TECHNOLOGY > > Resilience


« Back to News

2024-03-22

HackerOne Leads AI-Driven Innovation

HackerOne has announced innovations that integrate the company’s hacker powered intelligence with the transformative power of AI.

2024-03-19

Cyber Security Governance Is A Leadership Responsibility

The Role of The Board: As cyber threats evolve, business leaders must remain vigilant in cyber security governance says Britain's NCSC.

2024-02-28

Harnessing Predictive Analytics In Cybersecurity

Proactive Cybersecurity: Harnessing the power of predictive analytics in cybersecurity is not an opportunity. It's an imperative. By Alexander Norell

2024-03-13

Threat Intelligence Exposes The Extent of Cyber Attacks

Businesses Must Continually Adapt their Security Strategies: Expert threat intelligence from MSPs can help detect & remediate attacks quickly.

2024-03-01

Surge in “Hunter-Killer” Malware

Discovered: A threefold increase in the types of destructive malware designed to actively target defensive systems & capable of disabling them.

2024-02-22

A Goal Without A Plan Is Just A Wish

Incident Response: If your goal is a robust information security programme then you must have an Incident Response plan. By Chris Denbigh-White

2024-02-21

Managed Security Services In The Age of Advanced Threat Intelligence 

The goal of threat intelligence is to ensure organisations have the right tools to make better, faster & decisions based on timely, actionable data.

2024-02-19

Businesses Must Prioritise Safeguards Against Common Threats

Failure to implement a comprehensive cyber resilience program leaves businesses exposed to cybercrime & financial loss. By John McLoughlin

2024-02-19

Ten Ways To Elevate Public Sector Cyber Security

Time to Act: The growing volume & sophistication of cyber incidents suggests the public sector faces tremendous challenges.By Deryck Mitchelson

2024-02-16

Cybersecurity In Managed Cloud: Best Practices For Keeping Your Data Safe

Robust cybersecurity involves choosing a secure provider, implementing strong access controls, and regularly monitoring & updating systems.

2024-03-04

Prioritising Data Privacy & Security

The Most Valuable Assets: Every piece of information holds value and must be shielded from prying eyes and malicious intent. By Jacques du Preez

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

HSI Cyber Crimes Center

HSI Cyber Crimes Center

HSI's Cyber Crimes Center delivers computer-based technical services to support domestic and international investigations into cross-border crime.

ThreatSTOP

ThreatSTOP

ThreatSTOP is a cloud-based automated threat intelligence platform that converts the latest threat data into enforcement policies to stop attacks before they become breaches.

RIPS Technologies

RIPS Technologies

RIPS Technologies delivers automated security analysis for PHP applications as platform independent software or highly scalable cloud service.

Global Security Network (GSN)

Global Security Network (GSN)

GSN focuses on specialized IT Security solutions & services for the military, law enforcement, critical infrastructure and oil & gas sectors in the Middle East.

LightEdge Solutions

LightEdge Solutions

LightEdge’s highly-trained compliance and security experts take the guesswork out of keeping your business protected.

Rublon

Rublon

Rublon protects endpoints, networks and applications by providing trusted access via two-factor authentication (2FA).

Tecnalia Research & Innovation

Tecnalia Research & Innovation

Tecnalia is the largest center of applied research and technological development in Spain, a benchmark in Europe and a member of the Basque Research and Technology Alliance.

archTIS

archTIS

archTIS specialises in the design and development of products, solutions and services for secure information sharing and collaboration.

Systems Assessment Bureau (SAB)

Systems Assessment Bureau (SAB)

Systems Assessment Bureau is an internationally recognized ISO Certification Body with a unique vision of “Excel together with global standards”.

Picnic

Picnic

Picnic is a gritty, pioneering team of intelligence and cybersecurity specialists focused on solving the security challenge of our time - social engineering.

TheHive Project

TheHive Project

TheHive Project is a Scalable, Open Source and Free Security Incident Response Platform for SOC, CSIRT and CERT teams.

Digimune

Digimune

Digimune is an all-encompassing cloud-based cyber risk protection platform that guards you against the dangers of our digital world.

AWARE7

AWARE7

IT security for human and machine. With the help of our products and services, we work with you to increase the IT security level of your organization.

Association of Azerbaijani Cyber Security Organizations (AKTA)

Association of Azerbaijani Cyber Security Organizations (AKTA)

The Association of Azerbaijani Cyber Security Organizations (AKTA) is a non-commercial organization aimed at strengthening the country's cybersecurity system.

Security Discovery

Security Discovery

Stay ahead of cyber threats with Security Discovery. We offer expert consulting, comprehensive services, and a powerful vulnerability monitoring SaaS platform.

Cybercentry

Cybercentry

Cybercentry is a specialist information security, data protection and cyber security consultancy.