TECHNOLOGY > > Resilience


« Back to News

2015-05-12

There is No Secure Inside – So Get the Most from your Firewall

What about all of that data you shipped off to the cloud? Is it inside?

2015-05-30

Cyber Vulnerability - Get Your Report for 2015

The growing tide of cyber attacks has begun to spawn a new awareness of current cyber risks to business.

2015-05-04

Deloitte Mock a Cyberattack to Teach Business How to Respond

A security breach or big data loss can trigger an emergency for the entire business.

2015-04-20

JP Morgan Algorithm Identifies Rogue Employees

The Bank is rolling out a program to identify rogue employees before they go astray.

2015-04-15

Proactive Cyber Security Strategies Improve Security Effectiveness

New Research from Accenture & Ponemon Institute quantify success factors of companies that have improved their cyber security strategies.

2015-04-02

Building a Cyber Security Team from Within

Building an in-house cyber security operations center may be resource-intensive but it can safeguard your data.

2015-03-28

IT Governance Cyber Security Phishing Awareness Course

IT Governance has launched a Cyber security and phishing staff awareness e-learning course to help businesses.

2015-03-26

You Can Tell Which Emails are Being Tracked.

You may not have heard of companies like Yesware, Bananatag, and Streak, however they almost certainly know a good deal about you.

2015-03-02

Oxford Cyber Risk for Leaders Programme

Any organisation that relies on computer networks, digital information, the Internet or an Intranet is vulnerable to cyber security risks.

2015-03-02

Cybersecurity that thinks

Until recently, using the terms “data science” and “cybersecurity” in the same sentence would have seemed odd.

2015-03-02

New weapons offer hope against advanced cyber-attacks

One of the most frightening things about modern cyber-attacks is that a breach can remain undetected within networks for weeks or longer.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

DeviceLock

DeviceLock

DeviceLock is a leading provider of endpoint device/port control and data leak prevention software.

Truth Technologies Inc (TTI)

Truth Technologies Inc (TTI)

TTI is a premier provider of worldwide anti-money laundering, anti-fraud, customer identification, and compliance products and services.

Comarch

Comarch

Comarch is a provider of IT business solutions to optimize operational and business processes. Cyber security solutions are focused on Identity Management and Security Assessment services.

Fortra

Fortra

Fortra (formerly HelpSystems) is your cybersecurity ally, unified through the mission of providing solutions to organizations' seemingly unsolvable cybersecurity problems.

Secude

Secude

SECUDE is an established global security solutions provider offering innovative data protection for SAP users.

Confluera

Confluera

Confluera's Real-time Cyber Attack Interception and Defense Platform helps security teams detect & intercept sophisticated cyber attacks.

Zero Networks

Zero Networks

With Zero Network, you can achieve affordable, airtight network access security at scale.

Concentric

Concentric

Concentric Data Risk Monitoring and Protection. Deep Learning to discover, monitor and remediate risks to sensitive data on-premises and in the cloud.

CertiPath

CertiPath

CertiPath create products and services that ensure the highest levels of validation for digital identities that attempt to access customers’ networks.

SOC.OS Cyber Security

SOC.OS Cyber Security

SOC.OS is an alert correlation and triage automation tool. It correlates and prioritises your alerts, boosting productivity, enhancing threat visibility and shortening mean time to respond.

Componolit

Componolit

Componolit GmbH is a highly specialized company with a strong emphasis on trustworthy software, component-based systems and formal verification.

Outseer

Outseer

Outseer is a leading technology company in the fight against payments fraud. Outseer reliably determines authentic customers from fraudulent behavior.

Cyber Protection Group (CPG)

Cyber Protection Group (CPG)

Cyber protection Group specialize in Penetration Testing. We work with enterprise level companies as well as small to medium sized businesses.

CodeHunter

CodeHunter

CodeHunter is a malware hunting SaaS platform designed to detect all variations of malware, known and unknown, without the need for source code or signatures.

Crayon

Crayon

Crayon is a customer-centric innovation and IT services company. We provide guidance on the best solutions for our clients’ business needs and budget with software, cloud, AI and big data.

Avrem Technologies

Avrem Technologies

Avrem Technologies is a business IT and cybersecurity consulting firm. We design, implement, manage and monitor the networks, servers, computers and software that our clients rely on each day.