TECHNOLOGY > > Resilience


« Back to News

2023-10-30

The Security Measures Professionals Use To Prevent Being Attacked

Expert Advice: Understanding the consequences of an online action will lead users to understand their risks and take the right precautions. 

2023-10-26

How Businesses Can Avoid Firewall Vulnerabilities

Managed Firewall Services: Without help, thinly spread cybersecurity teams risk failing to protect valuable company data. By Erik Nordquist

2023-10-25

How Cybercriminals Could Be Infiltrating Your Supply Chain

Island Hopping: Infiltrating a single, weaker target to exploit existing credentials and gain access into larger enterprises. By Stuart Hodkinson

2023-10-23

ZTNA Is The Foundation Of Great VDI Deployments

Virtual DeskTop Infrastructure: Ensuring security in hosted desktop architectures can be a challenge. Zero Trust is the solution. By Karen Gondoly

2023-10-20

Four Key Cybersecurity Trends For Industrial Companies

Unlocking Cybersecurity: Manufacturing, energy, transport & utility firms offer hackers many entry points to find vulnerabilities. By Edgardo Moreno

2023-10-16

Understanding The Threat Of QR Codes & Quishing

Don't Take The Bait: What is quishing? What are the risks to your organisation and what can you do to mitigate them? By Steve Jeffery

2023-10-13

Domain Phishing: Antidotes In Today’s Market

Phishing Threats: Doubling down on security measures is the key to protecting not only your web address but your business brand. By Brian Lonergan

2023-10-04

The Impact Of Artificial Intelligence On Cybersecurity

Balancing Promise With Reality: The belief that Artificial Intelligence alone can guarantee cybersecurity is overhyped.. By Helen Kruger

2023-10-03

Key Security Risks For Small Businesses

Lack Of Resources, Awareness & Expertise: Small businesses are as much at risk of cyberattacks as larger enterprises. By Jason Manar

2023-10-03

Security Gaps In Business-Critical Identity Services 

Active Directory Exploits: Cybercriminals aim to expand an attack from one compromised user account to the entire IT infrastructure. By Mickey Bresma

2023-10-02

The Rapid Rise In DNS Attacks Demands New Approaches To Cyber Defense

Rethinking Data Resilience: Every Domain Name System has weaknesses & there are several ways that attackers can exploit them. By Mark Johnson

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Covenco

Covenco

Covenco is a data management and IT infrastructure specialist. Working with customers to transform their IT environments, with data protection and security at the forefront of everything we do.

Mitol PerfectBackup

Mitol PerfectBackup

Mitol PerfectBackup provide Enterprise Online Backup, Disaster Recovery and Cloud Computing Services.

Xcitium

Xcitium

Xcitium (formerly Comodo) is and industry leading provider of state-of-the-art endpoint protection solutions. Our Zero threat platform isolates and removes all ransomware & malware infectictions.

Willis Towers Watson

Willis Towers Watson

Willis Towers Watson is a global risk management, insurance brokerage and advisory company. Services offered include Cyber Risks insurance.

Cobwebs Technologies

Cobwebs Technologies

Cobwebs Technologies provide web intelligence solutions for Law Enforcement (including cybercrime), Intelligence Agencies and Federal Agencies.

MonsterCloud

MonsterCloud

MonsterCloud is a leader in managed cyber security services. Our cyber security team constantly monitors and protects businesses from cyber threats.

Codified Security

Codified Security

Codified is a testing platform for mobile application software. We make it easier than ever for companies to detect and fix security vulnerabilities and ensure their applications are compliant.

FinlayJames

FinlayJames

FinlayJames supports cyber security companies to meet the increasing demand and pressure on them by finding top talent within the industry for their sales, marketing and technical teams.

Tempest

Tempest

TEMPEST is a leading provider of IT products and services including solutions for network and application security.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Onclave Networks

Onclave Networks

Onclave Networks is a global cybersecurity leader, transforming the future of securing all IT/OT devices and systems.

Cheops Technology

Cheops Technology

Cheops is a specialist in IT Business Technology Services. We help SMEs and large companies build, optimize and manage their IT so they can focus on their core business.

eCentre@LindenPointe

eCentre@LindenPointe

The eCenter@LindenPointe provides assistance to the development, management and promotion of STEM (Science, Technology, Engineering, Mathematics) related business ventures.

Protecto

Protecto

Make privacy and governance effortless. Brakes allow you to drive faster. Stronger data privacy and security enable companies to unlock the full potential of the data.

Silk Security

Silk Security

Silk is the first platform that enables enterprises to take a strategic, sustainable approach to resolving code, infrastructure and application risk.

SOCRadar

SOCRadar

SOCRadar is an Extended Threat Intelligence (XTI) SaaS platform that combines External Attack Surface Management (EASM), Digital Risk Protection Services (DRPS), and Cyber Threat Intelligence (CTI).