TECHNOLOGY > > Resilience


« Back to News

2022-08-29

Detect Spoofing Before Your Organisation Suffers Fraud

Business Email Compromise fraud is where cyber criminals impersonate senior managers and end users should be very cautious before paying invoices.

2022-08-26

Bluetooth Standards Are Reshaping Medical Devices

The Internet of Medical Threats: Bluetooth vulnerabilities in a new generation of medical devices can jeopardise patient safety. By Scott Register

2022-08-25

Think Carefully Before You Pay For Cloud Downtime Insurance

Considering Buying Cloud Downtime Insurance? Before you buy, take these three vital steps to ensure business continuity. By Florian Malecki

2022-08-22

Re-strategising Resilience In The Remote Working Age

It’s time to stop adding tools and complexity and start building security operations where cyber security experts are truly empowered. By Rob Smith

2022-08-22

Protecting Medical Devices From Cyber Attacks

Medical Device Cyber Security: Medical devices need robust cyber security which is critical in retaining patient trust in health care technology. 

2022-08-16

Data Protection Must Be a Part of Every Cyber Security Strategy

CISOs Need A 360-degree View: Your data is your most important asset. If it's compromised by ransomware, you're dead in the water. By Florian Malecki

2022-08-15

The Top 3 Current Email Threats

Email is a vulnerable part of most organisations' infrastructure and can be used for delivering phishing scams, business compromise & ransomware.

2022-08-10

Building a Threat-Ready Ransomware Response Plan

Prepare, Detect, Recover: Ransomware attacks proliferate as more organisations rely on digital infrastructure to run their networks. By Kev Eley

2022-08-08

AI Driven Anomaly Detection In The Oil & Gas Industry

Drone In A Box: A drone using data anomaly detection software alongside sophisticated imaging will improve detection of leaks in the network.

2022-08-05

Cybersecurity Essentials For Cloud Environments

Cloud security works in two parts - the security of the cloud and the security in the cloud. It's that part users should focus on. By Hugh Raynor

2022-08-04

Github Supply Chain Attack

Somebody cloned over 35,000 Github repositories and kept them identical to the original source code, with the addition of malicious code.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ReadWrite

ReadWrite

ReadWrite is a leading media platform dedicated to IoT and the Connected World.

National Institute of Standards & Technology (NIST)

National Institute of Standards & Technology (NIST)

NIST is a measurement standards laboratory, and a non-regulatory agency of the United States Department of Commerce. Areas covered include IT and cybersecurity.

Netskope

Netskope

Netskope, a global cybersecurity leader, is redefining cloud, data, and network security to help organizations apply Zero Trust principles to protect data.

Cyber Security Malta

Cyber Security Malta

Cyber Security Malta is part of Malta's National Cyber Security Strategy which aims to combat cybercrime, strengthen national cyber defence and provide cyber security awareness and education.

Tempest

Tempest

TEMPEST is a leading provider of IT products and services including solutions for network and application security.

Assystem

Assystem

Assystem delivers a comprehensive security approach for the industrial and service sectors that integrates physical security systems, industrial cyber-security, functional safety and dependability.

WiJungle

WiJungle

WiJungle is an Indian Cyber Security Company that develops and markets a unified network security gateway solution.

CyberSat Summit

CyberSat Summit

CyberSat is dedicated to fostering the necessary discussions to flesh out and develop solutions to cyber threats in the satellite industry.

BlackRidge Technology

BlackRidge Technology

BlackRidge Technology develops, markets and supports a family of products that provide a next generation cyber security solution for protecting enterprise networks and cloud services.

eMazzanti Technologies

eMazzanti Technologies

eMazzanti Technologies provides IT consulting services for businesses ranging from home offices to multinational corporations throughout the USA and internationally.

Stone Forest IT (SFIT)

Stone Forest IT (SFIT)

Stone Forest IT specialises in providing advisory, implementation and managed services for IT infrastructure, IT security solutions, business applications (ERP and CRM) and business analytical tools.

guardDog.ai

guardDog.ai

guardDog.ai has developed a cloud-based software service with a companion device that work together to simplify network security.

Blacksands

Blacksands

Blacksands is a leader in network architecture, identity & services management, threat analysis, industrial IoT architecture, and invisible dynamic networks.

Cyber and Fraud Centre – Scotland

Cyber and Fraud Centre – Scotland

The Cyber and Fraud Centre – Scotland exists to ensure Scottish organisations are as resilient as they can be against cyber and fraud crime.

ThreatDown

ThreatDown

ThreatDown, powered by Malwarebytes, is on a mission to overpower threats and empower IT by removing the complexity of detecting and stopping today’s most advanced threats.

Beacon Technology

Beacon Technology

Beacon Technology offers a comprehensive platform consisting of XDR, VMDR, and Breach and Attack simulation tools.