TECHNOLOGY > > Resilience


« Back to News

2020-05-28

All Employees Need This Effective New Training Tool

Employees, from senior management to part-timers, are the largest cyber security vulnerability that any organisation faces. They need Training.

2020-05-27

Only A Quarter Of Employees Have Cyber Security Training

Employers are failing to prepare their workers for many of the cyber security risks presented when working on corporate business from home.

2020-05-20

Paying Cybercriminals A Ransom Will Double Your Recovery Costs

Paying ransom appears to be an effective way of getting stolen data restored, but that is an illusion. It is much cheaper to invest in strong defences.

2020-05-12

Effective Cyber Security Training Using The GoCyber App

One of the major issues that all organisations face is the need for real time cyber training of their people. There's an App for that.

2020-05-01

Lockdown Security Apathy Could Be A Big Risk

Organisations are struggling to get employees to buy into cyber security with a third of IT leaders saying their remote workers simply don’t care.

2020-04-28

Every Single Employee Requires Cyber Security Training

Businesses investing in cyber security often base their investments on technology, but fail to attend to the human side of the problem with training.

2020-04-28

Cyber Criminals Exploit Lockdown Workers

Home-based WiFi networks and 4G connections for remote work don’t have anything like the resilience of corporate security technologies.

2020-04-21

Small Businesses Need Cyber Security Training

Small business were once an unlikely target for a sophisticated cyber-attack and relatively unlikely to attract the attention of hackers. Not anymore.

2020-04-14

Cyber Resilience Benchmarks - Missed

Only 17% of organisations are meeting an acceptable standard, according to the 3rd Annual Cyber Resilience Survey from Accenture Security.

2020-04-08

The Risks Of Remote Working

Enforced remote working during the Covid-19 lockdown leaves users especially vulnerable and now top APT- level hackers are getting involved.

2020-03-31

AI Is Closing The Cyber Skills Gap

How far can machines go in supporting and enhancing cyber defence teams. Is it possible they will supersede humans in cyber security?

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Tanium

Tanium

Tanium is an endpoint security and systems management company.

Cyber Risk Policies

Cyber Risk Policies

CyberRiskPolicy.com is a joint venture between the Poindexter Surety Group of companies and Gibbs Cyber Security.

IPCopper

IPCopper

IPCopper specializes in network packet capture appliances for cybersecurity, cybersurveillance and network monitoring, and encrypted data storage.

Cysec - TU Darmstadt

Cysec - TU Darmstadt

CYSEC is the Cybersecurity faculty of the Technical University of Darmstadt and performs internationally renowned research in numerous areas of cybersecurity.

Certus Software

Certus Software

Our Secure Data Erasure solutions protect customer data confidentiality by completely erasing it from data storage devices.

4iQ

4iQ

4iQ fuses surface, social, deep and dark web sources to research and assess risks to people, infrastructure, intellectual property and reputation.

Shape Security

Shape Security

Shape Security provide best-in-class defense against malicious automated cyberattacks on web and mobile applications.

Aveshka

Aveshka

Aveshka is a professional services firm focused on addressing complex threats and challenges including Cybersecurity and Information Technology.

Idaho National Laboratory (INL)

Idaho National Laboratory (INL)

INL is an applied engineering laboratory dedicated to supporting the US Dept of Energy's missions in energy research, nuclear science and national defense including critical infrastructure protection.

Truepic

Truepic

Truepic provides technologies that prevent fraud, identity theft, misinformation, and disinformation caused by generative, manipulated, or deepfake digital content.

FFRI Security

FFRI Security

FFRI is committed to research and development of preventing the most advanced cyber-attacks and breaches.

Moxa

Moxa

Moxa is a leading provider of industrial networking, computing, and automation solutions for enabling the Industrial Internet of Things.

AppGuard

AppGuard

AppGuard prevents breaches by blocking applications from performing inappropriate processes using our patented dynamic isolation and inheritance technologies.

Aware

Aware

Aware is the only comprehensive AI solution for governance, risk, compliance and insights for leading collaboration platforms.

6WIND

6WIND

6WIND deliver virtualized, cloud-native, distributed high performance & secure networking software solutions to support new applications such as 5G, IoT, SD-WAN.

SphereX Technologies

SphereX Technologies

SphereX is the first on-chain security solution for Web3 applications.