TECHNOLOGY > > Resilience


« Back to News

2023-12-06

Cyber Criminals Go Phishing

Phishing Trends Examined: Understanding the different types of phishing threats your organisation will encounter is crucial for network defence.

2023-12-05

The OSI Model's Role In Building A Secure Network Architecture

Open Systems Interconnection: An intuitive way of examining network operations, which makes it easier to resolve issues affecting network protocols.

2023-11-27

Securing National Communications Infrastructure

Digital Connections: Network disaggregation is vital to protecting critical telecoms infrastructure against external threats. By Richard Brandon

2023-11-24

Intelligent Automation & AI Can Improve Business Resilience

Combined with human intelligence, AI can improve business resilience and a failure to invest risks business efficiency & reputation. By Scott Dodds

2023-11-23

What Is Cyber Hygiene & Why Is It Important?

Too many organisations are failing to practice good cyber hygiene. Companies must adapt & take steps to mitigate risk. By Rigo Van den Broeck

2023-11-21

Serious Threats To Britain's Critical Infrastructure

The NCSC warns of the significant threat posed by hostile states and their affiliates to essential services that the country relies on every day.

2023-11-20

Best Practices For Securing Enterprise IoT Devices

Most users leave their credentials on IoT devices, which exposes them to attackers. These are the best practices for securing their cybersecurity.

2023-11-17

Mid-market Organisations At Greater Risk

As large organisations grow more resilient, smaller mid-sized organisations must prioritise attack disruption as cyber-threats evolve. By Tim Anderson

2023-11-18

Mitigating The Security Risks Of Black Friday 

Online data transfers significantly rise during Black Friday as consumers search for bargains, providing rich opportunities for cybercriminals.

2023-11-13

API Security Is A Critical Boardroom Issue

Application Programming Interfaces are in such widespread use that their security must be considered a fundamental requirement. By Gal Helemski

2023-11-08

Time To Get Serious About Defence

Once sensitive data has been stolen its confidentiality is lost forever - that’s why a proactive approach is so important. By Gavin Millard

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

WEBINAR: 2024 and Beyond: Top Six Cloud Security Trends

WEBINAR: 2024 and Beyond: Top Six Cloud Security Trends

April 4, 2024 | 11:00 AM PT: Join this webinar to find out about six emerging trends dominating the cloud cybersecurity landscape.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

RoboForm

RoboForm

RoboForm's industry-leading encryption technology securely stores your passwords, with one Master Password serving as your encryption key.

Mimecast

Mimecast

Mimecast delivers cloud-based email management for Microsoft Exchange and Microsoft Office 365 including archiving, continuity and security.

Bounga Informatics

Bounga Informatics

Bounga Informatics provides Digital Forensics, E-Discovery, and Endpoint Security software, hardware, and training in Singapore and other countries in Asia Pacific.

Council for Information & Communication Technologies (CTIC)

Council for Information & Communication Technologies (CTIC)

CTIC was set up to address specific issues in the field of ICT relevant to the implementation of electronic government.

Cyber Police of Ukraine

Cyber Police of Ukraine

Cyber Police of Ukraine is a law enforcement agency within the the Ministry of Internal Affairs of Ukraine dedicated to combating cyber crime.

Risk Based Security (RBS)

Risk Based Security (RBS)

Risk Based Security provide the most comprehensive and timely vulnerability intelligence, breach data and risk ratings.

McIntyre Associates

McIntyre Associates

McIntyre Associates is an Executive Search boutique specialized in recruiting for the Cybersecurity industry. Our clients range from Venture Capital backed startups to Fortune 100 companies.

NeuShield

NeuShield

NeuShield is the only anti-ransomware technology that can recover your damaged data from malicious software attacks without a backup.

Nu Quantum

Nu Quantum

Nu Quantum is developing quantum photonics hardware to power the quantum revolution in communications, sensing and computing.

Lifetech

Lifetech

Lifetech is a software development, product engineering and system integration company. Cybersecurity services include SIEM deployment and training.

Apptega

Apptega

Apptega is an award-Winning Cybersecurity and Compliance Platform. Our mission is to make cybersecurity and compliance easy for everyone.

Nexon Asia Pacific

Nexon Asia Pacific

Nexon solutions include cloud infrastructure and services, unified communications, managed security services, business continuity, secured high-performance network and business applications.

6clicks

6clicks

6clicks is an easy way to implement your risk and compliance program or achieve compliance with ISO 27001, SOC 2, PCI-DSS, HIPAA, NIST, FedRAMP and many other standards.

Anterix

Anterix

Anterix is focused on empowering the modernization of critical infrastructure and enterprise businesses by enabling private broadband connectivity.

SK Shieldus

SK Shieldus

SK shieldus are a converged security provider with business capabilities in both cybersecurity and physical security based on Big-Tech.

IDECSI

IDECSI

IDECSI delivers cutting-edge technology and engages all employees in the security system for effective and cost-efficient data protection.