TECHNOLOGY > > Resilience


« Back to News

2023-01-27

Bridging The Detection & Response Gap

Failure To Adapt: As cyber attackers move faster, here are five ways organisations can stay ahead of them. By Matt Lawrence & Dan Green

2023-01-25

Preventing Ransomware Attacks Begins With You

Don't Forget To Protect Your Data: What business owners need to know about identifying attacks and keeping their employees safe.

2023-01-20

Perfectly Coded APIs Can Be Susceptible To Attack

A False Sense Of Security: Even if an API is perfectly coded, inventoried & tested, it can still be probed and compromised. By Andy Mills

2023-01-19

Building An Identity-First Security Strategy

Going Beyond The NIS2 Directive: Effectively protecting identities, both human and machine, is a top priority for enterprises. By Tim Callan

2023-01-17

Three Steps To Protect Your Organisation From Wiper Malware

How to Avoid A Wipeout: No matter what cybercriminals may do, a robust backup and recovery plan will keep your data secure. By Florian Malecki

2023-01-10

Zero Trust In (remote) Access

Caution Is Better Than Indulgence: Zero trust offers small companies a level of security equivalent to that of large enterprises. By Paddy Srinivasan

2023-01-09

Cybersecurity: Prepare For The Year Ahead

Back-to-Basics: Cybersecurity threats and regulation will evolve in the next year, yet many aspects will remain the same. By Simon Eyre 

2023-01-09

Web Browser Attacks & How To Combat Them

The web browser has become the biggest attack surface available to threat actors, who are actively leveraging and exploiting it. By Jonathan Lee

2023-01-06

PAM, IAM, Or Both?

Useful But Different: Identity & Access Management (IAM) and Privileged Access Management (PAM) are not the same thing. By Colin Tankard

2023-01-04

Multi-Factor Authentication Is No Shortcut To Cyber Resilience

Persistence Pays Off For Hackers: There's more to cyber resilience than MFA and broader technological & cultural changes are needed. By Adrian Odds

2023-01-03

Security Risks In 5G Mobile

Insecure By Design: 5G network slicing offers a widespread threat that includes potential weak points in policy, standards & supply chains.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

GlobalSign

GlobalSign

GlobalSign is an identity services company providing cloud-based, PKI solutions for enterprises needing to conduct safe commerce, communications, content delivery and community interactions.

Nimbusec

Nimbusec

Nimbusec scans your website around the clock and informs immediately if it has been hacked or manipulated

Cienaga Systems

Cienaga Systems

Cienaga Systems is a leader in autonomous cyber threat hunting technology.

Cryptsoft

Cryptsoft

Cryptsoft provides key management and security software development toolkits based around open standards such as OASIS KMIP and PKCS#11.

Sysdig

Sysdig

With Sysdig teams find and prioritize software vulnerabilities, detect and respond to threats, and manage cloud configurations, permissions and compliance.

Cyber Police of Ukraine

Cyber Police of Ukraine

Cyber Police of Ukraine is a law enforcement agency within the the Ministry of Internal Affairs of Ukraine dedicated to combating cyber crime.

Identity Defined Security Alliance (IDSA)

Identity Defined Security Alliance (IDSA)

IDSA is a group of identity and security vendors, solution providers and practitioners that acts as an independent source of education and information on identity-centric security strategies.

EPIC Insurance Brokers & Consultants

EPIC Insurance Brokers & Consultants

EPIC is an insuarnce broker and consultancy firm. Risk management services include risk consultancy and cybersecurity insurance.

iosiro

iosiro

iosiro was created to guide companies through securely using blockchain technologies. We help teams launch and manage ICOs, deploy secure dApps, and integrate private networks into business practices.

Partnership for Conflict, Crime and Security Research (PaCCS)

Partnership for Conflict, Crime and Security Research (PaCCS)

PaCCS delivers high quality and cutting edge research to improve our understanding of current and future global security challenges in areas including cybersecurity.

TrueFort

TrueFort

TrueFort take an application-first approach that offers comprehensive protection for real-time visibility and analysis, protection and better communication across business, IT, and security teams.

Business Resilience International Management (BRIM)

Business Resilience International Management (BRIM)

Business Resilience International Management (BRIM) is engaged by law enforcement in the UK and overseas to advise on establishing and developing Cyber Resilience Centres (CRCs) for business.

Brookcourt Solutions

Brookcourt Solutions

Brookcourt Solutions delivers cyber security, network monitoring technologies and managed security services to help secure and protect your organisation’s critical infrastructure.

Exceed Cybersecurity & I.T. Services

Exceed Cybersecurity & I.T. Services

Exceed Cybersecurity & I.T. Services is a premier Managed Internet Technology (I.T.) company with a focus in cybersecurity risk management and CMMC compliance management.

Cyber Husky

Cyber Husky

Cyber Husky is an agile technology company that specializes in cloud solutions, cybersecurity, and managed IT services.

CR Group

CR Group

CR Group is a Swedish-owned, cyber-security company oriented towards the European market. We offer solutions for vital societal functions that are both easy-to-buy and easy-to-use.