TECHNOLOGY > > Resilience


« Back to News

2021-07-09

Britain’s National Cyber Security Strategy

The tumultuous events of the Coronavirus and Brexit have reinforced the importance of cyber security to the UK’s wellbeing & national defence.

2021-07-09

Minimising The Impact Of Ransomware

Ransomware is one of the fastest and more profitable forms of cyber attack and organisations should take measures to minimise the impact.

2021-07-07

EU Sets Up An Emergency Team To Handle Large Scale Attacks

The EU Commission has announced that it will build a rapid response Joint Cyber Unit based in Brussels to combat large scale cyber attacks.

2021-07-07

What Is The Best Defense Against Phishing?

Although virtually everyone knows about phishing and how it works, many people still fall victim, but you can protect yourself. By Ben Hartwig

2021-07-06

Cyber Security In Fintech: Top 5 Tips

Fintech companies cannot afford to ignore cyber security and must build their resilience at a time when extraordinary attacks happen every day.

2021-07-05

Technical Debt Is A Serious Threat To Innovation

Technical debt is a technical design or development choice made for short-term benefit with long-term consequences for cyber security.

2021-07-05

Artificial Intelligence Can Reduce Cyber Attacks

AI is an effective solution to protect organisations from cyber attacks, but it can also be used by hackers to launch complex, automated attacks.

2021-07-02

Ransomware Attack Protection

Ransomware has become one of the biggest threats organisations face and criminals are extorting increasingly large sums from victims.

2021-06-30

US Companies Aren’t Preparing For Cyber Attacks

Business leaders seem unwilling to act until after the event. They must step up now and realise that cyber security is not optional - it’s essential.

2021-06-30

How To Prevent Healthcare Data Breaches

Healthcare is the most highly targeted sector for criminals trying to steal data, which calls for stringent security measures. By Narendra Sahoo

2021-06-28

Bad Cyber Security Behavior At Home Risks Being Taken Back To Work

A hybrid working structure creates a fundamental shift in cyber security priorities and the bad habits of remote work could reinfect the workplace.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CERT-In

CERT-In

CERT-In is a functional organisation of the Ministry of Information & Electronics Technology, Government of India, with the objective of securing Indian cyber space.

Cysec - TU Darmstadt

Cysec - TU Darmstadt

CYSEC is the Cybersecurity faculty of the Technical University of Darmstadt and performs internationally renowned research in numerous areas of cybersecurity.

Massive Alliance

Massive Alliance

Massive is a global service agency providing internet monitoring, data & security threat surveillance and reputation management.

Veriff

Veriff

Veriff provides highly-automated identity-verification services that prevent fraud like nothing else on the market.

White & Black

White & Black

White & Black are specialist corporate & technology lawyers based in London & Oxford.

Passbase

Passbase

Passbase is building a full-stack identity verification engine backed by verified government documents.

KrCERT/CC

KrCERT/CC

KrCERT/CC is the National Computer Emergency Response Team in Korea.

Wolverhampton Cyber Research Institute (WCRI)

Wolverhampton Cyber Research Institute (WCRI)

Wolverhampton Cyber Research Institute builds on the strength of its members in the area of network and communication security, artificial intelligence, big data and cyber physical systems.

Tuta

Tuta

Tuta (formerly Tutanota) is an all-in-one email, calendar and contacts app which protects your data with full end-to-end encryption and it requires zero personal information.

Factmata

Factmata

Factmata is an social and news media monitoring and analytics product that uses AI to identify and track narratives online, highlighting those most likely to cause brand harm or misinform the public.

Prancer

Prancer

Prancer is the industry's first cloud-native, self-service SAAS platform for automated security validation and penetration testing in the cloud.

AnyTech365

AnyTech365

AnyTech365 is a leading European IT Security and Support company helping end users and small businesses have a worry-free experience with all things tech.

Telesystem

Telesystem

Telesystem empowers businesses across the USA with a range of innovative network, communication and collaboration solutions.

DC Two

DC Two

DC Two are a locally operated and supported Australian data centre, offering a suite of vertically integrated services covering every part of the data centre and cloud technology stack.

Octopus Cybersecurity

Octopus Cybersecurity

Octopus VAR is a Validation, Analysis and Reporting tool that gives risk managers and CISOs a powerful control mechanism and a deep view of operational risks.

Labyrinth Technology

Labyrinth Technology

Labyrinth Technology is an IT support company based in London specialising in cyber security for small to medium sized businesses.