TECHNOLOGY > > Resilience


« Back to News

2023-07-03

The Seven Stages Of Cyber Resilience:

The Emotional Roller Coaster Of Data Protection: For small & medium businesses, data resilience is a critical necessity. By Richard Massey

2023-06-28

Phishing – It’s Not About Malware (Or Even Email)

Phishing Is No Longer About Infecting Your Computer: Experts at SANS have analysed the latest trends and key indicators. By Lance Spitzner

2023-06-26

How Does Your Board Measure Cyber Resilience?

Adopting A Prevention-First Approach: Going beyond traditional cybersecurity measures means prioritising resilience. By Deryck Mitchelson

2023-06-26

Why Are Businesses Ignoring Incident Response?

Not having an Incident Response Plan can be a significant factor in how much impact an attack has and how long it takes to recover. By Phil Robinson

2023-06-22

What Is The Cybersecurity Maturity Model Certification (CMMC)?

CMMC certification can give your business a competitive edge in the defense contracting marketplace as well as help safeguard national security.

2023-06-14

Nine Types of Modern Network Security Solutions

Multiple Technologies & Policies: As reliance on digital technology & data intensifies, guaranteeing effective network security is imperative.

2023-06-19

Penetration Testing Is A Vital Tool To Deal With AI-Based Attacks 

Penetration testing can indicate the best ways to defend, remediate & recover from the threat of AI-inspired and AI-powered attacks. By Ed Skoudis

2023-06-19

Mobile Authentication: The Good, The Bad & The Ugly

Mobile authentication is convenient to use and offers a sense of security, but this type of device isn’t as secure as it may seem. By Mark Bell

2023-06-13

Two Thirds Of Organizations Suffer Breaches Due To WFH

Document Security: Remote workplaces offer unique challenges to data security and the security risks are too costly to ignore. By Kyle Mitchell

2023-06-12

To Succeed With Zero Trust, First Define Success

When well-executed, Zero Trust strengthens an organization’s security posture, reducing the blast radius of inevitable breaches. By John Linford

2023-06-12

XDR vs. SIEM: Do You Need One or Both?

The complexity & volume of security data present challenges for traditional SIEM solutions, leading to the emergence of new offerings like XDR.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Secure Recruiting International (SRI)

Secure Recruiting International (SRI)

SRI is an industry leader in Information Security , Networking, Wireless and Storage recruitment.

Cyber8Lab

Cyber8Lab

Cyber8Lab provides cybersecurity training programmes simulating real world cybersecurity incidents such as web defacement, malware, phishing, digital forensics analysis and wireless intrusion.

Akheros

Akheros

Akheros develops cybersecurity learning algorithms which anticipate, detect and prevent offensive and incongruous behaviors of M2M interactions.

Corvus Insurance

Corvus Insurance

Corvus' mission is to create a safer, more productive world through technology-enabled commercial insurance.

Digital Security

Digital Security

Digital Security is an Ecuadorian company specialized in providing comprehensive information security solutions.

Mitre ATT&CK

Mitre ATT&CK

MITRE ATT&CK™ is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations.

Data Destruction London

Data Destruction London

Data Destruction London offers fast, confidential and compliant expert data destruction services to businesses and organisations in London.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Expel

Expel

Expel provide transparent managed security services, 24x7 detection, response and resilience.

Airnow Cybersecurity

Airnow Cybersecurity

Airnow Cybersecurity provide digital cybersecurity services and solutions for organizations and app publishers.

Earlybird Venture Capital

Earlybird Venture Capital

Earlybird is a venture capital investor focused on European technology innovators.

The PenTesting Company

The PenTesting Company

The PenTesting Company is owned and operated by offensive security professionals. Penetration Testing is essentially all we do.

Accops Systems

Accops Systems

Accops enables secure and instant remote access to business applications from any device and network, ensuring compliant enterprise mobility.

Rausch Advisory Services

Rausch Advisory Services

Rausch delivers solutions that address compliance, enterprise risk, information technology and human resource capital.

OX Security

OX Security

OX is a DevOps software supply chain security solution. Teams can verify the integrity and security of every artifact using a pipeline bill of materials (PBOM).

CyFlare

CyFlare

CyFlare’s security platform integrates your tools with ours – delivering true positives, automated remediation, and interactive analytics built for security management teams.