TECHNOLOGY > > Resilience


« Back to News

2025-03-17

From Static Defenses To Dynamic Systems

Resilience isn’t just about enduring threats - it’s about maintaining the ability to operate and recover under any circumstances. By Engin Kirda

2025-03-14

Shadow IT In Remote Work

Portable Storage: Businesses that fail to address shadow IT risk losing control of their sensitive data and put themselves at risk. By Jon Fielding

2025-03-16

Continuous Cybersecurity Learning Is Business-Critical

Security has shifted from IT mandate to executive imperative, this is why continuous learning is a business-critical function. By Alexia Pedersen

2025-03-13

Protecting Digital Infrastructure Without Going Broke

A modern, data-driven age requires modern, data-storage infrastructures that protect the interests of our nation's citizens. By Adrian Fern

2025-03-11

How CISOs Can Demonstrate The Value Of Their Investments

CISOs Face Many Budget Challenges: Key strategies CISOs can adopt to communicate the value of their investments effectively. By Chad LeMaire

2025-03-10

ZTNA - Back To Basics

Zero Trust Network Architecture: Redefining cybersecurity by treating every user, device & connection as inherently untrustworthy. By Christian Have

2025-03-09

Data Breaches Cause A Financial Burden

A Multi-Faceted Approach: Risk leaders identify data breaches as a leading source of man-made disruptions causing financial burdens.

2025-03-05

Getting Ready To Stop Ransomware Attacks

Look For Warning Signs: Ransomware attacks are a process that gradually invade defensive systems in stages and need to be adequately prepared for.

2025-02-24

Cyber Doomsday Warnings Do More Harm Than Good

The constant escalation of doomsday language is a distraction from more urgent and practical cybersecurity priorities. By Joyce Hakmeh

2025-02-25

Preparing For A Cyber Crisis

How can business leaders best prepare for a cyber crisis, and what does effective management look like when an attack occurs? By Dan Potter

2025-02-23

Ransomware Trends & Top Six Predictions For 2025

Key Trends: Ransomware threats are expected to escalate in 2025, with cybercriminals adopting more sophisticated tactics to maximize their impact.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Thinkst Applied Research

Thinkst Applied Research

Thinkst is an Applied Research company with a deep focus on information security.

RiskXchange

RiskXchange

RiskXchange's cybersecurity risk rating solution helps businesses solve complex cybersecurity and compliance challenges by providing a 360-degree view of your cybersecurity posture.

British Security Industry Association - CySPAG

British Security Industry Association - CySPAG

CySPAG is a special interest group within the British Security Industry Association (BSIA) focused on reducing the risk of product related cybercrime.

SurePassID

SurePassID

SurePassID is a provider of highly secure, highly extensible multi-factor authentication (MFA) solutions.

Syracom

Syracom

syracom is a consultancy firm specialized in development of efficient business processes. With our expertise and IT competence, we develop tailored solutions for customers in various industries.

Bfore.ai

Bfore.ai

Stop future attacks, today. Bfore.ai is an operational threat intelligence feed to add predictive technology to your security infrastructure.

HEQA Security

HEQA Security

HEQA Security (formerly QuantLR) offer the world’s most cost-effective, easy-to-integrate, and secure Quantum Key Distribution (QKD) solution

Raman Power Technologies

Raman Power Technologies

Raman Power Technologies focus on bringing value and solving business challenges through the delivery of modern IT services and solutions including cybersecurity.

eaziSecurity

eaziSecurity

eaziSecurity has built an eco-system of technology and services that bring enterprise scale security solutions to the SME marketplace.

Bittnet Training

Bittnet Training

Bittnet Training is the leader in the IT Training market in Romania. We develop the IT skills of IT professionals as well as those who wish to start a career in IT.

RAND Corporation

RAND Corporation

The RAND Corporation is a non-profit institution that helps improve policy and decision making through research and analysis.

Xeol

Xeol

Software free of vulnerabilities, built and distributed by trusted entities. Our mission is to help customers secure their software from code to deploy.

Acumenis

Acumenis

At Acumenis, we help organisations of all sizes to manage information security effectively. Our key services are penetration testing, ISO 27001 implementations, and security

Increase Your Skills (IYS)

Increase Your Skills (IYS)

Armed and ready: raise awareness of cyberattacks in your company with the Full-Service Awareness Platform from IYS – fast and effective. We help you develop a robust, sustainable security strategy.

Cyber Castle

Cyber Castle

Linux Demands Sophisticated, Purpose-Built Security. Cyber Castle is the solution. A safe, deployable platform down to the edge device for monitoring Linux security anywhere across the globe.

Conifers.ai

Conifers.ai

Empower your existing SecOps team with the strength of AI - achieve SOC excellence with Conifers CognitiveSOC.