TECHNOLOGY > > Resilience


« Back to News

2022-11-21

Four Reasons You Need RASP Security For Web Applications

Runtime Application Self Protection: RASP is a very flexible and adaptable security solution to protect a diverse range of business applications.

2022-11-21

Shopping Safely Online During Black Friday

Free CISO Toolkit: Guidance on safe online shopping to help CISOs defend employee desktops, laptops, mobile devices & corporate networks.

2022-11-21

Detected - A Hard Matching Vulnerability Which Enables Azure AD Account Takeover

SyncJacking: Attackers can abuse hard matching synchronisation in Azure AD Connect to take over any synchronized account.

2022-11-16

Cybersecurity Awareness: Simple Actions To Dial Up Digital Defences

Cyber Criminals Are Awake 24/7: Hackers never sleep and neither should our defences - vigilance & education are critical in the office and at home.

2022-11-16

The Role of Zero Trust Architecture In Minimising Cyber Risks

The ZTA model creates a far more secure environment that protects against unauthorized access to sensitive data. By Dominik Birgelen

2022-11-16

The Internet Of "vulnerable" Things?

Being Smart And Being Secure Are Not Always The Same: How can we be both hyperconnected and secure? By Sarah Daun & Caroline Churchill 

2022-11-15

Privileged & Protected - Managing Access At The Endpoint

Endpoint Sprawl: Clamping down on privileged administrator rights is vitally important to strengthening security posture. By Andy Harris

2022-11-28

How Poor Password Hygiene Could Unravel Your Business

What you need to know about password theft and how organizations can strengthen their password security protocols. By Muhammad Yahya Patel

2022-11-14

International Fraud Awareness Week: Every Individual Has A Part to Play

International Fraud Week: As we come into a busy shopping period the cyber experts at McAfee urge consumers to re-evaluate their online habits.

2022-11-14

Why Are Businesses Still Falling Victim To Ransomware?

Industry expert and ex-FBI cyber crime Special Agent Jason Manar, now CISO at Kaseya, answers the key questions for business leaders.

2022-11-09

The Reality Check For Small & Medium Businesses

Ransomware: Few small & medium sized businesses realize they are just as much at risk as much larger enterprises. By Muhammad Yahya Patel

CyberSecurity Jobsite
Check Point

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Lacuna Talent

Lacuna Talent

Lacuna Talent delivers the combined power of Via Resource, the international Cyber Security recruiter, and Lacuna Talent, the Specialist AI/Data recruiter.

Centre for International Governance Innovation (CIGI)

Centre for International Governance Innovation (CIGI)

CIGI research areas include Conflict Management & Security which encompass cyber security and cyber warfare.

Evidian

Evidian

Evidian, a Bull Group company, is the European leader and one of the major worldwide vendors of identity and access management software.

Canadian Centre for Cyber Security (CCCS)

Canadian Centre for Cyber Security (CCCS)

The Cyber Centre is the single unified source of expert advice, guidance, services and support on cyber security for government, critical infrastructure, the private sector and the public.

Eustema

Eustema

Eustema designs and manages ICT solutions for medium and large organizations.

Blockchain Slovakia

Blockchain Slovakia

Blockchain Slovakia is a non-profit organization that brings together researchers, developers, entrepreneurs, regulators, investors and the public to support blockchain technology in Slovakia.

Deep Mirror Automotive Cybersecurity

Deep Mirror Automotive Cybersecurity

Deep Mirror Automotive Cybersecurity make Cars & Infrastructures Cybersecure.

Security Engineered Machinery (SEM)

Security Engineered Machinery (SEM)

SEM provides comprehensive end-of-life solutions for the protection of sensitive information in government and commercial markets.

CyberWhite

CyberWhite

CyberWhite is a disruptive provider of cyber security and risk mitigation solutions.

CyberGuard Technologies

CyberGuard Technologies

CyberGuard Technologies provides a suite of fully managed end-to-end security services from its 24/7 UK security operations centre.

MyCena

MyCena

MyCena has developed a complete system of security, control and management for decentralised credentials.

TWC IT Solutions

TWC IT Solutions

Since 2011, TWC IT Solutions has offered managed IT Support, Cybersecurity, Disaster Recovery, Contact Centre and Business Connectivity services to clients across 24 countries globally.

Phronesis Security

Phronesis Security

Phronesis Security is committed to delivering world-class cyber security consulting with a tangible social and environmental impact.

Saffron Networks

Saffron Networks

Saffron Networks is an ISO-certified company. We assure our clients of reliable solutions, specifically with the Security landscape and Enterprise Networking.

DHCO IT

DHCO IT

The DHCO IT team are experts in IT support, cyber security, cloud support and disaster recovery, and are Microsoft 365 partners.

Deimos

Deimos

Deimos is a technology, cloud, hybrid and multi-cloud focused, professional services company. Our expertise and focus is on cloud native Developer and Security Operations.