TECHNOLOGY > > Resilience


« Back to News

2022-02-07

Beware PowerPoint Files With Hidden Malware

Socially Engineered Email: The latest covert method that threat actors are using to target desktop users is through trusted sofware applications.

2022-02-09

The Importance Of Securing OT Platforms

The Effects Of Industry 4.0: Higher levels of automation & data exchange in manufacturing industry bring more risk for Operating Technology systems.

2022-02-04

Is US Cyber Security Actually Improving?

The US Government is mandating Federal Agencies to move to a 'ZeroTrust' approach to cyber security and implement multilayer user authentication.

2022-02-01

Britain's Cyber Security Strategy Focuses On Resilience

The British government has announced its Cyber Security Strategy to protect vital public services from the growing risk of destructive cyber attacks.

2022-01-26

Top Tips For SMEs To Dodge Hackers

Small business owners and their employees often lack basic training in cyber security measures and make risky mistakes that could cost them. 

2022-01-26

How To Secure Web Gateway & Web Filtering

A secure web gateway offers protection against online security threats by enforcing company security policies & filtering malicious traffic.

2022-01-25

Defending Against Log4j Vulnerabilities

Concealed Log4j vulnerabilities call for effective measures to reduce the frequency of disruptive events and to reduce the potential damage.

2022-01-25

Making Open-Source Software Safer

Open-source software has unique security challenges, because of its widespread use and the fact its security maintenance is reliant on volunteers.

2022-01-18

Corporate Cyber Attacks Up 50% Last Year

2021 saw a 50% increase in cyber attacks per week on corporate networks compared to 2020, peaking in December, largely due to Log4J exploits. 

2022-01-15

Process Sensor Cyber Security Is A Vital Issue

The gap in process sensor cyber security and process safety is a critical vulnerability in many industries, calling for expert scrutiny. By Joe Weiss

2022-01-12

Azure Active Directory Recycle Bin Won’t Save Your Critical Data

Failing to monitor activity across all Active Directory environments without an effective backup strategy can lead to disaster.  By Greg Jones

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CERT.at

CERT.at

CERT.at is the Austrian national Computer Emergency Response Team.

Original Software

Original Software

Original Software offers a test automation solution focused completely on the goal of effective software quality management.

National Security Agency (NSA)

National Security Agency (NSA)

NSA is a US intel agency responsible for the protection of government communications and information systems against penetration and network warfare.

AEI Cybersecurity

AEI Cybersecurity

AEI brings together companies, Research Centres, Universities, and other organizations interested in promoting new cybersecurity technologies.

Cobalt Strike

Cobalt Strike

Cobalt Strike is penetration testing software designed to execute targeted attacks.

Prevalent

Prevalent

Prevalent takes the pain out of third-party risk management. Companies use our services to eliminate the security and compliance exposures that come from working with vendors and suppliers.

CSL Group

CSL Group

CSL solutions provide complete end-to-end connectivity services for Security, Fire, Telecare and other mission critical M2M/IoT applications.

Quadron  Cybersecurity Services

Quadron Cybersecurity Services

Quadron Cybersecurity Services is a specialist in digital security, data and system protection.

Polish Centre for Accreditation (PCA)

Polish Centre for Accreditation (PCA)

PCA is the national accreditation body for Poland. The directory of members provides details of organisations offering certification services for ISO 27001.

Lionfish Cyber Security

Lionfish Cyber Security

Lionfish Cyber Evolution & Empowerment Model™ empowers SMBs to prepare and protect themselves against cyber threats using a unique combination of on-demand training, support and managed services.

CoreStack

CoreStack

CoreStack helps enterprises overcome cloud challenges such as ever growing security risks, stringent regulatory compliance needs and operational complexities.

Celebrus

Celebrus

Celebrus Fraud Data Platform, by D4t4 Solutions, works with existing fraud structures to augment functionality and turn fraud management into true fraud prevention.

Traceable

Traceable

Traceable was founded to protect applications from next-generation attacks.

Torch.AI

Torch.AI

Torch.AI’s Nexus™ platform changes the paradigm of data and digital workflows, forever solving core impediments caused by the ever-increasing volume and complexity of information.

Information Security Officers Group (ISOG)

Information Security Officers Group (ISOG)

ISOG's mission is to strengthen information security through awareness and education programs, promoting community and fellowship among information security leaders.

Azerbaijan Cybersecurity Center (ACC)

Azerbaijan Cybersecurity Center (ACC)

Azerbaijan Cybersecurity Center is a state-of-the-art facility to deliver advanced cyber training programs and build the next generation of Azerbaijan’s cybersecurity professionals.