TECHNOLOGY > > Resilience


« Back to News

2018-01-08

GDPR Compliance & Personal Data Protection

GDPR is a fantastic opportunity to get your in-house policies, systems & technologies into shape, demonstrating compliance inside the deadline.

2018-01-09

UK Police Give Cybercrime Warning

Hard drives stacked up waiting for analysis as cybercrime victims in N. Ireland face delays in police support as resources come under pressure.

2017-12-20

Digital Risks Are Changing And CSOs Must Adapt

CSOs must expand their reach to not only monitor tangible risks, but also address the uninsured risks that live in the digital world.

2017-12-05

Staff Training Is Important But Does Not Reduce Cyber Risk

The human is the weakest link in cybersecurity and the answer is not more training. It is not to trust humans in the first place.

2017-12-05

Cybersecurity Firms Deploy AI Against Hackers

AI can detect threats at an early stage before too much damage has been done and there is no need for humans to defend networks from many attacks.

2017-11-30

Replaying Crime Scenes With An Advanced Scanner

Canadian police forces use a forensic laser scanner capable of detecting the tiniest of details and recreate collisions and crime scenes in 3D.

2017-11-27

Who's Responsible For Cloud Security?

While the cloud brings benefits, security remains a particular area of concern for US government agencies and it’s not always clear who’s in charge.

2017-11-22

A Response Solution to Cyber Attacks

Verint has a cyber security solution designed for customers with large security operations centre which uses data mining software.

2017-11-16

Cybersecurity Training Isn’t The Complete Solution

Cyber security training firms continue to stress the importance of educating employees in order to minimise the risk of cyber threats. Why bother?

2017-11-13

Businesses Get Better At Detecting Insider Threats

The cybersecurity threat to companies from their own employees account for 42% of incidents and is growing.

2017-10-09

A 9-Step Guide For GDPR Compliance

In May 2018, the General Data Privacy Regulation will take effect, significantly altering the way organisations handle and store data. Be prepared.

Quartz Conference
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / Zero Trust Network Access Guide

Perimeter 81 / Zero Trust Network Access Guide

Curious how you can Implement a Zero Trust roadmap with insights from Gartner? Download this free report for a limited time only.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Check Point Software Technologies

Check Point Software Technologies

Check Point Software Technologies is a leading provider of cyber security solutions to governments and corporate enterprises globally.

CROW - University of Waikato

CROW - University of Waikato

CROW is the first cyber security lab established in a New Zealand educational institution at the University of Waikato.

International Fraternity of Cybercrime Investigators (IFCI)

International Fraternity of Cybercrime Investigators (IFCI)

IFCI provides expert training and certification in Computer Forensics, Network Intrusion & Data Breach Analysis; Malware Analysis; Cyber Threat Intelligence.

PFP Cybersecurity

PFP Cybersecurity

PFP provides a SaaS solution for life-cycle protection based on our IoT security platform and power usage analytics.

HYAS Infosec

HYAS Infosec

HYAS is a highly skilled information security firm developing the next generation of information security technology.

Meiya Pico Information Co

Meiya Pico Information Co

Meiya Pico is the leading digital forensics and information security products and service provider in China.

Sapien Cyber

Sapien Cyber

Sapien Cyber is an Australian company bringing leading-edge cyber security and threat intelligence solutions.

GulfTalent

GulfTalent

GulfTalent is the leading job site for professionals in the Middle East and Gulf region covering all sectors and job categories, including cybersecurity.

CHEQ

CHEQ

CHEQ provides fully autonomous, preemptive technology for brand safety and ad-fraud prevention.

AppOmni

AppOmni

AppOmni is the only SaaS CSPM solution that gives teams all the tools they need to be successful – from security posture management to monitoring and detection to continuous compliance.

Qasky

Qasky

Anhui Qasky Quantum Technology Co. Ltd. (Qasky) is a new high-tech enterprise engaged in quantum information technology industrialization in China.

Corellium

Corellium

Corellium are dedicated to supporting our peers in the ARM community who seek to build more secure, performant, and accessible software and devices.

IDX

IDX

IDX is the leading consumer privacy platform built for agility in the digital age.

ARIA Cybersecurity Solutions

ARIA Cybersecurity Solutions

The ARIA ADR Automatic Detection & Response solution was designed to find, verify, and stop all types of attacks - automatically and in real time.

Eureka Security

Eureka Security

Eureka help organizations securely use any cloud data storage technology they need without having to compromise on security.

BaXian Group

BaXian Group

BaXian AG is an international consulting company specializing in IT security, data analytics, risk management and compliance.