TECHNOLOGY > > Resilience


« Back to News

2022-02-01

Britain's Cyber Security Strategy Focuses On Resilience

The British government has announced its Cyber Security Strategy to protect vital public services from the growing risk of destructive cyber attacks.

2022-01-26

Top Tips For SMEs To Dodge Hackers

Small business owners and their employees often lack basic training in cyber security measures and make risky mistakes that could cost them. 

2022-01-26

How To Secure Web Gateway & Web Filtering

A secure web gateway offers protection against online security threats by enforcing company security policies & filtering malicious traffic.

2022-01-25

Defending Against Log4j Vulnerabilities

Concealed Log4j vulnerabilities call for effective measures to reduce the frequency of disruptive events and to reduce the potential damage.

2022-01-25

Making Open-Source Software Safer

Open-source software has unique security challenges, because of its widespread use and the fact its security maintenance is reliant on volunteers.

2022-01-18

Corporate Cyber Attacks Up 50% Last Year

2021 saw a 50% increase in cyber attacks per week on corporate networks compared to 2020, peaking in December, largely due to Log4J exploits. 

2022-01-15

Process Sensor Cyber Security Is A Vital Issue

The gap in process sensor cyber security and process safety is a critical vulnerability in many industries, calling for expert scrutiny. By Joe Weiss

2022-01-12

Azure Active Directory Recycle Bin Won’t Save Your Critical Data

Failing to monitor activity across all Active Directory environments without an effective backup strategy can lead to disaster.  By Greg Jones

2022-01-10

Cyber Security Threats In 2022

Ransomware & Remote Working: The key issue for business cyber security is to make  the transition from reactive to proactive behaviour. 

2022-01-10

Avoid Being A Victim Of Cyber Crime – Get Audited

A cyber security audit is a systematic evaluation of a company's information security by measuring how well it conforms to established criteria. 

2022-01-09

The Complexities Of Operational Technology Make It Vulnerabe

Industrial organisations need to adapt quickly to the expansion of cyber security threats to protect complex Operational Technology systems.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

IP Performance

IP Performance

IP Performance Limited is a leading supplier of customised network infrastructure and security solutions.

ADF Solutions

ADF Solutions

ADF Solutions is a leading provider of digital forensic and media storage exploitation tools.

Uniken

Uniken

Uniken REL-ID is a safe, simple, and scalable security platform that tightly integrates your identity, authentication, and channel security.

Forensic Pathways

Forensic Pathways

Forensic Pathways focus on the provision of digital forensic technologies, offering clients unique technologies in the management of mobile phone data, image analysis and ballistics analysis.

Intelligent Business Solutions Cyprus (IBSCY)

Intelligent Business Solutions Cyprus (IBSCY)

IBSCY Ltd is a leading provider of total IT solutions and services in Cyprus specializing in the areas of cloud services and applications, systems integration, IT infrastructure and security.

Seavus

Seavus

Seavus is a software development and consulting company with a proven track-record in providing successful enterprise-wide business solutions including Managed Security Services.

Inceptus

Inceptus

Inceptus is a next generation Managed Security Service Provider (MSSP). We are dedicated to keeping our customers safe, secure and protected while doing business on the Internet.

VikingCloud

VikingCloud

VikingCloud (formerly Sysnet Global Solutions) offers organizations an integrated cybersecurity and compliance solution to make informed, predictive, and cost-effective risk mitigation and prevention

Center for Information Technology Policy (CITP) - Princeton University

Center for Information Technology Policy (CITP) - Princeton University

The Center for Information Technology Policy at Princeton University is a nexus of expertise in technology, engineering, public policy, and the social sciences.

Security & Intelligence Division (SID) - Singapore

Security & Intelligence Division (SID) - Singapore

Security & Intelligence Division (SID) protects Singapore from external threats and safeguards its interests in areas related to terrorism, cyber security, other transnational threats, and geopolitics

OccamSec

OccamSec

OccamSec is a leading provider in the world of cybersecurity. We provide accurate, actionable information to reduce risk and enable better informed decisions.

Nokod Security

Nokod Security

Nokod Security delivers an application security platform for low-code / no-code custom applications and Robotic Process Automation (RPA).

Thunder Shield Security

Thunder Shield Security

Thunder Shield is a professional cyber security service provider of penetration test, source code review and security assessment services.

Telarus

Telarus

Telarus is a Technology Services Brokerage that holds contracts with the world's leading cloud voice, contact center, cybersecurity, mobility and IoT providers.

Acumen

Acumen

Acumen's cyber security engineers protect your critical systems, in critical moments. We are here when you need us most.

Anagram

Anagram

Anagram is the world’s first human-driven security awareness training platform that delivers real results.