TECHNOLOGY > > Resilience


« Back to News

2023-04-20

What Is A Credential Stuffing Attack & How To Protect Your Organization

Credential stuffing is a type of attack that relies on the fact that many people use the same usernames & passwords across multiple accounts.

2023-04-25

As A Business Leader, You Must Manage Cyber Risk 

Cyber attacks are a key risk for boards and any director seeking to add value for corporate stakeholders should appreciate the growing jeopardy.

2023-04-14

Has Someone Taken Out A Subscription Against You?

LogIn To Go Hacking: Criminals can now buy ransomware-as -a service just as cheaply as they can subscribe to Netflix. By Rob Quickenden

2023-04-12

Immutable Storage Is The One Solution That Will Keep Your Data Safe

Immutable data storage ensures data security and integrity in multi-cloud and hybrid-cloud environments in several ways. By Florian Malecki

2023-03-31

If It’s Convenient Be Suspicious – The Human Aspect

When 21% of breaches occur because of human error, how do CIOs encourage employees to care about security? By Travis Everett

2023-04-06

Phishing Kits: The New Frontier For Hackers

Phishing As A Service: It is no longer the case that a potential cyber criminal needs to have a real technical skillset to launch a phishing attack.

2023-03-30

The Cybersecurity Threat To Railways

Ransomware attacks are an increasingly significant cyber threat facing the transport sector in the EU and railways are the prime target.

2023-03-31

Understanding The Incident Response Lifecycle

Best practices help organizations enhance their incident response capabilities, ensuring a more effective response to cybersecurity incidents.

2023-03-29

World Backup Day 

Securing DevOps: Don't neglect to backup the types of data that are often overlooked, but the loss of which can lead to serious consequences.

2023-03-29

What Is Email Spoofing & How to Protect Your Organization

Fraud: There are several measures that organizations can take to protect themselves against email spoofing. By Gilad David Mayaan.

2023-03-22

Jackpotting Attacks Are Back - But Banks Can Fight Back

FiXS infects multiple ATM models, corrupting the middleware which runs the hardware - including the cash dispenser. By Juan Ramon Aramendia

CyberSecurity Jobsite
Check Point

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Secunet Security Networks

Secunet Security Networks

Secunet is a leading cyber security company offering a combination of consultancy and products, delivering the highest level of security for data, applications and digital identities.

Cipher Security

Cipher Security

Cipher Security provides unique robustness tests and penetration tests, as well as customizable development services for vendors and providers.

Kudelski Security

Kudelski Security

Kudelski Security is an international cybersecurity company providing innovative, independent and tailored security solutions for large enterprise and public sector clients.

Matias Consulting Group (MCG)

Matias Consulting Group (MCG)

Your Business needs competitive and resilient ICT solutions. MCG defines, deploy & support them enabling you to focus on your core business.

Cycode

Cycode

Cycode is the industry’s first source code control, detection, and response platform.

oneM2M

oneM2M

oneM2M is a global organization creating a scalable and interoperable standard for communications of devices and services used in M2M applications and the Internet of Things.

ThriveDX

ThriveDX

ThriveDX, the world’s premier EdTech provider (formerly HackerU), champions digital transformation training as a means of empowering individuals to thrive in the age of digital disruption.

MicroSec

MicroSec

MicroSec is a company specializing in IoT security. We focus on bringing enterprise grade security to IoT and embedded systems.

QGroup

QGroup

QGroup has been re-designing the consultancy industry since 2012. We're a rapidly expanding group of consulting companies that deliver bespoke IT services including cybersecurity.

IntegraONE

IntegraONE

IntegraONE is a IT solutions provider offering a full range of networking and technology solutions.

ATHENE National Research Center For Applied Cybersecurity

ATHENE National Research Center For Applied Cybersecurity

ATHENE is the largest research center for cybersecurity and privacy in Europe, conducting application-oriented top-level research for the benefit of the economy, society and the state.

ArmorPoint

ArmorPoint

ArmorPoint redefines the traditional approach to cybersecurity by combining network operations, security operations, and SIEM technology in one platform.

DNS Research Federation (DNSRF)

DNS Research Federation (DNSRF)

DNSRF's mission is to advance the understanding of the Domain Name System's impact on cybersecurity, policy and technical standards.

Chorus Cyber

Chorus Cyber

Chorus are a leading Managed Security Service Provider (MSSP), and member of the Microsoft Intelligent Security Association (MISA), with three Microsoft Advanced Specialisations in security.

IT.ie

IT.ie

IT.ie are a comprehensive provider of Managed IT Services, Cloud Solutions, Cyber Security, and proactive IT support services.

Zyxel Networks

Zyxel Networks

Zyxel Networks is a leading provider of secure, AI-powered networking solutions for small to medium businesses (SMBs) and the enterprise edge.