TECHNOLOGY > > Resilience


« Back to News

2022-11-23

How to Combat Common Information & Collaboration Security Threats

Cyber Security Enables Business: Every single business is a target and attacks are only going to become more subtle & more frequent. By Onur Özen

2022-11-26

Outsourcing IT Systems & Data Management Can Be A False Economy

Risky Business: In the connected world organisations increasingly rely on outside providers to fulfill their cyber and IT supply chain needs.

2022-12-06

Smartphones Are More Vulnerable Than You Think

Ghost Touch: Most mobile phone users of all ages have a smartphone, although few are aware quite how vulnerable these devices are to attacks.

2022-11-21

Four Reasons You Need RASP Security For Web Applications

Runtime Application Self Protection: RASP is a very flexible and adaptable security solution to protect a diverse range of business applications.

2022-11-21

Shopping Safely Online During Black Friday

Free CISO Toolkit: Guidance on safe online shopping to help CISOs defend employee desktops, laptops, mobile devices & corporate networks.

2022-11-21

Detected - A Hard Matching Vulnerability Which Enables Azure AD Account Takeover

SyncJacking: Attackers can abuse hard matching synchronisation in Azure AD Connect to take over any synchronized account.

2022-11-16

Cybersecurity Awareness: Simple Actions To Dial Up Digital Defences

Cyber Criminals Are Awake 24/7: Hackers never sleep and neither should our defences - vigilance & education are critical in the office and at home.

2022-11-16

The Role of Zero Trust Architecture In Minimising Cyber Risks

The ZTA model creates a far more secure environment that protects against unauthorized access to sensitive data. By Dominik Birgelen

2022-11-16

The Internet Of "vulnerable" Things?

Being Smart And Being Secure Are Not Always The Same: How can we be both hyperconnected and secure? By Sarah Daun & Caroline Churchill 

2022-11-15

Privileged & Protected - Managing Access At The Endpoint

Endpoint Sprawl: Clamping down on privileged administrator rights is vitally important to strengthening security posture. By Andy Harris

2022-11-28

How Poor Password Hygiene Could Unravel Your Business

What you need to know about password theft and how organizations can strengthen their password security protocols. By Muhammad Yahya Patel

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Verisec International

Verisec International

Verisec International AB is a Swedish Tech company focused since inception in enabling Trust in Digital Transactions, through the development of proprietary cutting-edge technologies and services.

Telefonica Tech

Telefonica Tech

Telefónica Cyber Security Tech is focused on the prevention, detection and appropriate response to security incidents aimed at protecting your digital services.

Wilson Sonsini Goodrich & Rosati (WSGR)

Wilson Sonsini Goodrich & Rosati (WSGR)

WSGR is the premier provider of legal services to technology, life sciences, and growth enterprises worldwide. Practice areas include cybersecurity and data protection.

TSUNAMI

TSUNAMI

The TSUNAMi center focuses on software and system security and how trustworthy software can be built from COTS software components.

Howden Broking Group

Howden Broking Group

Howden provides a range of specialist insurance solutions to clients around the world including Cyber Liability insurance.

Haystax Technology

Haystax Technology

Haystax’s security analytics platform applies artificial intelligence techniques to identify and prioritize threats in real time.

Private Internet Access

Private Internet Access

Private Internet Access is a Virtual Private Network services provider offering secure encrypted access to the internet.

TechCERT

TechCERT

TechCERT is Sri Lanka’s first and largest Computer Emergency Readiness Team (CERT).

iON United

iON United

iON United is a full-service IT security solutions provider and one of the most trusted names in cybersecurity in Canada.

Sparrow

Sparrow

Sparrow specializes in application security testing solutions to cope with new technology trends such as cloud, mobile, and DevSecOps.

Sotero

Sotero

Sotero is the first cloud-native, zero trust data security platform that consolidates your entire security stack into one easy-to-manage environment.

Cyber Unit

Cyber Unit

Cyber Unit offer next level protection from cyber attacks in packages and pricing options that are accessible to smaller organizations.

ImagineX Consulting

ImagineX Consulting

ImagineX Consulting is a cybersecurity-focused boutique technology consultancy whose mission is to help our clients #BeBetter by reducing their corporate risk.

ScamAdvisor

ScamAdvisor

ScamAdviser helps over 3 million consumers every month to discover if a website is legitimate or a possible scam.

TDi Technologies

TDi Technologies

TDI Technologies' flagship solution ConsoleWorks, is an IT/OT cybersecurity and operations platform for Privileged Access Users.

AFINE

AFINE

AFINE is a trusted advisor in the field of cybersecurity and pentesting.