TECHNOLOGY > > Resilience


« Back to News

2021-08-30

Urgent Action By Microsoft To Protect Cloud Users

A massive flaw discovered in the main databases stored in the MS Azure cloud platform means that all users need to change their digital access keys.

2021-08-31

US Tech Giants To Spend Billions On National Cyber Security

Apple, Amazon, Google, IBM and Microsoft have promised to invest billions of dollars to strengthen cyber security and train skilled workers.

2021-08-24

Businesses Pay A High Price For Automated Bots

Automated bots operated by criminals are costing businesses an average of 3.6% of their annual revenue and can remain undetected for months.

2021-08-24

Business Leaders Can Make Big Mistakes About Cyber Security

Businesss leaders face a higher level of personal jeopardy for inadequate cyber security and they need to avoid making some dangerous mistakes.

2021-08-16

New Ransomware Variant Discovered

DeepBlueMagic: Heimdal Security experts have warned of a complex new ransomware variant more innovative than other encryption exploits.

2021-08-11

New CSPM Report Highlights The Perceived Security Gap For Cloud Infrastructure

There could be a significant gap between the level of cloud security that you think you have and the level of protection that you actually have.

2021-08-10

Endpoint Security Is More Important Than Ever

The big increase in home working makes endpoint security critically important to protect remote workers and IT professionals. By Eileen Harrison

2021-08-23

Detecting & Mitigating Cyber Attacks

Organisations can improve their security by methodically identifying & addressing known identity-related vulnerabilities, like Active Directory.

2021-08-25

NSA Warning - Avoid Public Wi-Fi

The US National Security Agency has issued guidance to government organisations with remote workers - avoid connecting to public Wi-Fi at all.

2021-08-17

Cyber Liabilities Advisory Advocates Resilience

The US, UK and Australia are urging public & private-sector organisations to make sure their networks are patched against common exploits.

Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Perimeter 81

Perimeter 81

Perimeter 81 is a Zero Trust Network as a Service designed to simplify secure network, cloud and application access for the modern and distributed workforce.

FREE eBook: Practical Guide To Optimizing Your Cloud Deployments

FREE eBook: Practical Guide To Optimizing Your Cloud Deployments

AWS Marketplace eBook: Optimizing your cloud deployments to accelerate cloud activities, reduce costs, and improve customer experience.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Optimum Insurance

Optimum Insurance

Optimum's Cyber Risk & Data Protection Insurance policies are designed to protect against cyber exposures that arise when a company’s data and customer information is breached or stolen.

Sera-Brynn

Sera-Brynn

Sera-Brynn is one of the highest-ranked, pure-play cybersecurity compliance and advisory firms in the world.

Exponential-e

Exponential-e

Exponential-e provide Cloud and Unified Communications services and world-class Managed IT Services including Cybersecurity.

Garner Products

Garner Products

Garner design, manufacture, and sell equipment that delivers complete, permanent, and verifiable data elimination.

Infosec Train

Infosec Train

Infosec Train provide professional training, certifications & professional services related to all spheres of Information Technology and Cyber Security.

Hut Six Security

Hut Six Security

Train, test and track your Information Security culture through information security awareness training and customised phishing simulation campaigns.

Redhorse

Redhorse

Redhorse provides top-tier consulting to help clients address mission-critical government problems in National Security, Networking Technology, Energy and the Environment.

Trilateral Research

Trilateral Research

Trilateral Research provide regulatory and policy advice; develop new data-driven technologies and contribute to the latest standards in safeguarding privacy, ethics and human rights.