BTblock

BTblock

Blockchain and cybersecurity is a vital combination for Enterprise success. BTblock is a Force Multiplier for its clients.

Quantum Armor

Quantum Armor

Quantum Armor is a next-gen cyber security monitoring platform that allows you to continuously stay aware of your security posture, and proactively spot trends, vulnerabilities and potential attacks.

Cyral

Cyral

Easily observe, control, and protect your data endpoints in a cloud and DevOps-first world. Discover Data Mesh Security with Cyral.

Secuna Software Technologies

Secuna Software Technologies

Secuna is the most trusted Cybersecurity Testing Platform in the Philippines. Our pool of vetted security researchers will find and ethically report security vulnerabilities in your product.

Akamai Technologies

Akamai Technologies

Akamai's leading security, compute, and delivery solutions are helping global companies make life better for billions of people, billions of times a day.

Sayers

Sayers

Sayers is best known for its ability to solve business challenges with IT solutions. Our areas of expertise include cloud, storage, virtualization, security, mobility and networking.

USX Cyber

USX Cyber

USX Cyber was founded on the idea that small and medium businesses deserve and require the same level and sophistication of cyber protection as large enterprises.