TECHNOLOGY > > Resilience


« Back to News

2016-03-28

Cybersecurity Training, Military Style

Cybersecurity-training programs modeled on military tactics are making their way to the private sector.

2016-03-09

Reduce Risk With Threat Intelligence

Do you want to be more proactive in managing risk? What is the risk if you don’t pay attention to knowledge learned from previous events?

2016-03-02

Big Data & Predictive Analytics Can Identify Cyber Risks

Using predictive indicators to detect the unknown risk is incredibly challenging but, properly used, big data can solve big business problems.

2016-02-24

Cyber Risk Insurance Is A Patchwork

Use of cyber-specific wording and products may be an effective way of filling gaps of cover which exist in conventional lines of insurance.

2016-02-26

Cybersecurity To Go On The Offensive

Organizations with a sophisticated approach to cybersecurity are no longer satisfied with locking the doors after the robbery has been committed.

2016-02-10

How to Recover From The Hack Nightmare

It’s more than just the PR department’s “problem.” IT executives need to be involved in managing the fallout and crafting responses.

2016-02-02

90% of Data Breaches Are Avoidable

Nine of every ten data breaches in 2015 could have been “easily prevented,” according to a study by The Online Trust Association.

2016-02-01

Lloyd’s Insurer Says Cyber Risks Are Too Big to Cover

The head of the largest of Lloyd’s of London insurers says the potential liabilities from risks of cyber attack are too large to cover.

2016-01-25

World Economic Forum Says Cyber-attack Is A Top Risk To Business.

In 140 economies cyber-attacks rank in the top ten threats in 2016.

2016-01-13

Predictive Analytics Tools Confront Insider Threats

Advanced data analytic technology can give analysts an advantage in finding insider threats.

Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Cylance Smart Antivirus

Cylance Smart Antivirus

An antivirus that works smarter, not harder, from BlackBerry. Lightweight, non-intrusive protection powered by artificial intelligence. BUY NOW - LIMITED DISCOUNT OFFER.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Free Access: Cyber Security Supplier Directory listing 5,000+ specialist service providers.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

DigitalStakeout

DigitalStakeout

A simple and cost-effective solution to monitor, investigate and analyze data from the web, social media and cyber sources to identify threats and make better security decisions.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Perimeter 81

Perimeter 81

Perimeter 81 is a Zero Trust Network as a Service designed to simplify secure network, cloud and application access for the modern and distributed workforce.

Acuity Risk Management

Acuity Risk Management

Acuity Risk Management helps businesses worldwide effectively manage, prioritize and report on their risks to inform strategic and tactical decision-making and build long-term resilience.

Oodrive

Oodrive

Oodrive is a European leader in sensitive data management.

qSkills

qSkills

QSkills is an independent training provider specialized high-quality IT and IT management training courses including IT security.

Niksun

Niksun

Niksun's forensics-based cyber security and network performance monitoring products provide customers with actionable insight into security threats, performance issues, and compliance risks.

ReFoMa

ReFoMa

ReFoMa is a consultancy and advisory company with a focus on information Security.

Blockchain Formula

Blockchain Formula

Blockchain Formula are leaders in Blockchain Application Development. Our services have led clients around the globe in innovating blockchain networks and solutions.

HackHunter

HackHunter

HackHunter’s passive sensor network continuously monitors, detects and alerts when a malicious WiFi network and/or hacking behaviour is identified.

ISARR

ISARR

The ISARR software platform - your bespoke Risk, Resilience & Security Management solution. Simple, cost effective and adaptable, now and into the future.