TECHNOLOGY > > Resilience


« Back to News

2022-09-17

A New Supply Chain Security Solution

Organisations of any size are enabled to collaborate on and share data in near real-time, confident in the trustworthiness of that data.

2022-09-19

CISA's Threat Intelligence Program Was Defective

Contextual Information: CISA's threat intelligence advice for US federal agencies is criticised for lacking sufficient actionable detail.

2022-09-16

Containers Are Temporary, But Container Data Is Not

Keep A Lid on It: Containerisation has benefits for application development. It also holds challenges for data backup & recovery. By Florian Malecki

2022-09-15

Three Simple Steps To Effective Cybersecurity

Left, Right & Up: Three key steps that all organisations should follow if they are to ensure effective cybersecurity protection. By Allen Downs

2022-09-15

Using SAST To Prevent Zero Day Vulnerabilities

Static Application Security Testing: SAST solutions are widely agreed to be an important part of a secure software development lifecycle.

2022-09-15

Five Cloud Security Mistakes Your Business Should Avoid

Cloud security is crucial to your company’s data safety. Familiarize yourself with these cloud security mistakes that your business should avoid.

2022-09-14

Securing Hybrid Identity

Active Directory: Hybrid environments are prone to errors & misconfigurations that leave the door wide open to cyber attacks. By Guido Grillenmeier 

2022-09-12

The Top 4 Cyber Threats - Is Your Business Protected?

Is it possible for businesses to really be protected? Absolutely – if organisations give cyber security the attention it deserves. By Keiron Holyome

2022-09-08

Locking Down Cyber Security

Managing The Basics: Educating employees and partnering with the right cyber security technology providers will empower them to lock criminals out.

2022-09-07

VPN Configuration: Understanding DNS Leaks & How to Prevent Them

VPNs are a great way to keep your browsing activity private, but you need to ensure you choose one that offers privacy protection. By Idrees Shafiq

2022-09-07

How To Prepare For A Cyber Crisis

Crisis preparedness is about minimising the consequences of an attack as quickly as possible & maintaining business continuity. By Jo De Vliegher

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Professional Information Security Association (PISA)

Professional Information Security Association (PISA)

PISA is an independent and not-for-profit organization for information security professionals, with the primary objective of promoting information security awareness and best practice.

CERT-PA

CERT-PA

CERT-PA is the national Computer Emergency Response Team for Italian government institutions.

Centre for Development of Advanced Computing (C-DAC)

Centre for Development of Advanced Computing (C-DAC)

C-DAC is the premier R&D organization of the indian Ministry of Electronics & Information Technology. Areas of research include cyber security.

Network Integrity Systems

Network Integrity Systems

Network Integrity Systems is a leader in network infrastructure security and offers solutions specifically developed for Government and Private Enterprise.

Vector InfoTech

Vector InfoTech

Vector InfoTech is a leader in Industrial Security, Networks, IT and Telecommunications.

Idaho National Laboratory (INL)

Idaho National Laboratory (INL)

INL is an applied engineering laboratory dedicated to supporting the US Dept of Energy's missions in energy research, nuclear science and national defense including critical infrastructure protection.

itbox.online

itbox.online

Itbox.online offers IT solutions to ensure that your company's technologies are always available and secure as your business demands.

Recovery Point Systems

Recovery Point Systems

Recovery Point is a leading national provider of IT secure and compliant infrastructure and business resilience services.

Centre for Multidisciplinary Research, Innovation & Collaboration (C-MRiC)

Centre for Multidisciplinary Research, Innovation & Collaboration (C-MRiC)

C-MRiC collaborates on initiatives, ranging from national cyber security, enterprise security, information assurance, protection strategy, climate control to health and life sciences.

Bellvista Capital

Bellvista Capital

Bellvista Capital connects entrepreneurs with capital and unmatched business expertise in the technology areas of Cloud Computing, Cyber Security and Data Analytics.

Cyber Range Malaysia

Cyber Range Malaysia

With Cyber Range Malaysia organizations can train their security professionals in empirically valid cyber war-gaming scenarios necessary to develop IT staff skills and instincts for defensive action.

Data Storage Corp (DSC)

Data Storage Corp (DSC)

Data Storage Corporation is a provider of data recovery and business continuity services that help organizations protect their data, minimize downtime and recover and restore data.

PacketViper

PacketViper

PacketViper’s Deception360 actively defends networks with deception-based threat detection and automated response to both external and internal cyber threats.

CYTUR

CYTUR

CYTUR provide trusted and secured maritime cybersecurity solutions to keep ships safe, protecting them, their crews, cargo and all stakeholders from maritime cyber threats.

Brunswick Group

Brunswick Group

Brunswick is a critical issues firm. We advise the world’s leading companies on how to navigate the critical issues they face and engage with their critical stakeholders.

RIoT Secure

RIoT Secure

RIoT Secure AB is a technology enabler within the IoT industry - created with a vision to ensure security technology exists in the foundations of software development for IoT solutions.