TECHNOLOGY > > Resilience


« Back to News

2023-03-22

Jackpotting Attacks Are Back - But Banks Can Fight Back

FiXS infects multiple ATM models, corrupting the middleware which runs the hardware - including the cash dispenser. By Juan Ramon Aramendia

2023-03-22

Staying Secure In A Changing World

The Benefits of Regular Cybersecurity Updates: Protecting your data & systems from malicious attacks and staying compliant with latest regulations.

2023-03-16

Deepfakes Are Making Business Email Compromise Worse

Bad actors have upped their game with a new weapon in the arsenal: AI-generated deepfake phishing. How can it be stopped? By Tim Callan

2023-03-16

Why Cutting Cybersecurity Jobs Is Shortsighted

Business leaders should make smarter investments to strengthen existing security, not short-term attempts to save money. By Dan Davies

2023-03-16

British Cyber Security - New Threats Call For Action

Three cybersecurity experts talk about what the UK government needs to include in its updated advice & regulation to ensure better national security.

2023-03-23

A 'Golden Pipeline' To Secure The Supply Chain

Building security into the development process is a priority for organisations aiming to avoid the risks of supply chain compromise. By Nurit Bielorai

2023-03-09

Which CI/CD Tools Can Promote Supply Chain Security?

Incorporating these tools into a supply chain security strategy can reduce risk, increase transparency & maintain the integrity of the supply chain.

2023-03-07

Keeping Up With The Increase In Phishing Attacks

Outwitting Employees: More than 80% of organisations experienced at least one successful criminal phishing email attack in 2022. 

2023-03-02

The Office Workplace ln The Hybrid World

Remote Teamwork In Multiple Locations & Settings: What should a modern office look like in today's world of hybrid work. By Samir Desai

2023-02-28

Securing Valuable Data

Crypto-segmentation is a vital tool in creating a security model that truly supports the need to safeguard valuable data assets. By Simon Pamplin

2023-02-27

Start Thinking Like A Hacker

Curiosity Aggression & Persistence: To get inside the mind of a hacker, you need to think like a hacker and this is known as "white hat" hacking.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Fredda Stanza

Fredda Stanza

Fredda Stanza specialize in Information Security and Forensics Consulting.

Secure Identity Alliance (SIA)

Secure Identity Alliance (SIA)

The Secure Identity Alliance is dedicated to supporting sustainable worldwide economic growth and prosperity through the development of trusted digital identities and the adoption of secure eServices.

JLT Specialty

JLT Specialty

JLT Specialty is a leading specialist insurance broker. Services offered include Cyber Risks insurance.

National Agency for Information & Communication Technologies (ANTIC) - Cameroon

National Agency for Information & Communication Technologies (ANTIC) - Cameroon

ANTIC is responsible for regulating the activities of electronic security and regulation of the Internet in Cameroon.

EG-CERT

EG-CERT

EG-CERT is the national Computer Emergency Response Team for Egypt.

RedSeal

RedSeal

RedSeal’s network modeling and risk scoring platform is the foundation for enabling enterprise networks to be resilient to cyber events.

CyberArts

CyberArts

CyberArts is founded on the belief that every single organization deserves and requires the creme de la creme when there is a need for Cyber services.

Nucleon Security

Nucleon Security

Nucleon Endpoint Detection and Response EDR is the most effective way to protect the value created by your organization against any threat.

Cyberwatch Finland

Cyberwatch Finland

Cyberwatch Finland's services improve decision-makers’ strategic situational picture and enable successful holistic cyber risk management.

SandboxAQ

SandboxAQ

SandboxAQ is an enterprise SaaS company combining AI + Quantum tech to solve hard problems impacting society.

Banyax

Banyax

Banyax provides 24×7 real-time Cyber Defense Center Services using the latest technology tools to provide state-of-the-art defense.

KYND

KYND

KYND has created pioneering cyber risk technology that makes assessing, understanding, and managing business cyber risks easier and quicker than ever before.

Technation

Technation

Technation proudly represents the Canadian technology companies that are furthering our nation and the world into the future through innovation, creativity and ingenuity.

Grypho5

Grypho5

Grypho5 offers managed packages to protect where threat actors strike most. We defend your infrastructure dynamically, leaving you to focus on other priorities.

Arctera

Arctera

Arctera simplifies data management to keep you secure. Our company operates as three units - Data Compliance, Data Resilience, and Data Protection.

Modat

Modat

Modat is an AI-powered, research-driven company focused on developing products and services that enable cybersecurity professionals to outpace adversaries.