TECHNOLOGY > > Resilience


« Back to News

2022-08-25

Think Carefully Before You Pay For Cloud Downtime Insurance

Considering Buying Cloud Downtime Insurance? Before you buy, take these three vital steps to ensure business continuity. By Florian Malecki

2022-08-22

Re-strategising Resilience In The Remote Working Age

It’s time to stop adding tools and complexity and start building security operations where cyber security experts are truly empowered. By Rob Smith

2022-08-22

Protecting Medical Devices From Cyber Attacks

Medical Device Cyber Security: Medical devices need robust cyber security which is critical in retaining patient trust in health care technology. 

2022-08-16

Data Protection Must Be a Part of Every Cyber Security Strategy

CISOs Need A 360-degree View: Your data is your most important asset. If it's compromised by ransomware, you're dead in the water. By Florian Malecki

2022-08-15

The Top 3 Current Email Threats

Email is a vulnerable part of most organisations' infrastructure and can be used for delivering phishing scams, business compromise & ransomware.

2022-08-10

Building a Threat-Ready Ransomware Response Plan

Prepare, Detect, Recover: Ransomware attacks proliferate as more organisations rely on digital infrastructure to run their networks. By Kev Eley

2022-08-08

AI Driven Anomaly Detection In The Oil & Gas Industry

Drone In A Box: A drone using data anomaly detection software alongside sophisticated imaging will improve detection of leaks in the network.

2022-08-05

Cybersecurity Essentials For Cloud Environments

Cloud security works in two parts - the security of the cloud and the security in the cloud. It's that part users should focus on. By Hugh Raynor

2022-08-04

Github Supply Chain Attack

Somebody cloned over 35,000 Github repositories and kept them identical to the original source code, with the addition of malicious code.

2022-08-03

New British Cyber Advisor Scheme

The NCSC is launching a Cyber Advisory Service to extend a trusted source of cyber security advice to a wider range of organisations. 

2022-08-03

How to Prepare Your Security Team For The Future Of Vulnerability Management

Vulnerabilities Are Not Equal: Security teams should use a risk-based vulnerability prioritization, automated tools & effective controls. By Lisa Xu

Quartz Conference
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Allianz

Allianz

Allianz Cyber Protect is a comprehensive cyber insurance provided internationally and tailored to your company´s risk profile.

8MAN

8MAN

8MAN is a leading Access Rights Management (ARM) solution in Microsoft and virtual server environments.

CERT-UA

CERT-UA

CERT-UA is the national Computer Emergency Response Team for Ukraine.

Federation of Finnish Technology Industries

Federation of Finnish Technology Industries

The Federation of Finnish Technology Industries is the lobbying organisation for technology industry companies in Finland.

DFLabs

DFLabs

DFlabs is a pioneer in Security Automation & Orchestration technology, leveraging your existing security products to dramatically reduce the response and remediation gap.

PlainID

PlainID

PlainID provides IAM teams with a simple and intuitive means to control their organization’s entire authorization process.

Trapezoid

Trapezoid

Trapezoid is a cybersecurity company developing Firmware Integrity Management solutions designed to detect unauthorized changes to firmware & BIOS across the entire data center infrastructure.

FoxGuard Solutions

FoxGuard Solutions

FoxGuard Solutions develops customized cyber security, compliance and industrial computing solutions for critical infrastructure entities and control system vendors.

KLC Consulting

KLC Consulting

KLC Consulting offers information assurance / Security, IT Audit, and Information Technology products and services to government and Fortune 1000 companies.

Simility

Simility

Simility's multi-layered fraud detection solution uses superior machine learning & device intelligence technology to safeguard your online businesses.

Cyber Talents

Cyber Talents

CyberTalents is on a mission to close the gap of cyber security professionals shortage across the globe.

Perch Security

Perch Security

Perch is a co-managed threat detection and response platform backed by an in-house Security Operations Center (SOC).

Point Predictive

Point Predictive

Point Predictive build Predictive Models using Artificial Intelligence and Machine Learning techniques that help our customers stop fraud and early payment default (EPD).

Privacera

Privacera

Privacera enables consistent data governance, security, and compliance across all your data services - on-premises and in the cloud - so you can maximize the value of your data.

Redwall Technologies

Redwall Technologies

Redwall provides cybersecurity expertise and technology to prevent and respond to emerging threats against mobile applications and connected infrastructures.

Cerberus Sentinel

Cerberus Sentinel

Cerberus Sentinel are a provider of cybersecurity consulting and managed services. We specialize in building a security-centric culture for our clients using an education-based approach.