TECHNOLOGY > > Resilience


« Back to News

2021-08-25

NSA Warning - Avoid Public Wi-Fi

The US National Security Agency has issued guidance to government organisations with remote workers - avoid connecting to public Wi-Fi at all.

2021-08-17

Cyber Liabilities Advisory Advocates Resilience

The US, UK and Australia are urging public & private-sector organisations to make sure their networks are patched against common exploits.

2021-08-03

TeamViewer Remote Control App Gets A Security Upgrade

TeamViewer's remote control app can be locked with biometric authentication preventing unauthorised use, even if the device is unlocked.

2021-08-04

Cyber Security Standards For Critical Infrastructure

The White House issues a national security memo instructing CISA & NIST to establish cyber security performance goals for critical infrastructure.

2021-08-05

Home Working Creates More Cyber Attacks

As organisations prepare for a post-Covid world, one of the many issues they will have to address is much better IT security for home workers.

2021-08-04

New Tools Optimise Use Of Existing Data

Advances in cloud-based analytic tools are providing cost-effective operational improvements to ageing IT systems across many sectors.

2021-07-28

Ransomware Often Begins With Phishing

Phishing is the delivery mechanism of choice for ransomware and these are critical problems every organisation must address in order to keep secure.

2021-07-27

Security Orchestration Can Help Business SOAR

Companies should adopt a unified cyber strategy across architecture, M&A and regulatory compliance, to reduce their risks. By Colin Tankard

2021-07-26

The Semiconductor Shortage Is Causing Cyber Security Problems

The global shortage of semiconductors increases the risk of the use of counterfeit parts with serious implications for data loss and IP theft.

2021-07-19

Autonomous Ships And Cyber Security

Maritime Autonomy: Unmanned surface ships are becoming more independent and capable of accomplishing sophisticated missions.

2021-07-17

For Sale - Dark Web Exploits

Older exploits are cheaper and remain useful to cyber criminals for longer. Its just as important to update and patch for these as for Zero-Days.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Cyren

Cyren

Cyren is a cloud-based, Internet security technology company providing threat detection and security analytics.

Skybox Security

Skybox Security

Skybox combines firewall and network device data with vulnerability and threat intelligence, putting security decisions in your unique network context.

ThetaRay

ThetaRay

ThetaRay’s solution for Industrial cyber security protects against unknown cyber-attacks that target industry and critical infrastructure.

Security Network Munich

Security Network Munich

Security Network Munich brings together leading players in the field of information and cyber security through joint research and innovation projects.

Medigate

Medigate

Medigate is a dedicated medical device security platform protecting all of the connected medical devices on health care provider networks.

Ignyte Assurance Platform

Ignyte Assurance Platform

Ignyte Assurance Platform™ is a leader in collaborative security and integrated GRC solutions for global corporations in Healthcare, Defense, and Technology.

Romanian Accreditation Association (RENAR)

Romanian Accreditation Association (RENAR)

RENAR is the national accreditation body for Romania. The directory of members provides details of organisations offering certification services for ISO 27001.

ShorePoint

ShorePoint

ShorePoint is an elite cybersecurity firm dedicated to improving the cyber resilience of Federal agencies and their missions.

3B Data Security

3B Data Security

3B Data Security offer a range of Penetration Testing, Digital Forensics, Incident Response and Data Breach Management Services.

Varen Technologies

Varen Technologies

Varen Technologies is an innovative consulting partner with highly respected cyber security, analytics, Agile Software Development and IT/maintenance expertise.

RMRF Tech

RMRF Tech

RMRF is a team of cybersecurity engineers and penetration testers which specializes in the development of solutions for early cyber threat detection and prevention.

Atomic Data

Atomic Data

Atomic Data is an on-demand, always-on, pay-as-you-go expert extension of your enterprise IT team and infrastructure.

Information Systems Security Association (ISSA)

Information Systems Security Association (ISSA)

ISSA is the community of choice for international cybersecurity professionals dedicated to advancing individual growth, managing technology risk and protecting critical information and infrastructure.

Kong

Kong

Kong - powering the API world. Increase developer productivity, security, and performance at scale with the unified platform for API management, service mesh, and ingress controller.

FearsOff

FearsOff

FearsOff is a global information security company serving clients worldwide. White hat operators with a black hat mindset to emulate real world attacks and everchanging threat vectors.

BeamSec

BeamSec

BeamSec is a cybersecurity solutions provider committed to addressing the human element of risk against the evolving landscape of email-based cyber threats.