TECHNOLOGY > > Resilience


« Back to News

2022-09-22

Even Air-Gapped Computers Are Vulnerable To Attack

LaserShark: Computer systems that are physically isolated from the outside world (air-gapped) can still be attacked via optical channels.

2022-09-21

Why Domain Protection Is A Key Pillar Of Cybersecurity

Protecting Domain Names Is Vitally Important: Homograph 'look alike' attacks are one of the major challenges in cyber security. By Brian Lonergan

2022-09-17

A New Supply Chain Security Solution

Organisations of any size are enabled to collaborate on and share data in near real-time, confident in the trustworthiness of that data.

2022-09-19

CISA's Threat Intelligence Program Was Defective

Contextual Information: CISA's threat intelligence advice for US federal agencies is criticised for lacking sufficient actionable detail.

2022-09-16

Containers Are Temporary, But Container Data Is Not

Keep A Lid on It: Containerisation has benefits for application development. It also holds challenges for data backup & recovery. By Florian Malecki

2022-09-15

Three Simple Steps To Effective Cybersecurity

Left, Right & Up: Three key steps that all organisations should follow if they are to ensure effective cybersecurity protection. By Allen Downs

2022-09-15

Using SAST To Prevent Zero Day Vulnerabilities

Static Application Security Testing: SAST solutions are widely agreed to be an important part of a secure software development lifecycle.

2022-09-15

Five Cloud Security Mistakes Your Business Should Avoid

Cloud security is crucial to your company’s data safety. Familiarize yourself with these cloud security mistakes that your business should avoid.

2022-09-14

Securing Hybrid Identity

Active Directory: Hybrid environments are prone to errors & misconfigurations that leave the door wide open to cyber attacks. By Guido Grillenmeier 

2022-09-12

The Top 4 Cyber Threats - Is Your Business Protected?

Is it possible for businesses to really be protected? Absolutely – if organisations give cyber security the attention it deserves. By Keiron Holyome

2022-09-08

Locking Down Cyber Security

Managing The Basics: Educating employees and partnering with the right cyber security technology providers will empower them to lock criminals out.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

CDW

CDW

CDW is a leading multi-brand provider of information technology solutions to business, government, education and healthcare customers in the United States, the United Kingdom and Canada.

Secure Technology Alliance

Secure Technology Alliance

Secure Technology Alliance is a multi-industry association working to stimulate the adoption and widespread application of secure solutions.

ENVEIL

ENVEIL

ENVEIL’s technology is the first scalable commercial solution to cryptographically secure Data in Use.

Identify Security Software

Identify Security Software

Our mission is to bring in a new age of autonomous human authentication in the security and identity space.

Applied Risk

Applied Risk

Applied Risk is an established leader in Industrial Control Systems security, focused on critical infrastructure security and combating security breaches that pose a significant threat.

Bio-Morphis

Bio-Morphis

Bio-Morphis Reflex solution is a paradigm shift in the approach to information systems security.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

MythX

MythX

MythX is the premier security analysis service for Ethereum smart contracts.

Tehtris

Tehtris

TEHTRIS XDR Platform was developed to control and improve the IT security of private and public companies against advanced cyber threats such as cyber espionage or cyber sabotage activities.

RapidScale

RapidScale

RapidScale’s managed cloud solutions provide reliable, innovative, and secure services, all complete with white-glove service and full management options.

01 Communique Laboratory

01 Communique Laboratory

01 Communique Laboratory is an innovation leader in the new realm of Post-Quantum Cyber Security.

Cyber Coaching

Cyber Coaching

Cyber Coaching is a community for enhancing technical cyber skills, through unofficial certification training, cyber mentorship, and personalised occupational transition programs.

Island

Island

Island puts the enterprise in complete control of the browser, delivering a level of governance, visibility, and productivity that simply weren’t possible before.

NPCERT

NPCERT

NPCERT is a team of Information Security experts formed to address the urgent need for the protection of national information and growing cybersecurity threat in Nepal.

Tanzania Industrial Research and Development Organization (TIRDO)

Tanzania Industrial Research and Development Organization (TIRDO)

TIRDO is a multi-disciplinary research and development organization.

Visernic

Visernic

VISERNIC is a cyber security firm with a team of certified security experts dedicated to protecting organizations from evolving cyber threats.