TECHNOLOGY > > Resilience


« Back to News

2021-06-02

Cyber Security: Its Good To Talk

Cyber security is all about the human factor and being transparent about mistakes can help your organisation's people learn to stay safe online.

2021-06-01

Preventing Ransomware Attacks

The chances of ransomware infection can be significantly reduced by security software and by paying sufficient attention to some basic rules.

2021-05-31

Get The Best Cyber Security Audits & Training

Organisations often invest heavily in cyber security technology, but they don’t spend enough time on training, audit and the vital human factor.

2021-05-31

Missing Patches Place Security At Risk

Public sector security professionals admit that one in three UK breaches result from vulnerabilities that they should have already patched.

2021-05-28

Managing A Remote Team To Protect Against Cyber Attacks

Many more organisations are adopting remote working, but how can they manage a remote team while prioritizing cybersecurity? By Chioma Iwunze

2021-05-18

The Role Of Enterprise Architecture In Cyber Defence

Learning the lessons from the unprecedented SolarWinds attack and the role that Enterprise Architecture has to play. By Rupert Colbourne

2021-05-17

Responding To Ransomware Attacks

Ransomware attacks on business are becoming much more frequent and severe. The victims can be too paralysed to make an effective response.

2021-05-13

Stop Taking Risks Online

Here are seven risky online habits you should stop right now, plus advice on better habits that can help keep you and your family safe online.

2021-05-08

Writing An Effective Cybersecurity Policy: 5 Essential Steps

How to compile an effective operational cybersecurity policy that will make life easier in the event of a security breach. By Jessica Fender

2021-05-11

Cyber Security Shared Skills Group Created

Members will gain from actionable intelligence and tactics to improve their defensive strategies for a more resilient cyber security infrastructure.

2021-05-06

Key Trends In Cyber Security

Along with the change in many people's work environment in 2020, there are several rising trends companies need to be aware of in 2021.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Rapid7

Rapid7

Rapid7 unites cloud risk management and threat detection to deliver results that secure your business and ensure you’re always ready for what comes next.

SOTI

SOTI

SOTI is an industry leader in Enterprise Mobility Management (EMM).

Flashpoint

Flashpoint

Flashpoint is a globally trusted leader in risk intelligence for organizations that demand the fastest, most comprehensive coverage of threatening activity on the internet.

Akheros

Akheros

Akheros develops cybersecurity learning algorithms which anticipate, detect and prevent offensive and incongruous behaviors of M2M interactions.

Entrust

Entrust

Entrust is a global leader in digital security, identities, payments, and data protection.

Fornetix

Fornetix

Fornetix is a cybersecurity platform enabling Zero Trust while delivering critical encryption automation, access controls, authorization services, machine identity, and ICAM solutions,

Pentagon Group

Pentagon Group

Pentagon Group is a provider of security services in high-risk environments, remote areas and emerging markets in support of land-based, aviation, maritime and cyber operations.

redGuardian

redGuardian

redGuardian is a DDoS mitigation solution available both as a BGP-based service and as an on-premise platform.

Data Destruction London

Data Destruction London

Data Destruction London offers fast, confidential and compliant expert data destruction services to businesses and organisations in London.

Hold Security

Hold Security

Hold Security works with companies of all sizes to provide unparalleled Threat Intelligence services that actually make a difference.

Valarian

Valarian

Valarian (formerly Worldr) is on a mission to build cutting-edge solutions that empower borderless collaboration in the new era of digital sovereignty.

Trenton Systems

Trenton Systems

Trenton Systems are committed to providing high-performance computing solutions to customers running mission-critical applications in harsh settings worldwide and across various industries.

AVEVA

AVEVA

AVEVA has a long history in providing Supervisory Control and Data Acquisition software for meeting complex and evolving automation requirements.

ZEUSS

ZEUSS

ZEUSS is a diversified data center, cybersecurity, and green energy company.

Systems Engineering

Systems Engineering

Systems Engineering is a SOC 2, Type 2-certified IT strategy and managed technology services provider.

QFunction

QFunction

QFunction works within your existing security stack to detect anomalies and threats within your data.