TECHNOLOGY > > Resilience


« Back to News

2021-07-12

Seven Steps To Create An Effective Disaster Recovery Plan

All organisations need an effective Cyber Disaster Plan in place to reduce the chances of a data loss from a cyber attack or ransomware demand.

2021-07-09

Britain’s National Cyber Security Strategy

The tumultuous events of the Coronavirus and Brexit have reinforced the importance of cyber security to the UK’s wellbeing & national defence.

2021-07-09

Minimising The Impact Of Ransomware

Ransomware is one of the fastest and more profitable forms of cyber attack and organisations should take measures to minimise the impact.

2021-07-07

EU Sets Up An Emergency Team To Handle Large Scale Attacks

The EU Commission has announced that it will build a rapid response Joint Cyber Unit based in Brussels to combat large scale cyber attacks.

2021-07-07

What Is The Best Defense Against Phishing?

Although virtually everyone knows about phishing and how it works, many people still fall victim, but you can protect yourself. By Ben Hartwig

2021-07-06

Cyber Security In Fintech: Top 5 Tips

Fintech companies cannot afford to ignore cyber security and must build their resilience at a time when extraordinary attacks happen every day.

2021-07-05

Technical Debt Is A Serious Threat To Innovation

Technical debt is a technical design or development choice made for short-term benefit with long-term consequences for cyber security.

2021-07-05

Artificial Intelligence Can Reduce Cyber Attacks

AI is an effective solution to protect organisations from cyber attacks, but it can also be used by hackers to launch complex, automated attacks.

2021-07-02

Ransomware Attack Protection

Ransomware has become one of the biggest threats organisations face and criminals are extorting increasingly large sums from victims.

2021-06-30

US Companies Aren’t Preparing For Cyber Attacks

Business leaders seem unwilling to act until after the event. They must step up now and realise that cyber security is not optional - it’s essential.

2021-06-30

How To Prevent Healthcare Data Breaches

Healthcare is the most highly targeted sector for criminals trying to steal data, which calls for stringent security measures. By Narendra Sahoo

CyberSecurity Jobsite
Check Point

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Puppet

Puppet

Puppet is a leader in IT automation. Our software helps DevOps securely automate configuration and management of machines and the software running on them.

QMS International

QMS International

QMS is one of the leading ISO certification bodies in the UK and serves clients worldwide.

ThaiCERT

ThaiCERT

ThaiCERT is the national Computer Security Incident Response Team (CSIRT) for Thailand.

Northwave

Northwave

Northwave offers an Intelligent combination of cyber security services to protect your information.

Qatar Computing Research Institute (QCRI)

Qatar Computing Research Institute (QCRI)

QCRI perform cutting-edge research in such areas as Arabic language technologies, social computing, data analytics, distributed systems, cyber security and computational science and engineering.

Datplan

Datplan

Datplan offers a software solution that gives an overview of 8 key cyber risk areas, their threats, and risk management steps.

NSA Career Development Programs

NSA Career Development Programs

NSA offers entry-level programs to help employees enhance their skills, improve their understanding of a specific discipline and even cross-train into a new career field.

Infinite Ranges

Infinite Ranges

Infinite Ranges delivers secure, comprehensive digital solutions by connecting experts with the best products and services for the digital age.

Horizon3.ai

Horizon3.ai

Horizon3.ai is a leader in security assessment and validation enabling continuous security overwatch from an attacker’s perspective through our NodeZero SaaS solution.

Redbot Security

Redbot Security

Redbot Security provides industry leading manual penetration testing. Protecting critical systems and data - red team attack and breach simulations, (OT) critical infrastructure testing.

Cyware

Cyware

Cyware is the only company building Virtual Cyber Fusion Centers enabling end-to-end threat intelligence automation, sharing, and unprecedented threat response for organizations globally.

Nicoll Curtin

Nicoll Curtin

Nicoll Curtin is a global company with over 20 years of experience in connecting outstanding talent with industry leading companies within Technology, Change and Cyber Security.

Rescana

Rescana

Rescana offers a cyber risk management platform with the vision to remove the security team bottlenecks, accelerating business processes that require risk assessment.

CYBHORUS

CYBHORUS

CYBHORUS are a team of Italian cyber security experts, specialized in cyber threat defense and strategic and organizational consulting.

LockMagic

LockMagic

Lockmagic is an information asset management solution to protect, track, audit and control accesses to sensitive information inside and outside your organization.

Helix Tech Consulting

Helix Tech Consulting

Helix Tech have expertise in a wide range of technology areas, including IT strategy, infrastructure design, cybersecurity, disaster recovery, cloud, data centers, IT cost optimization, and more.