TECHNOLOGY > > Resilience


« Back to News

2015-05-30

Cyber Vulnerability - Get Your Report for 2015

The growing tide of cyber attacks has begun to spawn a new awareness of current cyber risks to business.

2015-05-04

Deloitte Mock a Cyberattack to Teach Business How to Respond

A security breach or big data loss can trigger an emergency for the entire business.

2015-04-20

JP Morgan Algorithm Identifies Rogue Employees

The Bank is rolling out a program to identify rogue employees before they go astray.

2015-04-15

Proactive Cyber Security Strategies Improve Security Effectiveness

New Research from Accenture & Ponemon Institute quantify success factors of companies that have improved their cyber security strategies.

2015-04-02

Building a Cyber Security Team from Within

Building an in-house cyber security operations center may be resource-intensive but it can safeguard your data.

2015-03-28

IT Governance Cyber Security Phishing Awareness Course

IT Governance has launched a Cyber security and phishing staff awareness e-learning course to help businesses.

2015-03-26

You Can Tell Which Emails are Being Tracked.

You may not have heard of companies like Yesware, Bananatag, and Streak, however they almost certainly know a good deal about you.

2015-03-02

Oxford Cyber Risk for Leaders Programme

Any organisation that relies on computer networks, digital information, the Internet or an Intranet is vulnerable to cyber security risks.

2015-03-02

Cybersecurity that thinks

Until recently, using the terms “data science” and “cybersecurity” in the same sentence would have seemed odd.

2015-03-02

New weapons offer hope against advanced cyber-attacks

One of the most frightening things about modern cyber-attacks is that a breach can remain undetected within networks for weeks or longer.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Cylance Smart Antivirus

Cylance Smart Antivirus

An antivirus that works smarter, not harder, from BlackBerry. Lightweight, non-intrusive protection powered by artificial intelligence. BUY NOW - LIMITED DISCOUNT OFFER.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

DigitalStakeout

DigitalStakeout

A simple and cost-effective solution to monitor, investigate and analyze data from the web, social media and cyber sources to identify threats and make better security decisions.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Jelastic

Jelastic

Jelastic’s Platform-as-Infrastructure is rapidly becoming the standard for hosting service providers worldwide.

Cisco Systems

Cisco Systems

Cisco's threat-centric approach to network security reduces complexity while providing superior visibility, continuous control and advanced threat protection.

MarQuest

MarQuest

MarQuest provides services and systems to enhance network reliability and security.

RPC

RPC

RPC is a business law firm. Practice areas include technology and cyber risk.

H-11 Digital Forensics

H-11 Digital Forensics

H-11 Digital Forensics is a global leader of digital forensic technology.

Ockam

Ockam

Ockam gives you the tools you need to establish an architecture for trust within your connected device applications.

Basque Digital Innovation Hub (BDIH)

Basque Digital Innovation Hub (BDIH)

The aim of the BDIH initiative is to provide industrial enterprises, especially SMEs, with the technological capabilities needed to meet the challenges of industry 4.0.

JM Search

JM Search

JM Search’s Information Technology Executives Practice sources the most sought-after technology roles including CIO, CTO, CISO, CDO and other senior posts.

Cypherix

Cypherix

Cypherix is tightly focused on cryptography and data security. We leverage our expertise to deliver state-of-the-art, world-class encryption software packages.

HutZero

HutZero

HutZero is the leading UK early-stage entrepreneur bootcamp designed to transform early-stage cyber ideas into potential new businesses.

Bleam Cyber Security

Bleam Cyber Security

Bleam is a leading provider of Managed Cyber Security Services and Information Security consulting. We deliver enterprise class security services to UK SME’s to stop data breaches.