TECHNOLOGY > > Resilience


« Back to News

2021-12-06

Panama Boosts Maritime Cyber Security

Panama, the world's largest merchant shipping state, is working to improve the cyber security & safety of the many maritime vessels that fly its flag.

2021-12-06

What Every PHP Developer Needs to Know About Cyber Security

PHP is the most common programme language and it's essential for web developers to have good cyber security skills to protect users. By Colin Rooney 

2021-12-02

Dealing With Scam Emails

A False Sense Of Security: What to do if you receive a suspicious message that looks like its from your corporate email address. By Eliza Sadler

2021-11-30

Worldwide Cyber Security Threats

Cyber security threats, risks & challenges share many common factors in exploiting vulnerabilities, but vary significantly from one country to another.

2021-11-29

Trojan Malware Installed On Millions Of Android Devices

Users of over nine million Android devices have installed dozens of games from Huawei that have a trojan malware designed to collect personal data. 

2021-11-29

Non-Profit Organisations & Cyber Security

Non-profit organisations tend to be targeted by cyber criminals due to their lack of smart, sophisticated cyber security technology. By John Giordani

2021-11-29

5G Networks Lack Adequate Cloud Security

5G systems provide greatly accelerated speed & bandwidth, but they can be vulnerable targets for cyber attacks if they are not properly secured. 

2021-11-22

How Does IAM Help In GDPR Compliance?

Using Identity and Access Management (IAM) facilitates GDPR compliance and makes sure that most GDPR requirements are adhered to. By Naren Sahoo

2021-11-19

123456 Is Not A Password

The exploding use of online apps & services means users increasingly have to remember many more passwords - and passwords are the weak link.

2021-11-16

Practical Cyber Security Tips For Remote Working

Remote working increases the risks of a data breach - every employee must be responsible for protecting corporate information. By Charlie Svensson

2021-11-11

Microsoft Gets Serious About Dealing With The Skills Shortage

Microsoft plans to halve the United States' cyber security workforce shortage by 2025 by pouring big money and resources into training programs.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

World Privacy Forum (WPF)

World Privacy Forum (WPF)

The World Privacy Forum is a non-profit public interest research group that focuses on privacy and technology issues.

Indium Software

Indium Software

Indium Software is an Independent Software Testing Company offering software testing services (including security testing) and offshore Quality Assurance solutions.

Referentia

Referentia

Referentia leads the development of critical infrastructure solutions that benefit society, including cyber security and network performance management.

Mitchell Sandham

Mitchell Sandham

Mitchell Sandham is an, independent insurance and financial services brokerage. Business products include Cyber/Privacy Liability insurance.

Cyber DriveWare

Cyber DriveWare

DriveWare analyzes new traffic in the I/O layer and blocks malware and cyber attacks which organizations have no means to protect against.

Telecommunications Industry Association (TIA)

Telecommunications Industry Association (TIA)

TIA works to secure trust in networks by advocating public policy positions on the security of ICT equipment and services related to critical infrastructure, supply chain and information sharing.

Innovent Recycling

Innovent Recycling

Innovent Recycling provides a secure IT recycling & data destruction service to all types of organizations across the UK.

Transpere

Transpere

Transpere provides IT Asset Disposition (ITAD), Data Destruction, Electronic Recycling and Onsite Data Services.

Converge Technology Solutions

Converge Technology Solutions

Converge Technology Solutions Corp. is a North American IT solution provider delivering advanced analytics, cloud, cybersecurity, and managed services solutions.

Revere Technologies

Revere Technologies

Revere Technologies is a pure-play cyber security solutions and services provider in Sub-Saharan Africa.

Aegis Security

Aegis Security

Aegis Security helps clients to secure their systems against potential threats through pre-emptive measures, such as security assessments, and cutting-edge solutions to security challenges.

People Driven Technology

People Driven Technology

People Driven Technology is a customer-obsessed organization. We leverage our decades of business, technology, and engineering experience to deliver outcomes for our clients.

IONOS

IONOS

IONOS is a leading provider of cloud infrastructure, cloud services, and hosting with more than 8.5 million customers contracts.

LaScala

LaScala

LaScala is an IT Managed Services provider delivering technical, security, and compliance solutions with dedication, compassion, and agility.

AT&T Cybersecurity

AT&T Cybersecurity

AT&T Cybersecurity’s Edge-to-Edge technologies provide threat intelligence, collaborative defense, security without the seams, and solutions that fit your business.

aFFirmFirst

aFFirmFirst

aFFirmFirst is a unique software solution offering a simple yet effective way for businesses to protect and control their online images and logo, as well as allowing one-click website verification.