TECHNOLOGY > > Resilience


« Back to News

2021-03-03

Properly Securing Your Cloud System

Security in the cloud is not the same as security in the data center. Different rules and thinking apply and you should never assume your data is safe.

2021-03-02

Five Steps For Managing EdTech Security Risks

EdTech companies have a special responsibilty to protect their users, who are mostly adolescents & children, from online threats. By Angela Baker

2021-03-01

Three Reasons The Security Industry Is Protecting The Wrong Thing

For too long organisations have been focusing on protecting their network, when they should have been protecting their data. By Paul German

2021-03-01

Microsoft Releases Free Tool For Hunting SolarWinds Malware

Microsoft is open-sourcing the CodeQL queries tool it used to investigate the impact of malware planted in the SolarWinds Orion software updates.

2021-02-26

New Solutions For Zero-Day Attacks

Emergency Patches: Defending against zero-day attacks is one of the most fundamentally challenging security problems yet to be solved.

2021-02-24

Cyber Security Is Crucial For Maritime Shipping

Cyber attacks targeting ocean transport are growing exponentially and present great risks to the safety of crews, vessels, cargoes and ports.

2021-02-22

Every Employee Should Be Considered A Target

To tackle social engineering attacks, the challenge is to identify & prevent every possible point of a breach in a company’s security system.

2021-02-22

Cyber Security Insights For Executives

Implementing the best cyber security practice isn’t just about firewalls and encryption, it’s about changing the entire culture of your organisation.

2021-02-19

France Responds To Cyber Attacks

President Macron will elevate the importance of cyber security following attacks on hospitals and intends to launch a Cyber Security Centre in Paris.

2021-02-18

A New Generation Of Critical Vulnerabilities

Under The Radar: More than two thirds of vulnerabilities recorded by NIST in 2020 require no user interaction of any kind to exploit.

2021-02-15

Get Your Cyber Security Plan In Place Now

A cyber threat intelligence plan is more important than ever and now is the time for all organisations to sort out their cyber security strategy.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Certes Networks

Certes Networks

Certes Networks offers an encryption management solution that can be seamlessly integrated and is interoperable with any network.

Ammune.ai

Ammune.ai

Ammune.ai (formerly L7 Defense) helps organizations to protect their infrastructure, applications, customers, employees, and partners against the growing risk of API-borne attacks.

PhishLabs

PhishLabs

PhishLabs provides 24/7 services that help organizations protect against the cyberattacks targeting their employees, their customers and their brands.

Adzuna

Adzuna

Adzuna is a search engine for job ads used by over 10 million visitors per month that aims to list every job everywhere, including thousands of vacancies in Cybersecurity.

MagiQ Technologies

MagiQ Technologies

MagiQ produced the world’s first commercial quantum cryptography product that delivered advanced, future-proof network security.

Polaris Infosec

Polaris Infosec

Polaris Web Presence Protection (WPP) is powered by our proprietary artificial intelligence and machine learning engine to ensure that attacks are stopped before they affect your business.

GateKeeper Enterprise

GateKeeper Enterprise

The GateKeeper Enterprise software is an identity access management solution. Automated proximity-based authentication into computers and websites. Passwordless login and auto-lock PCs.

Technology Innovation & Startup Centre (TISC)

Technology Innovation & Startup Centre (TISC)

TISC is a startup incubator at the Indian Institute of Technology Jodhpur (IITJ) and we back deep-tech startups.

Veratad Technologies

Veratad Technologies

Veratad Technologies, LLC is a world class provider of online/real-time Identity Verification, Age Verification, Fraud Prevention and Compliance Solutions.

RocketCyber

RocketCyber

RocketCyber is a Managed SOC platform empowering Managed Service Providers (MSPs) to deliver security services to small and medium businesses.

Triaxiom Security

Triaxiom Security

Triaxiom Security offers penetration testing, security audits, and strategic consulting customized to meet your needs.

Eureka Security

Eureka Security

Eureka help organizations securely use any cloud data storage technology they need without having to compromise on security.

tru.ID

tru.ID

We’re tru.ID, and we're reimagining mobile authentication, one API at a time.

Timus Networks

Timus Networks

Timus Networks enables today's work from anywhere organizations to secure their networks very easily and cost effectively.

Pessimistic Security

Pessimistic Security

The team behind Pessimistic helps blockchain startups meet modern security challenges since 2017.

TetherView

TetherView

TetherView provides leading virtual desktop and email security technology to help businesses stand up and manage digital workspaces.