TECHNOLOGY > > Resilience


« Back to News

2017-12-05

Staff Training Is Important But Does Not Reduce Cyber Risk

The human is the weakest link in cybersecurity and the answer is not more training. It is not to trust humans in the first place.

2017-12-05

Cybersecurity Firms Deploy AI Against Hackers

AI can detect threats at an early stage before too much damage has been done and there is no need for humans to defend networks from many attacks.

2017-11-30

Replaying Crime Scenes With An Advanced Scanner

Canadian police forces use a forensic laser scanner capable of detecting the tiniest of details and recreate collisions and crime scenes in 3D.

2017-11-27

Who's Responsible For Cloud Security?

While the cloud brings benefits, security remains a particular area of concern for US government agencies and it’s not always clear who’s in charge.

2017-11-22

A Response Solution to Cyber Attacks

Verint has a cyber security solution designed for customers with large security operations centre which uses data mining software.

2017-11-16

Cybersecurity Training Isn’t The Complete Solution

Cyber security training firms continue to stress the importance of educating employees in order to minimise the risk of cyber threats. Why bother?

2017-11-13

Businesses Get Better At Detecting Insider Threats

The cybersecurity threat to companies from their own employees account for 42% of incidents and is growing.

2017-10-09

A 9-Step Guide For GDPR Compliance

In May 2018, the General Data Privacy Regulation will take effect, significantly altering the way organisations handle and store data. Be prepared.

2017-08-30

Google Launches GDPR Compliance Site

Google is launching a dedicated website designed to ensure customers understand how their data is being collected and stored in line with GDPR.

2017-08-29

Carelessness Is Just As Risky As Deliberate Exfiltration

Panama Papers Pt.2: A Panamanian broker has accidentally exposed 52,000 financial and legal documents of wealthy individuals.

2017-08-21

4 Steps Toward A GDPR Compliance Audit

Many organisations are starting to feel stressed and perhaps a bit confused by the General Data Protection Regulation. Here's where to start.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

WEBINAR: 2024 and Beyond: Top Six Cloud Security Trends

WEBINAR: 2024 and Beyond: Top Six Cloud Security Trends

April 4, 2024 | 11:00 AM PT: Join this webinar to find out about six emerging trends dominating the cloud cybersecurity landscape.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

PCI Pal

PCI Pal

PCI Pal’s secure cloud payment solutions are certified to the highest level of security by the leading card companies.

Internet Storm Center (ISC)

Internet Storm Center (ISC)

ISC provides a free analysis and warning service to thousands of Internet users and organizations, and is actively working with ISPs to fight back against the most malicious attackers.

Forter

Forter

Forter provides new generation fraud prevention to meet the challenges faced by modern enterprise e-commerce.

Wallarm

Wallarm

Wallarm offers an adaptive security platform including an integrated Web vulnerability scanner and NG-WAF solution with automatically generated security rules based on AI.

AntemetA

AntemetA

AntemetA specializes in network infrastructure, security and cloud computing, helping companies transform their Information Systems.

IOTA Foundation

IOTA Foundation

The IOTA Foundation is a non-profit R&D organisation focused on developing the next generation of protocols for the connected world.

Sopher Networks

Sopher Networks

Sopher is a secure communication and collaboration platform for business and personal use.

XPO IT Services

XPO IT Services

XPO IT Services are dedicated to providing secure, high quality IT recycling and asset disposal services.

Safe Systems

Safe Systems

Safe Systems provide compliance centric IT services for community banks and credit unions, ensuring that they are kept up to date on current technologies, security risks, and regulatory changes.

MAXXeGUARD Data Safety

MAXXeGUARD Data Safety

MAXXeGUARD: The High Security Shredder. MAXXeGUARD easily destroys hard disks up to the highest security levels as well as other digital data carriers like SSD’s, LTO’s, USB’s, CD’s etc.

Moss Adams

Moss Adams

Moss Adams is a fully integrated professional services firm dedicated to assisting clients with growing, managing, and protecting prosperity.

RiskOptics

RiskOptics

RiskOptics (formerly Reciprocity) equips organizations with one of the most intuitive and powerful information security and cyber risk management solutions in the market.

Resourcive

Resourcive

Resourcive is the first Value Added Sourcing “VAS” consultancy. We deliver strategic IT sourcing solutions to mid-market and enterprise clients.

Cyera

Cyera

Cyera is the data security company that gives businesses context and control over their most valuable asset: data.

Block Harbor Cybersecurity

Block Harbor Cybersecurity

Block Harbor has worked closely with automakers, suppliers, and regulators since 2014 on vehicle cybersecurity.

The Hacking Games

The Hacking Games

The Hacking Games' Mission is to inspire, educate and mobilise a generation of ethical hackers to make the world a safer place.