TECHNOLOGY > > Resilience


« Back to News

2022-04-25

The Cyber Delusion Challenge For Small & Medium Businesses

With the increased sophistication of cybercrime tools, what can SMBs do to combat the mounting threats that they face? By John Davis

2022-04-22

Identity & Authentication For Mobile Users

For mobile users, there is a clear gap in the level of trust between the level of expectations from consumers versus real experience. By Dario Betti

2022-04-18

Types Of Security Testing Explained With Examples

Security testing encompasses all testing activities to ensure an application is correct and has faultless operation in a test environment.

2022-04-11

Mobile Cyber Attacks: The Different Facets Of Smartphone Malware

Vulnerable Banking Apps: Behavioural biometrics is the key to overcoming the challenge of advances in mobile malware. By Gemma Staite 

2022-03-26

Protecting Your Business From A Supply Chain Attack

Understanding how criminals operate makes it possible to protect your organization’s supply chain from cyber attacks. By Craig Moores

2022-03-30

Phishers Use Ukraine Invasion To Solicit Cryptocurrency

Malicious Emails: Phishers are impersonating legitimate aid organisations to steal donations intended for Ukrainian people. 

2022-03-23

Rated Cybersecurity Software & Tools

Powerful cyber security software is critical to meeting cyber security and compliance needs. Here are some of the best rated. By Charles Richard

2022-04-04

Improving The Security Of Open Source Software

Open Source Software has changed the world of IT and its popularity is growing fast - one of many reasons why it needs to be properly protected.

2022-10-11

In Many Cases Active Directory Is The Last Line Of Defence

Organisations of all sizes across every industry are failing to address Active Directory security gaps that leave them vulnerable to cyber attacks.

2022-03-28

Operating Technology Security Issues Are Increasing

Industrial control systems have become more connected than ever and good cyber security practices to protect Operating Technology are vital

2022-03-28

Only A Few Employees Cause The Majority Of Breaches

Research has found that 4% of employees clicked 80% of phishing links and that 3% were responsible for 92% of malware events.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Herjavec Group

Herjavec Group

Herjavec Group's Managed Security Services practice defends your organization from increasingly sophisticated, targeted cybercrime threats.

GraVoc

GraVoc

GraVoc is a technology-consulting firm committed to solving business problems for customers through the development, implementation, & support of technology-based solutions.

Uhuru Corp

Uhuru Corp

Uhuru offers a wide variety of IoT products and solutions including enebular® IoT Orchestration Service.

IPQualityScore (IPQS)

IPQualityScore (IPQS)

IPQS anti-fraud tools provide a real-time fraud score to analyze how likely a user or visitor is to engage in fraudulent behavior.

SevenShift

SevenShift

SevenShift is a security consulting firm with a wealth of experience in the worlds of Cybersecurity and Internet of Things (IoT).

Open Connectivity Foundation (OCF)

Open Connectivity Foundation (OCF)

OCF is dedicated to ensuring secure interoperability ensuring secure interoperability of IoT for consumers, businesses and industries.

RackTop Systems

RackTop Systems

RackTop Systems is the pioneer of CyberConverged data security, a new market that fuses data storage with advanced security and compliance into a single platform.

Cyber Polygon

Cyber Polygon

Cyber Polygon is an annual online exercise which connects various global organisations to train their competencies and exchange best practices.

Technisanct

Technisanct

Technisanct works with Governments, especially Law Enforcement and Defence agencies, helping them in monitoring threats, managing their data and resolving their forensic needs.

IriusRisk

IriusRisk

IriusRisk is an open Threat Modeling platform that automates and supports creating threat models at design time.

Cloud Seguro

Cloud Seguro

Cloud Seguro are leaders in the development of cloud solutions, Ethical Hacking, Privacy and Information Security.

Cloudflare

Cloudflare

Cloudflare is a global network designed to make everything you connect to the Internet secure, private, fast, and reliable.

IGI Cybersecurity

IGI Cybersecurity

IGI Cybersecurity delivers people-driven cybersecurity for personalized, resilient cyber defense focused on individualized strategy and unshakeable partnership.

B&L PC Solutions

B&L PC Solutions

B&L PC Solutions deliver top cyber security services on Long Island and New York city to protect businesses from evolving online threats.

Viatel Technology Group

Viatel Technology Group

Viatel Technology Group is a complete digital services provider. We have over 26 years’ experience delivering fully managed security, networking, cloud and communications services.

Kali Linux

Kali Linux

Kali Linux is an open-source, Debian-based Linux distribution geared towards various information security tasks, such as Penetration Testing.