TECHNOLOGY > > Resilience


« Back to News

2024-01-03

Bridging The Cybersecurity Skills Gap With Efficiency

How Cloud SIEM Platforms Can Maximize SOC Scalability: Innovative cloud-based solutions can help navigate the skills shortage. By Kev Eley

2023-12-14

Five Tips for Securing Your CI/CD Pipeline

Continuous Integration & Continuous Deployment: As software applications grow more complex, their security has become more challenging.

2023-12-14

Overcoming The Cybersecurity Challenge

Enterprises Face A Range Of New Challenges: Finding the right balance between risk management, cost and performance. By Samir Desai

2023-12-12

The UK Nuclear Industry Needs To Take Cybersecurity More Seriously

The cybersecurity standard for nuclear sites is applied unevenly and decades-old concerns are not being adequately addressed. By Dr. Marion Messmer

2023-12-06

Cyber Criminals Go Phishing

Phishing Trends Examined: Understanding the different types of phishing threats your organisation will encounter is crucial for network defence.

2023-12-05

The OSI Model's Role In Building A Secure Network Architecture

Open Systems Interconnection: An intuitive way of examining network operations, which makes it easier to resolve issues affecting network protocols.

2023-11-27

Securing National Communications Infrastructure

Digital Connections: Network disaggregation is vital to protecting critical telecoms infrastructure against external threats. By Richard Brandon

2023-11-24

Intelligent Automation & AI Can Improve Business Resilience

Combined with human intelligence, AI can improve business resilience and a failure to invest risks business efficiency & reputation. By Scott Dodds

2023-11-23

What Is Cyber Hygiene & Why Is It Important?

Too many organisations are failing to practice good cyber hygiene. Companies must adapt & take steps to mitigate risk. By Rigo Van den Broeck

2023-11-21

Serious Threats To Britain's Critical Infrastructure

The NCSC warns of the significant threat posed by hostile states and their affiliates to essential services that the country relies on every day.

2023-11-20

Best Practices For Securing Enterprise IoT Devices

Most users leave their credentials on IoT devices, which exposes them to attackers. These are the best practices for securing their cybersecurity.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Huawei

Huawei

Huawei is a leading global ICT solutions provider. with end-to-end capabilities across the carrier networks, enterprise, consumer, and cloud computing fields.

Illumio

Illumio

Illumio delivers adaptive security for every computing environment, protecting the 80% of data center and cloud traffic missed by the perimeter.

Cybersecurity Advisors Network (CyAN)

Cybersecurity Advisors Network (CyAN)

CyAN provides a not-for-profit platform that helps private and public organisations as well as governments to identify trusted advisors in the area of Cyber Security and Cyber Crime.

Centro de Gestion de Incidentes Informaticos (CGII) - Bolivia

Centro de Gestion de Incidentes Informaticos (CGII) - Bolivia

CGII is the Computer Incident Management Center of the State of Bolivia.

National Cybersecurity Competence Centre (NC3) - Czech Republic

National Cybersecurity Competence Centre (NC3) - Czech Republic

NC3 has been established in response to growing demands for practically applicable products and solutions for ensuring cybersecurity of critical and non-critical information infrastructures.

Sequretek

Sequretek

Sequretek was formed with the aim to “Simplify Security”. We envision a future where enterprise networks are streamlined, secure and simple.

Portshift

Portshift

Portshift leverages the power of Kubernetes and Service-Mesh to deliver a single source of truth for containers and cloud-native applications security.

Uptycs

Uptycs

Uptycs combines the open source universal agent, osquery, with a scalable security analytics platform for fleet visibility, intrusion detection, vulnerability monitoring and compliance.

VirtualArmour

VirtualArmour

VirtualArmour is a managed security services provider with global reach and local attitude.

ADVA Optical Networking

ADVA Optical Networking

ADVA is a company founded on innovation and focused on helping our customers succeed. Our technology forms the building blocks of a shared digital future and empowers networks across the globe.

HackersEra

HackersEra

HackersEra is a leading offensive cybersecurity service provider. We enable our clients to operate in a more secure environment efficiently and produce more value.

Comcast Technology Solutions (CTS)

Comcast Technology Solutions (CTS)

Comcast Technology Solutions delivers proven technologies for global video, media, communications, data applications, and cybersecurity & compliance.

eMudhra

eMudhra

eMudhra is a leader in Identity and Transaction Management Solutions.

Seven AI

Seven AI

Seven AI develops cyber security software designed to identify online threats.

ShieldHaus

ShieldHaus

Protect your business from evolving cyber threats with ShieldHaus. Our real-time, AI-powered security solutions block malicious IPs, phishing attempts, and harmful domains to safeguard your systems an

DigiGlass

DigiGlass

DigiGlass is a cutting-edge cybersecurity service provider powered by Redington Gulf, a leading technology distributor in the Middle East and Africa.