TECHNOLOGY > > Resilience


« Back to News

2022-10-21

Under Pressure - Can CISOs Avoid Burnout?

CISOs are concerned about ransomware attacks evolving beyond their team’s knowledge, skills & capabilities. By Mark Guntrip

2022-10-18

Network Security Recommendations Tailored To Your Business

Byos Network Security Maturity Assessment: A free tool that enables companies to rapidly evaluate the strength of their cyber security strategy.   

2022-10-19

Making Cyber Attack Detection Easier With Artificial Intelligence

New AI software tools enable collection of electricity usage data from network devices to detect fluctuations and swiftly identify and stop attacks.

2022-10-14

Legacy Technology is Undermining How Business Responds To Ransomware

Obsolete: Half of UK organisations surveyed depend on outdated, legacy backup and recovery infrastructure to manage & protect their data.

2022-10-14

Microsoft Teams Is Vulnerable To GIFShell Attacks

GIFShell: A new attack technique allows threat actors to exploit Microsoft Teams for phishing attacks and remote data theft using image files.

2022-10-18

Security Patching As A Service

Aunalytics launches its Security Patching Platform, Co-managed Patching As A Service to complement their Advanced Security solution suite.

2022-09-29

How To Outsmart Increasingly Complex Cyber Attacks

Outsourcing elements of security can help organisations reach better security outcomes previously exclusive to large enterprises. By Leyton Jefferies

2022-10-03

Cyber Crime Weaponised: What Business Can Learn From Ukraine

A New Era Of Cyber Warfare: The cyber aspects of the conflict in Ukraine will continue to resonate long after the guns have been silenced.

2022-09-28

Pivoting Customers' Mindsets For Cloud Security

When businesses increase cloud capability and cloud velocity, they often create new risk areas outside their familiarity. By JD Sherry

2022-10-05

Modernising SecOps: It’s Time To Unpick The Complex Matrix

Automation Meets The Human Factor: The rapid evolution of technology produces many more signals for cyber analysts to evaluate. By John Davis

2022-09-30

Why Companies Need A Next-Gen Approach To Business Continuity

IT teams must reevaluate their approach to business continuity to withstand the threats coming at them fast and furious. By Florian Malecki

CyberSecurity Jobsite
Check Point

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

MarQuest

MarQuest

MarQuest provides services and systems to enhance network reliability and security.

DG Technology

DG Technology

DG Technology is a customer-centric technology expert and business consultant that delivers services and products to minimize your information security, compliance, and business risks.

Cyber DriveWare

Cyber DriveWare

DriveWare analyzes new traffic in the I/O layer and blocks malware and cyber attacks which organizations have no means to protect against.

Cyber Discovery

Cyber Discovery

Cyber Discovery, the UK Government's Cyber Schools Programme, is a learning programme designed to give young people the opportunity to learn the skills needed to enter the cyber security profession.

Riddle&Code

Riddle&Code

Riddle&Code is a product-led services company specializing in onboarding industries to Web3. The team's mission is to provide a trusted connection between the digital and physical worlds.

Blockchains LLC

Blockchains LLC

Blockchains is committed to changing the world for the better. Using blockchain and other innovative technologies, we’ll build new systems, new security, and new interactions.

Knovos

Knovos

Knovos is a leading technology innovator developing solutions for automating, integrating, and innovating Information Governance.

Aries Security

Aries Security

Aries Security provides a premiere cyber training range and skills assessment suite and develops content for all levels of ability.

Satori Cyber

Satori Cyber

The Satori Cyber Secure Data Access Cloud is the first solution on the market to offer continuous visibility and granular control for data flows across all cloud and hybrid data stores.

1Password

1Password

1Password combines industry-leading security with award-winning design to bring private, secure, and user-friendly password management to everyone.

Analog Devices Inc (ADI)

Analog Devices Inc (ADI)

Analog Devices is uniquely positioned to deliver security at the edge, where the data is born, because our sensor solutions convert the physical, analog world into the digital world.

PixelQA

PixelQA

Are you looking for a security testing company to cross-check whether your software or mobile app has a possible security threat or not?

Scope AI

Scope AI

Scope AI is an innovative technology company specializing in quantum security and machine learning.

Yokai

Yokai

Yokai is a secure, distributed platform for data communication with enhanced security features tailored for classified environments such as finance, defence, healthcare, cybersecurity, and more.

Dial A Geek

Dial A Geek

Dial A Geek are a Bristol-based B Corp that provides Managed IT Services to companies of 20+ users. We help businesses with a smart use of tech, including compliance and cybersecurity solutions.

Cyber Castellum

Cyber Castellum

Cyber Castellum is a cybersecurity consulting firm that specializes in the identification of security vulnerabilities in an organization’s technology landscape.