TECHNOLOGY > > Resilience


« Back to News

2021-05-17

Responding To Ransomware Attacks

Ransomware attacks on business are becoming much more frequent and severe. The victims can be too paralysed to make an effective response.

2021-05-13

Stop Taking Risks Online

Here are seven risky online habits you should stop right now, plus advice on better habits that can help keep you and your family safe online.

2021-05-08

Writing An Effective Cybersecurity Policy: 5 Essential Steps

How to compile an effective operational cybersecurity policy that will make life easier in the event of a security breach. By Jessica Fender

2021-05-11

Cyber Security Shared Skills Group Created

Members will gain from actionable intelligence and tactics to improve their defensive strategies for a more resilient cyber security infrastructure.

2021-05-06

Key Trends In Cyber Security

Along with the change in many people's work environment in 2020, there are several rising trends companies need to be aware of in 2021.

2021-05-06

Securing Smart Devices

Data centers may be safe from outside intrusion, but IoT devices are often at risk of being exploited by those looking for an easier way into systems.

2021-05-06

Top Five Most Common Gaps In Businesses’ Cyber Security

Embedding cyber security into your operations takes everyone in the organisation to understand and accept their responsibility. By Victor Lough

2021-05-05

Your Organisation Needs A Cyber Audit

Cyber threats evolve at breakneck speed and it’s important to continually ensure that your cyber security measures are effective and up to date.

2021-05-05

The Cyber Security Paradigm Is Changing

Traditional cyber security, with hard external boundaries, is being undermined by pressure for more operational flexibility and developments in IT.

2021-05-04

Managing Cyber Security As Office Work Resumes

Cyber security and compliance teams must begin the return-to-office planning process so that when employees arrive, everyone is prepared.

2021-05-04

World Password Day - 6th May

World Password Day exists to spread the awareness that taking care of your passwords is vital to protecting yourself against identity theft.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ADF Solutions

ADF Solutions

ADF Solutions is a leading provider of digital forensic and media storage exploitation tools.

Logscape

Logscape

Logscape provides a big data analytical tool for log file analysis and operational analytics.

Cyber Akademie (CAk)

Cyber Akademie (CAk)

Cyber Akademie is a training and education center providing high-quality training and information events on information security and data protection.

AET Europe

AET Europe

AET Europe is specialised in creating technological solutions for user identification and authentication.

Soracom

Soracom

Soracom offers secure, scalable, cloud-native connectivity developed specifically for the Internet of Things.

SecuTech Solutions

SecuTech Solutions

SecuTech is a global leader in providing strong authentication and software licensing management solutions.

BrainChip

BrainChip

BrainChip is the leading provider of neuromorphic computing solutions, a type of artificial intelligence that is inspired by the biology of the human neuron - spiking neural networks.

Cybersecurity Competence Center (C3)

Cybersecurity Competence Center (C3)

The Cybersecurity Competence Center was created to further strengthen the Luxembourg economy in the field of cybersecurity.

Excelsecu Data Technology

Excelsecu Data Technology

Excelsecu is a global solution provider of online identity authentication, widely applied in banks, government bodies and enterprises.

HCC Embedded

HCC Embedded

HCC’s mission is to ensure that data stored or communicated by an embedded IoT application is secure, safe and reliable.

Capsule8

Capsule8

Capsule8 is the only company providing high-performance attack protection for Linux production environments.

Global Cyber Security Capacity Centre (GCSCC) - Oxford University

Global Cyber Security Capacity Centre (GCSCC) - Oxford University

GCSCC's work is focused on developing a framework for understanding what works, what doesn’t work and why – across all areas of cybersecurity capacity.

HacWare

HacWare

HacWare is a data driven cybersecurity awareness product that leverages machine learning and behavior analytics help IT professionals combat phishing.

FourthRev

FourthRev

FourthRev is an education-technology start-up with a mission to solve the skills crisis of the Fourth Industrial Revolution.

Fenix24

Fenix24

Fenix24 is an industry leader in the incident-response space. We ensure the fastest response, leading to the full restoration of critical infrastructure, data, and systems.

AgilePQ

AgilePQ

AgilePQ visibly secures IoT devices worldwide to protect the privacy, safety, and well-being of all people.