TECHNOLOGY > > Resilience


« Back to News

2021-07-05

Artificial Intelligence Can Reduce Cyber Attacks

AI is an effective solution to protect organisations from cyber attacks, but it can also be used by hackers to launch complex, automated attacks.

2021-07-02

Ransomware Attack Protection

Ransomware has become one of the biggest threats organisations face and criminals are extorting increasingly large sums from victims.

2021-06-30

US Companies Aren’t Preparing For Cyber Attacks

Business leaders seem unwilling to act until after the event. They must step up now and realise that cyber security is not optional - it’s essential.

2021-06-30

How To Prevent Healthcare Data Breaches

Healthcare is the most highly targeted sector for criminals trying to steal data, which calls for stringent security measures. By Narendra Sahoo

2021-06-28

Bad Cyber Security Behavior At Home Risks Being Taken Back To Work

A hybrid working structure creates a fundamental shift in cyber security priorities and the bad habits of remote work could reinfect the workplace.

2021-06-28

Diversity In Cyber Security

Improving diversity should help cyber security teams deploy a wider range of thought and use stronger concepts to defend against attacks.

2021-06-24

Mobile Users Are A Security Weakspot

Remote Working & Mobile Access: IT decision makers believe their organisations are more vulnerable to mobile cyber attacks than ever.

2021-06-22

Remote Working & Cyber Security

Remote working has become a normal practice but also has challenges, which are best overcome with effective security policies and the right training.

2021-06-21

A Quick Guide To Business Cyber Security

Whether you run a large complex organisation or a small startup, cyber crime has reached record levels and the threat of an attack is very real.

2021-06-18

Cyber Security In The Crypto World

The untraceable nature of Bitcoin and other crypto-currencies, along with Blockchain flaws, means that for hackers & scammers, it is an ideal target.

2021-06-16

Protecting Critical Infrastructure

Cyber attacks on critical infrastructure have a significant economic impact and securing these vital systems is all about controlling digital access.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Exploit Database (EDB)

Exploit Database (EDB)

The Exploit Database is a CVE compliant archive of public exploits and corresponding vulnerable software, developed for use by penetration testers and vulnerability researchers.

4ARMED

4ARMED

4ARMED services cover the end-to-end experience of securing modern software, from design and build through to deploy and test.

Zscaler

Zscaler

Zscaler enables the world’s leading organizations to securely transform their networks and applications for a mobile and cloud first world.

Westminster eForum

Westminster eForum

Wesrtminster eForum runs a series of conferences on matters relating to the UKs Digital Strategy. Topics include Smart Cities and Cyber Security.

InnoSec

InnoSec

InnoSec is a software manufacturer of cyber risk management technology.

XignSYS

XignSYS

XignSys develops innovative password-free and user-friendly Authentication solutions and electronic signature systems for B2B and B2C applications.

Cortado Mobile Solutions

Cortado Mobile Solutions

Cortado Mobile Solutions creates enterprise mobility and file sharing solutions for companies, teams and freelancers.

Yellow Brand Protection

Yellow Brand Protection

Yellow Brand Protection operates 24/7 to protect brands' Intellectual Property (IP) from infringements on all kinds of online distribution channels.

Cyemptive Technologies

Cyemptive Technologies

Cyemptive's CyberSlice technology preempts and remove threats before they take hold, in seconds, compared to other’s hours, days, weeks and even months.

FYEO

FYEO

FYEO is a threat monitoring and identity access management platform for consumers, enterprises and SMBs.

Canonic Security

Canonic Security

Canonic streamlines app review, continuously monitors apps, and reduces the risks involved in third-party access to your data.

Nomios

Nomios

Nomios develops innovative solutions for your security and network challenges. We design, secure and manage your digital infrastructure.

Globesecure Technologies

Globesecure Technologies

Globesecure Technologies is a networks and cyber security company. We are here to resolve business security challenges and secure the digital transformation journey of our clients.

SoftForum

SoftForum

SoftForum is a company specializing in next-generation information security solutions in the Quantum-Resistant-Cryptography (PQC) field.

StrongBox IT

StrongBox IT

Strongbox IT provides solutions to secure web applications and infrastructure.

SplxAI

SplxAI

Our mission at SplxAI is to secure and safeguard GenAI-powered conversational apps by providing advanced security and pentesting solutions, so neither your organization nor your user base get harmed.