TECHNOLOGY > > Resilience


« Back to News

2021-09-07

Zero Trust - The New Standard Of Security

Perimeter-based defences, such as firewalls or signature-based antivirus software are no longer sufficient to protect networks. By Charles Griffiths

2021-10-05

Securing Hybrid Workplaces From Attack

If organisations are going to use hybrid work models successfully over the long term, then they will need to further invest in their security strategy. 

2021-09-01

Malware Attacks Target Linux-based Operating Systems

Linux operating systems are being targeted, with nearly 13m detections in 2021 H1, mostly in outdated systems running unpatched software.

2021-08-30

Urgent Action By Microsoft To Protect Cloud Users

A massive flaw discovered in the main databases stored in the MS Azure cloud platform means that all users need to change their digital access keys.

2021-08-31

US Tech Giants To Spend Billions On National Cyber Security

Apple, Amazon, Google, IBM and Microsoft have promised to invest billions of dollars to strengthen cyber security and train skilled workers.

2021-08-24

Businesses Pay A High Price For Automated Bots

Automated bots operated by criminals are costing businesses an average of 3.6% of their annual revenue and can remain undetected for months.

2021-08-24

Business Leaders Can Make Big Mistakes About Cyber Security

Businesss leaders face a higher level of personal jeopardy for inadequate cyber security and they need to avoid making some dangerous mistakes.

2021-08-16

New Ransomware Variant Discovered

DeepBlueMagic: Heimdal Security experts have warned of a complex new ransomware variant more innovative than other encryption exploits.

2021-08-11

New CSPM Report Highlights The Perceived Security Gap For Cloud Infrastructure

There could be a significant gap between the level of cloud security that you think you have and the level of protection that you actually have.

2021-08-10

Endpoint Security Is More Important Than Ever

The big increase in home working makes endpoint security critically important to protect remote workers and IT professionals. By Eileen Harrison

2021-08-23

Detecting & Mitigating Cyber Attacks

Organisations can improve their security by methodically identifying & addressing known identity-related vulnerabilities, like Active Directory.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

AppRiver

AppRiver

AppRiver is a global provider of cloud-based email and web security solutions that protect businesses worldwide from today's ever-changing online threats.

CyberArk Software

CyberArk Software

CyberArk is an established leader in privileged access management and offers the most complete set of Identity Security capabilities.

Westminster eForum

Westminster eForum

Wesrtminster eForum runs a series of conferences on matters relating to the UKs Digital Strategy. Topics include Smart Cities and Cyber Security.

Applied Risk

Applied Risk

Applied Risk is an established leader in Industrial Control Systems security, focused on critical infrastructure security and combating security breaches that pose a significant threat.

Eclypsium

Eclypsium

Eclypsium protects organizations from the foundation of their computing infrastructure upward, controlling the risk and stopping threats inside firmware of laptops, servers, and networks.

CS3STHLM

CS3STHLM

CS3STHLM is the Stockholm international summit on Cyber Security in SCADA and Industrial Control Systems.

Business Hive Vilnius (BHV)

Business Hive Vilnius (BHV)

BHV is one of the oldest startup incubator and technology hubs in the Baltics, primarily focused on hardware, security, blockchain, AI, fintech and enterprise software.

Talon Cyber Security

Talon Cyber Security

Talon delivers the leading enterprise browser designed to bring security to managed and unmanaged devices, regardless of location, device type or operating system.

CerraCap Ventures

CerraCap Ventures

CerraCap Ventures invest globally into early-stage B2B companies in Healthcare, Enterprise AI and Cyber Security.

Blacksands

Blacksands

Blacksands is a leader in network architecture, identity & services management, threat analysis, industrial IoT architecture, and invisible dynamic networks.

Kobalt.io

Kobalt.io

Kobalt are bringing the monitoring capabilities of enterprise-class security teams to smaller organizations.

Protectt.ai Labs

Protectt.ai Labs

Protectt.ai Labs is India’s first mobile security start up building awareness & providing solutions for mobile app, device & transaction security.

SHI International

SHI International

SHI International deliver against your IT and business needs, helping you build strategies and solutions that will drive innovation, collaboration and security.

Alchemy Security Consulting

Alchemy Security Consulting

Alchemy Security Consulting specialise in offensive and defensive cyber security. We find the weak link in your security so you can patch it up fast and avoid being hacked.

Siguria Kibernetike (Cyber Security)

Siguria Kibernetike (Cyber Security)

Siguria Kibernetike is a company based in Tirana that offers full service in the field of cyber and physical security.

OryxAlign

OryxAlign

OryxAlign offer managed IT and cyber security, cloud and digital transformation, and tailored professional and consulting services.