TECHNOLOGY > > Resilience


« Back to News

2025-05-28

Failure Happens, But Recovery Can Be Managed Intelligently

Better resilience & response to disruption requires equal parts critical thinking, culture, and practice, as much as technology. By Eduardo Crespo

2025-05-26

The Future Of Passwords In Retail

Cyber criminals know passwords are a weak-link they can exploit. Retailers must take action to prevent themselves falling victim. By Doriel Abrahams

2025-05-16

Examining The NIS2 Directive From Outside The EU

The EU Network & Information Systems Directive 2: Its strengths, weaknesses, and a possible alternative path for the UK. By Notis Iliopoulos

2025-05-27

Financial Services Institutions Must Protect Themselves From Downtime

The impact of downtime is estimated to cost financial services institutions over $152 million annually around the world. By Bhooshan Thakar

2025-05-15

Evolving The CISO Role

Navigating Modern Cyber Threats: The CISO's ability to influence and lead will be pivotal in shaping a resilient & secure future. By Joe Hubback

2025-05-14

The Growing Ransomware Crisis

Business Reality: Cyber attacks have cost UK companies £44 billion in lost revenue over the past five years and have affected around 52% of firms. 

2025-05-14

Cyber Attacks Are Threatening The Survival Of Small Business

An Existential Threat: SMBs must take proactive steps to protect themselves, because the cost of inaction may be too great to recover from.

2025-05-14

The CVE Funding Crisis Is A Wake-Up Call For Cyber Resilience

If the CVE ecosystem falters, enterprises must ensure that asset visibility, vulnerability context, & response workflows don’t stop. By Ryan Knisley

2025-05-13

Are Student Laptops A Security Risk?

The Hidden Dangers Of Malware On Campus: Today's threats are as mobile and diverse as the devices students bring to campus.

2025-05-12

Reimagining Cybersecurity In The Age Of Organised Threats

Imagine an operating model where businesses, governments & critical infrastructure providers deal with cyber attacks collectively. By Dan Bridges

2025-05-12

Anti-Ransomware Day 2025

Expert Advice: Anti-Ransomware Day on 12th May is an opportunity to reframe resilience as a priority for every person, department and supplier.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

National Cyber Security Centre (NKSC) - Lithuania

National Cyber Security Centre (NKSC) - Lithuania

NKSC is the main Lithuanian cyber security institution, responsible for unified management of cyber incidents, monitoring and control of the implementation of cyber security requirements.

Apicrypt

Apicrypt

Apicrypt enables secure communications between health professionals by using strong encryption technologies.

Dcoya

Dcoya

Dcoya's complete security awareness training program gives you out-of-the-box compliance with PCI-DSS, HIPAA, SOX and ISO regulations.

InnoSec

InnoSec

InnoSec is a software manufacturer of cyber risk management technology.

The Open Group

The Open Group

The Open Group: Leading the development of open, vendor-neutral IT standards and certifications.

Cyacomb

Cyacomb

Cyacomb (formerly Cyan Forensics) provides digital forensics software to help police forces find evidence on computers many times faster than before.

Travelers

Travelers

Travelers is a leading writer of US commercial property casualty insurance and one of the world’s largest global insurers for cyber insurance.

Monster Jobs

Monster Jobs

Monster is a global leader in connecting people to jobs, wherever they are. Monster covers all job sectors including cybersecurity in locations around the world.

CyberKnight Technologies

CyberKnight Technologies

CyberKnight Technologies is a cybersecurity focused value-added-distributor (VAD) headquartered in Dubai and covering the Middle East.

Peraton

Peraton

Peraton provides innovative solutions for the most sensitive and critical programs in government today, developed and executed by scientists, engineers, and other experts.

BT Security

BT Security

BT provides telecommunications and network infrastructure services to keep businesses around the world connected and secure.

Green Enterprise Solutions

Green Enterprise Solutions

Green Enterprise Solutions are a Namibian company providing Information and Communication Technology (ICT) services to corporate Namibia.

Hexens

Hexens

Hexens introduces a whole new approach to cybersecurity solutions. Indisputable skills and a unique super-focused perspective on every single case are the values we create.

TOTM Technologies

TOTM Technologies

TOTM Technologies provides end-to-end identity management and biometrics products, powering Digital identity and Digital onboarding solutions.

Arelion

Arelion

Arelion is a leading light in global connectivity and we've been keeping the world connected for nearly three decades.

Olympix

Olympix

Dev-first Web3 security that starts at the source. Olympix is a pioneering DevSecOps tool that puts security in the hands of the developer by proactively securing code from day one.