TECHNOLOGY > > Resilience


« Back to News

2022-01-25

Defending Against Log4j Vulnerabilities

Concealed Log4j vulnerabilities call for effective measures to reduce the frequency of disruptive events and to reduce the potential damage.

2022-01-25

Making Open-Source Software Safer

Open-source software has unique security challenges, because of its widespread use and the fact its security maintenance is reliant on volunteers.

2022-01-18

Corporate Cyber Attacks Up 50% Last Year

2021 saw a 50% increase in cyber attacks per week on corporate networks compared to 2020, peaking in December, largely due to Log4J exploits. 

2022-01-15

Process Sensor Cyber Security Is A Vital Issue

The gap in process sensor cyber security and process safety is a critical vulnerability in many industries, calling for expert scrutiny. By Joe Weiss

2022-01-12

Azure Active Directory Recycle Bin Won’t Save Your Critical Data

Failing to monitor activity across all Active Directory environments without an effective backup strategy can lead to disaster.  By Greg Jones

2022-01-10

Cyber Security Threats In 2022

Ransomware & Remote Working: The key issue for business cyber security is to make  the transition from reactive to proactive behaviour. 

2022-01-10

Avoid Being A Victim Of Cyber Crime – Get Audited

A cyber security audit is a systematic evaluation of a company's information security by measuring how well it conforms to established criteria. 

2022-01-09

The Complexities Of Operational Technology Make It Vulnerabe

Industrial organisations need to adapt quickly to the expansion of cyber security threats to protect complex Operational Technology systems.

2022-01-05

Pegasus Spyware & Not-For-Profit Cyber Security - What Are The Risks?

It's never been more important for charities to prioritise their cyber security, especially for those involved in humanitarian efforts. By Kitty Bates.

2022-01-04

The Cyber Security Risks Of Outsourcing

Out Of Control: IT outsourcing is a major contributor to cyber security risk exposure and the consequences of a breach can be very damaging.

2021-12-29

Most British Workers Are Unaware Of Cyber Threats

Don't Know, Don't Care: Only a quarter of UK employees are aware of cyber risks, although more than half have been affected by an attack.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Cyber Security Associates (CSA)

Cyber Security Associates (CSA)

Cyber Security Associates provides cyber consultancy and cyber managed services which help to detect, protect and educate against the ever-changing cyber threat.

Cyber Conflict Studies Association (CCSA)

Cyber Conflict Studies Association (CCSA)

Cyber Conflict Studies Association (CCSA) is a non-profit organization dedicated to leading a diversified research agenda in the field of cyber conflict.

UL

UL

UL is a safety, security and compliance consulting and certification company. Areas covered include cyber security.

Decision Group

Decision Group

Decision Group are a Total Solution Supplier offering Network Forensics and Lawful Interception tools.

NEC

NEC

NEC offers a complete array of solutions to governments and enterprises to protect themselves from the threats of digital disruption.

Innotec Security

Innotec Security

Innotec Security is a Spanish company specializing in cybersecurity-as-a-service, cyber resilience and cyber risk management.

Platin Bilişim

Platin Bilişim

Platin Bilisim is an IT Security company providing consultancy, solutions and operational support services.

Ignyte Assurance Platform

Ignyte Assurance Platform

Ignyte Assurance Platform™ is a leader in collaborative security and integrated GRC solutions for global corporations in Healthcare, Defense, and Technology.

Forum of Incident Response & Security Teams (FIRST)

Forum of Incident Response & Security Teams (FIRST)

FIRST is the global Forum of Incident Response and Security Teams.

ThreatModeler

ThreatModeler

ThreatModeler is an automated threat modeling solution that fortifies an enterprise’s Software Development Lifecycle by identifying, predicting and defining threats.

Macquarie Telecom Group

Macquarie Telecom Group

Macquarie Telecom is Australia's datacentre, cloud, cyber security and telecom company for mid-large business and government customers.

MyDocSafe

MyDocSafe

MyDocSafe is an all-in-one document security and e-sign software.

Swiss It Security Group

Swiss It Security Group

Swiss It Security Group offers clients complete IT security concepts based on innovative solutions and technology, with a focus on protection, detection and defence.

Anvilogic

Anvilogic

Anvilogic provides a unifying experience for security professionals aimed at providing improved visibility, enrichment, and context across hundreds of alerting datasets and security tools.

ThreatNix

ThreatNix

ThreatNix is a tight knit group of experienced security professionals who are committed to providing competent cybersecurity solutions that adhere to international standards.

Kusari

Kusari

Securing your software supply chain starts with understanding. Kusari is on a mission to bring transparency to your software supply chain and power secure development.