TECHNOLOGY > > Resilience


« Back to News

2024-02-13

Outsourcing Production Risks Productivity

An IT department often needs to find a quick solution when a large number of users are impacted by an operational emergency. By Matt Lorentzen

2024-02-09

Bolstering Resilience In The Age Of Expanding Threats

Prioritization: Amid the exponential rise in vulnerabilities the era of addressing every single vulnerability has become obsolete. By Howard Goodman

2024-02-06

Ransomware: Businesses Are Well Equipped But Underprepared

Despite high-profile attacks targeting every industry, why are businesses still leaving themselves vulnerable to ransomware? By Duncan Bradley

2024-02-02

Reducing The Risk Of Weak Links With Consolidation

Less Complexity, Less Risk: Cyber security measures are only as strong as the weakest link and consolidation is a smart move. By Manuel Sanchez

2024-01-31

The Importance Of Cloud Access Security In Today's Cyber Landscape

Cloud Access Security Broker solutions provide organizations with the necessary tools and capabilities to secure their cloud environments.

2024-01-31

FinOps In Cybersecurity: Managing The Cost Of Security

FinOps is all about understanding the cost implications of different security measures & making informed decisions about where to allocate resources.

2024-01-29

Navigating Cloud-Native Application Security With CWPP

Cloud Workload Protection Platforms: A security solution that protects containerized environments & manages identities & access control effectively.

2024-01-26

The Power Of Unified Cloud Protection

Security Service Edge: A modern approach to business security to improve network performance & protection. By John McLoughlin

2024-01-17

Cyber Security Is A State Of Mind

Effective Cyber Security Is A Mindset: The awareness and collaboration of the entire team are vital in preventing and mitigating cyber risks.

2024-01-12

The Benefits of Regular Penetration Testing

Penetration testing is an integral part of strong security systems and central to uncovering weakness & fixing them before threat actors exploit them.

2024-01-09

A Crucial Ally In The War Against Digital Deception

Fraud Detection Software: A dynamic, system, adapting to identify & combat the many forms of fraud threatening the digital landscape.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

National Cyber Security Centre Finland (NCSC-FI)

National Cyber Security Centre Finland (NCSC-FI)

The NCSC-FI develops and monitors the operational reliability and security of communications networks and services in Finland.

Beachhead Solutions

Beachhead Solutions

Beachhead's SimplySecure is a configurable, web-based management tool allowing you to remotely secure vulnerable mobile devices in your organization.

Axiad IDS

Axiad IDS

Axiad IDS is a Trusted Identity solutions provider for enterprise, government and financial organizations.

TorGuard

TorGuard

TorGuard is a Virtual Private Network services provider offering secure encrypted access to the internet.

Egnyte

Egnyte

Egnyte delivers secure content collaboration, compliant data protection and simple infrastructure modernization; all through a single SaaS solution.

DAkkS

DAkkS

DAkkS is the national accreditation body for Germany. The directory of members provides details of organisations offering certification services for ISO 27001.

CyberQ Group

CyberQ Group

CyberQ is an award winning cyber security consultancy and services provider and an innovator in Artificial Intelligence and Automated Cyber Security.

Proton Data Security

Proton Data Security

Proton Data Security is a certified small business specializing in the design, manufacturing and sales of data security products for permanent erasure of hard drives, tapes and optical media.

Italtel

Italtel

Italtel is a multinational ICT company that combines networks and communications services with the ability to innovate and develop solutions for digital transformation.

Netsecurity AS

Netsecurity AS

Netsecurity is a Norwegian owned company focused and specialised within IT security and cybersecurity-as-a service.

GuardSight

GuardSight

GuardSight is a provider of specialized cybersecurity services to safeguard businesses, government, and remote workers against sophisticated cyber threats.

CYSEC SA

CYSEC SA

Cysec is equipped to deliver agile security solutions for the most challenging IT infrastructures around the world.

Support Link Technologies (SLT)

Support Link Technologies (SLT)

Support Link Technologies are an IT Solutions Company committed to achieving customer satisfaction through excellent customer service.

Anametric

Anametric

Anametric is developing new technologies and devices for chip scale quantum photonics, with a focus on cybersecurity.

Amazon Web Services (AWS)

Amazon Web Services (AWS)

Amazon Web Services is the world’s most comprehensive and broadly adopted cloud platform, offering fully featured services from data centers globally.

Appknox

Appknox

Appknox is the world’s most powerful plug-and-play security platform that helps developers, security researchers, and enterprises to build a safe and secure mobile ecosystem.