TECHNOLOGY > > Resilience


« Back to News

2023-02-27

Securing Hybrid Workplaces

Network Access: More organisations are working on streamlining their operations by connecting physical and digital security systems.

2023-02-23

Cyber Security Strategies Need To Evolve Alongside The Enterprise

Hybrid Work: Security is no longer about protecting one specific network for the company - it's about protecting remote work too. By Mark Guntrip

2023-02-20

Is Your Business Compliant With Data Sovereignty Requirements?

It is increasingly important for organisations to understand where their cloud data is stored and who holds the keys to that data. By Florian Malecki

2023-02-18

Making A Success Of Hybrid Working

Companies need to address five key issues holding them back and ensure employees engage with collaboration tools now. By Rob Quickenden

2023-02-16

Businesses Need To Prioritise Cybersecurity In 2023

Turning employees from the weakest links in your cybersecurity strategy to the strongest will help keep criminals out & data safe. By AJ Thompson

2023-02-13

Rising Cybercrime Means SMEs Should Seek Cyber Insurance

Having insurance can help protect a company’s reputation and brand plus provide the expertise to manage cyber incidents. By Simon West

2023-02-08

Creating Order Out Of WAF Management Chaos

Web Application Firewall Management: How WAF rules are run & processed can provide security without sacrificing performance. By Paul McNamara

2023-02-08

SMBs Are Taking Cybersecurity More Seriously

A new report finds that Small & Medium Businesses are actively investing in cyber protection - but there is room for improvement. By Chris Mckie

2023-02-06

Operational Resilience: More Than Disaster Recovery 

At a business level, disaster recovery is just one aspect of a larger discipline: operational resilience. By Sean Deuby & Simon Hodgkinson

2023-01-28

How Can SASE Boost Information Security?

Secure Access Service Edge: SASE can provide a comprehensive level of protection against cyber threats & simplify security management.

2023-01-27

Bridging The Detection & Response Gap

Failure To Adapt: As cyber attackers move faster, here are five ways organisations can stay ahead of them. By Matt Lawrence & Dan Green

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Cyber Security Associates (CSA)

Cyber Security Associates (CSA)

Cyber Security Associates provides cyber consultancy and cyber managed services which help to detect, protect and educate against the ever-changing cyber threat.

SecPoint

SecPoint

SecPoint provides products to secure & protect your network from remote and local attacks.

Centre for International Governance Innovation (CIGI)

Centre for International Governance Innovation (CIGI)

CIGI research areas include Conflict Management & Security which encompass cyber security and cyber warfare.

ID-SIRTII/CC

ID-SIRTII/CC

Security Incident Response Team for Internet Infrastructure in Indonesia.

Halon

Halon

Halon is a flexible security and operations platform for in-transit email.

Cequence Security

Cequence Security

Cequence, a pioneer in API security and bot management, is the only solution that delivers Unified API Protection (UAP), uniting discovery, compliance, and protection.

Truesec

Truesec

TRUESEC has an exceptional mix of IT specialists. We are true experts in cyber security, advanced IT infrastructure and secure development.

Kiteworks

Kiteworks

Kiteworks (formerly Accellion) creates a dedicated Private Content Network that ensures zero-trust private content protection and compliance.

CryptoDATA

CryptoDATA

CryptoDATA develops products and services based on Blockchain technology, that ensure user security and data encryption, applicable in various fields.

CatchProbe Intelligence Technologies

CatchProbe Intelligence Technologies

CatchProbe provides actionable web intelligence, OSINT, deception systems, threat intelligence, and digital crime analytics solutions and products through an AI-Driven intelligence platform.

ThreatFabric

ThreatFabric

ThreatFabric integrates industry-leading threat intel, behavioral analytics, advanced device fingerprinting and over 10.000 adaptive fraud indicators.

ArmorPoint

ArmorPoint

ArmorPoint redefines the traditional approach to cybersecurity by combining network operations, security operations, and SIEM technology in one platform.

endpointX

endpointX

endpointX is a preventative cyber security company. We help companies minimize their risk of breach by improving cyber hygiene.

EyBrids

EyBrids

As a forward-thinking cybersecurity consulting firm, we believe that robust security is the foundation for innovation and growth in today’s digital landscape.

Canary Technology Solutions (Canary IT)

Canary Technology Solutions (Canary IT)

A Cloud, Cyber Security, Retail Solutions and Managed IT Services provider for over 25 years, we safeguard and revolutionise business through technology and foresight.

Repello AI

Repello AI

Repello - making AI safe to trust. We help you continuously red-team your GenAI applications against ever-evolving AI threat landscape.