TECHNOLOGY > > Resilience


« Back to News

2024-10-15

Data Centres Given Critical National Infrastructure Status In Britain

The UK government wants to promote resilience & security of data centres, What does this mean for data centre providers? By Varney & McCarron

2024-10-01

Six Steps On The Road To NIS2 Compliance

NIS2 is the EU’s stringent new cybersecurity Directive and member states have until 17th October to ratify it into national law. By Martin Davies

2024-10-02

Improving Threat Intelligence Sharing

The disconnect between teams & siloed use of security tools presents a significant risk to successful delivery of threat intelligence. By Dan Bridges

2024-09-30

Space: The Last Cybersecurity Frontier?

Space is a growing part of national critical infrastructures, with commercial spacecraft & military communications at risk of being badly compromised.

2024-09-18

Britain Convenes An International Cyber Skills Conference

Protection & Defence: Britain is bringing western countries together to discuss the cyber security threats that face nations around the world.

2024-09-23

Combating Cyber Attacks With Threat Intelligence 

Navigating Cybersecurity: Threat intelligence has a key role in reducing risks and can be integrated with other tools to reach better solutions.

2024-09-12

Which US States Are Most At Risk From Cyber Attacks? 

Colorado, New York, Nevada & California Top The List: Three out of four companies in the US are found to be at risk of a material cyber attack.

2024-09-16

What Android Users Need To Know About New Malware

SpyAgent: A new Android mobile malware which targets mnemonic keys by scanning your device for recognisable images. By Oliver Devane

2024-09-13

Unlocking A Unified Digital Identity For Europe

eIDAS 2.0: Empowering EU citizens by ensuring their personal data is protected throughout the digital identity ecosystem. By Tim Callan

2024-09-11

NIS2 - Countdown To Compliance

How CISOs Can Lead The Charge: Immediate actions CISOs must take to ensure their organisations fully comply with NIS2. By Andrew Lintell

2024-09-10

The Obstacles That Security Teams Face In Vulnerability Management

The Big Five: To stay ahead of adversaries, teams must use advanced technologies and prioritise the most critical vulnerabilities. By Sylvain Cortes

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Agenci

Agenci

Agenci are specialists in cyber security and information security and deliver ISO 27001 Certification.

Tymlez Software & Consulting

Tymlez Software & Consulting

Tymlez Software and Consulting is a start-up specialised in blockchain technology for enterprises.

SysTools

SysTools

SysTools provides a range of services including data recovery, digital forensics, and cloud backup solutions.

AVeS Cyber Security

AVeS Cyber Security

AVeS combines expert knowledge and services with leading technology products to provide comprehensive Information Security and Advanced IT Infrastructure solutions.

KOS-CERT

KOS-CERT

KOS-CERT is the national Computer Incident Response Team for Kosovo.

infySEC

infySEC

InfySEC is an information security services organization offering Security Technology services, Security Consulting, Security Training, Research & Development.

Ioetec

Ioetec

Ioetec's mission is to connect users to their IoT devices securely, ensuring these devices remain safe to use in our increasingly connected world.

Sequretek

Sequretek

Sequretek was formed with the aim to “Simplify Security”. We envision a future where enterprise networks are streamlined, secure and simple.

Huntress Labs

Huntress Labs

Huntress provides managed threat detection and response services to uncover and address malicious footholds that slip past your preventive defenses.

Infosequre

Infosequre

Infosequre builds up your security awareness culture and turns your employees into the first line of defense against cyber risks.

Phakamo Tech

Phakamo Tech

Phakamo Tech offers a full set of governance, risk, compliance, cybersecurity and Microsoft Cloud services that include consulting, planning, implementation and cyber incident response.

Stacklet

Stacklet

Stacklet provides cloud governance as code platform that accelerates how Global 2000 manages its security, asset visibility, operations, and cost optimization policies in the cloud.

endpointX

endpointX

endpointX is a preventative cyber security company. We help companies minimize their risk of breach by improving cyber hygiene.

Whitaker Brothers

Whitaker Brothers

Whitaker Brothers data destruction equipment can be found in 115 countries and every single continent in the world, from major military organizations to small offices.

Boltonshield

Boltonshield

Boltonshield provide a unique and proactive approach to cyber defence with managed security services, integrated technologies, and a team of security experts, ethical hackers and analysts.

Fortress SRM

Fortress SRM

Fortress SRM protects companies from the financial, operational, and emotional trauma of cybercrime by improving the security performance of its people, processes, and technology.