TECHNOLOGY > > Resilience


« Back to News

2022-10-18

Security Patching As A Service

Aunalytics launches its Security Patching Platform, Co-managed Patching As A Service to complement their Advanced Security solution suite.

2022-09-29

How To Outsmart Increasingly Complex Cyber Attacks

Outsourcing elements of security can help organisations reach better security outcomes previously exclusive to large enterprises. By Leyton Jefferies

2022-10-03

Cyber Crime Weaponised: What Business Can Learn From Ukraine

A New Era Of Cyber Warfare: The cyber aspects of the conflict in Ukraine will continue to resonate long after the guns have been silenced.

2022-09-28

Pivoting Customers' Mindsets For Cloud Security

When businesses increase cloud capability and cloud velocity, they often create new risk areas outside their familiarity. By JD Sherry

2022-10-05

Modernising SecOps: It’s Time To Unpick The Complex Matrix

Automation Meets The Human Factor: The rapid evolution of technology produces many more signals for cyber analysts to evaluate. By John Davis

2022-09-30

Why Companies Need A Next-Gen Approach To Business Continuity

IT teams must reevaluate their approach to business continuity to withstand the threats coming at them fast and furious. By Florian Malecki

2022-09-22

Even Air-Gapped Computers Are Vulnerable To Attack

LaserShark: Computer systems that are physically isolated from the outside world (air-gapped) can still be attacked via optical channels.

2022-09-21

Why Domain Protection Is A Key Pillar Of Cybersecurity

Protecting Domain Names Is Vitally Important: Homograph 'look alike' attacks are one of the major challenges in cyber security. By Brian Lonergan

2022-09-17

A New Supply Chain Security Solution

Organisations of any size are enabled to collaborate on and share data in near real-time, confident in the trustworthiness of that data.

2022-09-19

CISA's Threat Intelligence Program Was Defective

Contextual Information: CISA's threat intelligence advice for US federal agencies is criticised for lacking sufficient actionable detail.

2022-09-16

Containers Are Temporary, But Container Data Is Not

Keep A Lid on It: Containerisation has benefits for application development. It also holds challenges for data backup & recovery. By Florian Malecki

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Telecom Information Sharing and Analysis Center Japan (T-ISAC Japan)

Telecom Information Sharing and Analysis Center Japan (T-ISAC Japan)

T-ISAC Japan coordinates information sharing and activities related to ISP/telecommunications network security in Japan.

Yokogawa Electric

Yokogawa Electric

Yokogawa is an electrical engineering company providing measurement, control, and information technologies including industrial cyber security.

OnSystem Logic

OnSystem Logic

OnSystem Logic has developed a unique, patent-pending solution to solve the problem of the exploitation of flaws in application software as a technique for cyber attacks.

Telesoft Technologies

Telesoft Technologies

Telesoft Technologies is a global provider of cyber security, telecom and government infrastructure products and services.

TCPWave

TCPWave

TCPWave IPAM is the world’s first acclaimed DNS/DHCP management software to pass the most stringent Information security tests.

RATEL (SRB-CERT)

RATEL (SRB-CERT)

RATEL has been appointed as the National Center for the Prevention of Security Risks in ICT systems of the Republic of Serbia (SRB-CERT).

Culinda

Culinda

Culinda secures medical IoT devices in hospitals with An Artificial Intelligence platform and security gateway.

Arm

Arm

Arm delivers a complete IoT solution, from providing the IP for the chip to delivering the cloud services to securely manage the deployment of products throughout their lifecycle.

4Stop

4Stop

4Stop is a global KYC, compliance and anti-fraud risk management company.

ShorePoint

ShorePoint

ShorePoint helps customers focus on visibility, analytics and context to make timely and informed risk-based decisions to protect their infrastructure.

Onfido

Onfido

Onfido is building the new identity standard for the internet. We digitally prove people’s real identities using a photo ID and facial biometrics.

CleanCloud by SEK

CleanCloud by SEK

CleanCloud by SEK is a CSPM product focused on public cloud data protection and security regulations, with over 400 compliance checks for the market's leading frameworks and regulations.

Enzoic

Enzoic

Enzoic is an enterprise-focused cybersecurity company committed to preventing account takeover and fraud through compromised credential detection.

SecureClaw

SecureClaw

SecureClaw offers specialized cybersecurity consultation, various products, and a range of services to meet your company's business domain needs.

SolidityScan

SolidityScan

SolidityScan is an advanced smart contract scanning tool designed to uncover vulnerabilities and proactively address risks within your code.

Togggle

Togggle

Togggle offers seamless identity verification solutions and distributed infrastructure, enabling organizations to combat fraud and ensure compliance with data protection regulations.