TECHNOLOGY > > Resilience


« Back to News

2022-09-06

US Government Will Invest $15 Billion In National Cyber Security

2023 will be a good year for approved vendors as the US government goes large on defence & research spending on national cyber security.

2022-09-05

DMS Alerts Should Be Key To Organisations’ Security Orchestration

Document & Email Management System: DMS is an essential element in any organization's cyber security strategy. By Manuel Sanchez

2022-09-05

Email Infection Chains Are Diversifying In 2022

Maldocs Are The Weapon Of Choice: Over 60% of malicious payloads are embedded in various document types attached to email. By Ian Porteous

2022-08-30

It's Just Good Business To Collaborate With A Web Data Collection Partner You Can Trust

Web data enables security operators to identify and prevent real-time threats and vulnerabilities through better visibility & detection proficiency.

2022-08-29

Detect Spoofing Before Your Organisation Suffers Fraud

Business Email Compromise fraud is where cyber criminals impersonate senior managers and end users should be very cautious before paying invoices.

2022-08-26

Bluetooth Standards Are Reshaping Medical Devices

The Internet of Medical Threats: Bluetooth vulnerabilities in a new generation of medical devices can jeopardise patient safety. By Scott Register

2022-08-25

Think Carefully Before You Pay For Cloud Downtime Insurance

Considering Buying Cloud Downtime Insurance? Before you buy, take these three vital steps to ensure business continuity. By Florian Malecki

2022-08-22

Re-strategising Resilience In The Remote Working Age

It’s time to stop adding tools and complexity and start building security operations where cyber security experts are truly empowered. By Rob Smith

2022-08-22

Protecting Medical Devices From Cyber Attacks

Medical Device Cyber Security: Medical devices need robust cyber security which is critical in retaining patient trust in health care technology. 

2022-08-16

Data Protection Must Be a Part of Every Cyber Security Strategy

CISOs Need A 360-degree View: Your data is your most important asset. If it's compromised by ransomware, you're dead in the water. By Florian Malecki

2022-08-15

The Top 3 Current Email Threats

Email is a vulnerable part of most organisations' infrastructure and can be used for delivering phishing scams, business compromise & ransomware.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

APWG

APWG

APWG is the international coalition unifying the global response to cybercrime across industry, government, law-enforcement and NGO communities.

Simula Research Laboratory

Simula Research Laboratory

Simula Research Laboratory carries out research in the fields of communication systems, scientific computing and software engineering.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Cyberwrite

Cyberwrite

Cyberwrite was founded to provide underwriters around the world a unique and innovative Cyber Underwriting platform.

GuardKnox

GuardKnox

GuardKnox protects the users of connected vehicles against threats that can endanger their physical safety and the safety of their personal information.

ObjectSecurity

ObjectSecurity

ObjectSecurity is a leader in authorization policy automation. With OpenPMF, you can manage application security policies for access control and auditing.

PROMIA

PROMIA

PROMIA is in the business of providing solutions that are designed to support highly secure, reliable, scalable and interoperable business applications.

ecsec

ecsec

ecsec is a specialized vendor of security solutions including information security management, smart card technology, identity management, cloud computing and electronic signature technology.

Digital Boundary Group (DBG)

Digital Boundary Group (DBG)

Digital Boundary Group (DBG) is an information technology security assurance services firm providing information technology security auditing and compliance assessment services to clients worldwide.

Deft

Deft

Deft (formerly ServerCentral Turing Group) is a trusted provider of colocation, cloud, and disaster recovery services.

NACVIEW

NACVIEW

NACVIEW is a Network Access Control solution. It allows to control endpoints and identities that try to access the network - wired and wireless, including VPN connections.

Menaya

Menaya

Menaya provide Ethical Hackers for leading companies while also providing cyber security solutions to help major infrastructures protect against cyber crime.

Paragon Cyber Solutions

Paragon Cyber Solutions

Paragon Cyber Solutions provides specialized security risk management and IT solutions to protect the integrity of your business operations.

Vector Choice Technologies

Vector Choice Technologies

Vector Choice Technology Solutions has a long standing reputation in cyber security consulting since 2008.

CMIT Solutions

CMIT Solutions

CMIT Solutions is a recognized leader in Managed IT Services for businesses. We empower businesses like yours by providing innovative technology solutions, managed IT services and cybersecurity.

NopalCyber

NopalCyber

NopalCyber makes cybersecurity manageable, affordable, reliable, and powerful for companies that need to be resilient and compliant.