TECHNOLOGY > > Resilience


« Back to News

2022-12-30

Critical Infrastructure: A Flashing Beacon For Cybercrime

Cybercriminals are fully aware of the impact of disruption on vital services, not just financially, but on public confidence. By Deryck Mitchelson

2022-12-27

Preventing Insider Threats In Kubernetes Clusters

Secure Your Kubernetes Clusters From Inside Threats. The basics of insider threats and how to prevent it in Kubernetes. By Gilad David Mayaan

2022-12-22

Britain’s Free Cyber Security Service

Email Security Check: A new service to help organisations identify vulnerabilities that can let hackers spoof emails or create email privacy breaches.

2022-12-21

Reduce Vulnerabilities & Defend Your Brand Against DDoS Attacks

As network architecture evolves, so do DDoS attacks, exposing networks to vulnerabilities in critical applications & processes. By Paul McNamara

2022-12-27

Deploying NDR To Transform Threat Detection

Network Detection & Response (NDR) is a powerful solution to help cybersecurity teams detect more and respond faster to threats. By Kev Eley

2022-12-19

Ways Governments Can Better Protect Public Data

For hackers, local and national governments are seen as easy targets - they must dedicate themselves to improving cyber security. By Florian Malecki

2022-12-19

Under A Watchful Eye - Unified Observability

Tracking Vulnerabilities: A proper overview of the entire tech stack is vital to anticipate and to protect against security issues. By Matt Tuson

2022-12-13

Misconfigured Cloud Applications Are Putting Your Data At Risk

Shared Responsibility: When it comes to cloud applications, there’s no such thing as “security that is 100% handled by the vendor.” By Manuel Sanchez

2022-12-12

The Role Of Policies In Driving ‘Secured Productivity’

Delivering A Strong Security & Privacy Policy: Effective information security & data protection policy is a basic business need. By Scott Richardson

2022-12-07

Resilience Is Essential To Protecting Critical Infrastructure

Risks Of Blackout: Geopolitical tensions are placing pressure on Britain's energy supply, requiring a robust defence to cyber threats By Simon West

2022-12-09

Proactive Security Tips For Your Business After A Security Breach

Has your business fallen victim to a security breach? Consider the benefits of these security tips, tools & technologies to refortify your security.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Cyber Risk Policies

Cyber Risk Policies

CyberRiskPolicy.com is a joint venture between the Poindexter Surety Group of companies and Gibbs Cyber Security.

Ezenta

Ezenta

Ezenta is a Danish IT security consulting firm.

Netteam

Netteam

Netteam designs, implements and services networking solutions for companies of all sizes.

GraVoc

GraVoc

GraVoc is a technology-consulting firm committed to solving business problems for customers through the development, implementation, & support of technology-based solutions.

Cybertonica

Cybertonica

Cybertonica is a FinTech company which detects and prevents fraudulent transactions and reduces risk for financial services organisations.

CSIRT Italia

CSIRT Italia

CSIRT Italia is the national Computer Security Incident Response Team for Italy.

Xilinx

Xilinx

Xilinx is the inventor of the FPGA, programmable SoCs, and now, the ACAP. We are building the Adaptable, Intelligent World.

Texas A&M Cybersecurity Center

Texas A&M Cybersecurity Center

Texas A&M Cybersecurity Center is dedicated to combating adversaries who desire to harm our citizens, our government, and our industry through cyber-attacks.

Gridware

Gridware

Gridware is a specialised cybersecurity consultancy firm and an emerging global player in the cybersecurity intelligence and advisory field.

Aiden Technologies

Aiden Technologies

Aiden simplifies your IT process, giving you peace of mind and security by ensuring your computers get exactly the software they need and nothing else.

Network Contagion Research Institute (NCRI)

Network Contagion Research Institute (NCRI)

NCRI provides pioneering technology, research, and analysis to identify and forecast cyber-social threats targeting individuals, organizations, and communities.

DarkFeed

DarkFeed

DarkFeed is a Threat Intelligence provider that monitors the darknet in real-time, where hackers and Cyber criminals are most active.

Muscope Cybersecurity

Muscope Cybersecurity

Muscope CYSR platform performs a risk assessment and offers a comprehensive overview of the potential cyber attack risks.

ImagineX Consulting

ImagineX Consulting

ImagineX Consulting is a cybersecurity-focused boutique technology consultancy whose mission is to help our clients #BeBetter by reducing their corporate risk.

2021.AI

2021.AI

2021.AI serves the growing business need for full oversight and management of applied AI.

Start-Up Chile (SUP)

Start-Up Chile (SUP)

Start-Up Chile is a business accelerator program created by the Chilean Government for high-potential tech entrepreneurs.