TECHNOLOGY > > Resilience


« Back to News

2023-08-01

Have We Become Complacent About The ‘Insider Threat’?

Time Bomb: Human beings will always make mistakes, let their guard down, and behave in ways that leave company data exposed. By Jon Fielding

2023-07-27

Protecting Your Home Devices Against Attack

Not maintaining the appropriate security measures for your smart devices, their apps & your Wi-Fi network could cause you a lot of trouble.

2023-07-26

Setting Up An Operational Resilience Framework

In the face of a destructive cyberattack enterprises must plan to mitigate the impact based on pre-established objectives. By Bill Nelson

2023-07-25

Managing The Effects Of AI-Driven Cyber Attacks

Criminals are scaling how they compromise systems & execute attacks. Organisations need agile, comprehensive, unified security solutions.

2023-08-02

TrueBot: Cyber Security Agencies Issue A Warning

A new variant of TrueBot malware is focusing on companies in the US and Canada, aimed at stealing private data from infiltrated systems.

2023-07-11

Zero Trust: A Paradigm Shift in Cybersecurity

Traditional perimeter-based security measures are no longer sufficient in safeguarding sensitive data and critical assets. By Helen Kruger

2023-07-03

The Seven Stages Of Cyber Resilience:

The Emotional Roller Coaster Of Data Protection: For small & medium businesses, data resilience is a critical necessity. By Richard Massey

2023-06-28

Phishing – It’s Not About Malware (Or Even Email)

Phishing Is No Longer About Infecting Your Computer: Experts at SANS have analysed the latest trends and key indicators. By Lance Spitzner

2023-06-26

How Does Your Board Measure Cyber Resilience?

Adopting A Prevention-First Approach: Going beyond traditional cybersecurity measures means prioritising resilience. By Deryck Mitchelson

2023-06-26

Why Are Businesses Ignoring Incident Response?

Not having an Incident Response Plan can be a significant factor in how much impact an attack has and how long it takes to recover. By Phil Robinson

2023-06-22

What Is The Cybersecurity Maturity Model Certification (CMMC)?

CMMC certification can give your business a competitive edge in the defense contracting marketplace as well as help safeguard national security.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

TNO Cyber Security Lab

TNO Cyber Security Lab

TNO Cyber Security Lab is a dedicated facility for innovative and experimental research with the goal of a safe and resilient cyberspace.

Digitronic Computersysteme

Digitronic Computersysteme

Digitronic focus on innovative software to protect your personal and sensitive corporate data.

Resec Technologies

Resec Technologies

Resec provides total protection against all types of known and unknown malware threats including viruses, Trojans, ransomware and phishing, regardless of their delivery method.

A-LIGN

A-LIGN

A-LIGN is a technology-enabled security and compliance partner trusted by more than 2,500 global organizations to mitigate cybersecurity risks.

ST Engineering

ST Engineering

ST Engineering is a leading provider of trusted and innovative cybersecurity solutions.

Newtech Recycyling

Newtech Recycyling

Newtech Recycyling specializes in the removal and disposal of IT infrastructure which has reached the end of its life cycle.

Cyble

Cyble

Cyble Vision enables faster detection of cyber threats and focuses on identifying and analysing the motivations, methods, capabilities and tools of adversaries.

Cyber Ireland

Cyber Ireland

Cyber Ireland brings together Industry, Academia and Government to represent the needs of the Cyber Security Ecosystem in Ireland.

NTT Group

NTT Group

NTT offers agile, scalable technology services to bring it all together seamlessly, securely, and sustainably. We help you adopt a holistic security approach across your network, clouds, applications.

Oregon Systems

Oregon Systems

Oregon Systems is a Regional Leader & Distributor with value added services for OT, IoT, IIoT & IT Cybersecurity products, Solutions & professional services throughout the middle-east region.

Censinet

Censinet

Censinet provides the first and only third-party risk management platform for healthcare organizations to manage the threats to patient care that exist within an expanding ecosystem.

Ermes

Ermes

Ermes – Intelligent Web Protection provides companies with a solution that effectively secures them against web threats.

Olympix

Olympix

Dev-first Web3 security that starts at the source. Olympix is a pioneering DevSecOps tool that puts security in the hands of the developer by proactively securing code from day one.

AI Security Institute (AISI)

AI Security Institute (AISI)

The AI Security Institute’s mission is to minimise surprise to the UK and humanity from rapid and unexpected advances in AI.

SecuRedact

SecuRedact

SecuRedact is an AI-powered tool to detect and pseudonymize personal data in text and images. Fast, local, secure, and free to try.

Promptfoo

Promptfoo

Promptfoo helps developers and enterprises build secure, reliable AI applications.