TECHNOLOGY > > Resilience


« Back to News

2021-06-08

Future Threats Are Growing Closer

Cyber security experts are becoming more concerned about the near term future when cyber attacks will be driven by Artificial Intelligence.

2021-06-08

Identifying & Minimizing Security Vulnerabilities For Your Organization

Despite the very best security efforts, small flaws in cyber security architecture can pose a great threat to business assets and operations.

2021-06-07

Microsoft’s Defensive Playbook

Microsoft is offering a series of incident response ‘playbooks’, giving advice to business leaders on how to defend against cyber attacks.

2021-06-02

Avoiding The Privacy Paradox In The Workplace

Internet users are rightly becoming more concerned about data tracking and their personal privacy. There are some ways to get protection.

2021-06-02

Cyber Security: Its Good To Talk

Cyber security is all about the human factor and being transparent about mistakes can help your organisation's people learn to stay safe online.

2021-06-01

Preventing Ransomware Attacks

The chances of ransomware infection can be significantly reduced by security software and by paying sufficient attention to some basic rules.

2021-05-31

Get The Best Cyber Security Audits & Training

Organisations often invest heavily in cyber security technology, but they don’t spend enough time on training, audit and the vital human factor.

2021-05-31

Missing Patches Place Security At Risk

Public sector security professionals admit that one in three UK breaches result from vulnerabilities that they should have already patched.

2021-05-28

Managing A Remote Team To Protect Against Cyber Attacks

Many more organisations are adopting remote working, but how can they manage a remote team while prioritizing cybersecurity? By Chioma Iwunze

2021-05-18

The Role Of Enterprise Architecture In Cyber Defence

Learning the lessons from the unprecedented SolarWinds attack and the role that Enterprise Architecture has to play. By Rupert Colbourne

2021-05-17

Responding To Ransomware Attacks

Ransomware attacks on business are becoming much more frequent and severe. The victims can be too paralysed to make an effective response.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Fredda Stanza

Fredda Stanza

Fredda Stanza specialize in Information Security and Forensics Consulting.

Zentek Digital Investigations

Zentek Digital Investigations

Zentek has been providing digital forensics services to the public and private sector for computers and mobile devices since 2004.

QTS

QTS

QTS Realty Trust, Inc. is a leading provider of secure, compliant data center, hybrid cloud and managed services.

Centripetal Networks

Centripetal Networks

Centripetal Networks was founded with one vision - to protect networks from advanced threats by simplifying intelligence-driven security.

Deep Instinct

Deep Instinct

Deep Instinct provides comprehensive defense that is designed to protect against the most evasive unknown malware in real-time, across an organization’s endpoints, servers, and mobile devices.

NSHC

NSHC

NSHC is a provider of mobile security solutions, cyber security consulting and training, and offensive research.

HCL Technologies

HCL Technologies

HCL offer an integrated portfolio of products, solutions and services built around Digital, IoT, Cloud, Automation, Cybersecurity, Analytics, Infrastructure Management and Engineering Services.

CyberSec Hub - The Kosciuszko Institute

CyberSec Hub - The Kosciuszko Institute

The goal of CyberSec Hub is to create a centre of excellence for cybersecurity in Krakow, a new European “Cyber-Silicon Valley”.

BullWall

BullWall

BullWall is a digital innovator dedicated to fight cybercrime in its many forms. Our overarching purpose is to stop new and unknown strings of ransomware attacks in its tracks.

TotalAV

TotalAV

TotalAV Antivirus is a free-to-use app packed with all the essential features to find and remove malware, keeping you safe.

Astrix Security

Astrix Security

Astrix enables security teams to instantly see through the fog of connects and detect redundant, misconfigured and malicious third-party exposure to their critical systems.

NXM Labs

NXM Labs

NXM is a leader in a leader in advanced cybersecurity software for connected devices.

Digimune

Digimune

Digimune is an all-encompassing cloud-based cyber risk protection platform that guards you against the dangers of our digital world.

OpenAI

OpenAI

OpenAI is an AI research and deployment company dedicated to ensuring that general-purpose artificial intelligence benefits all of humanity.

ETI-NET

ETI-NET

ETI-NET is the worldwide leader in managing critical data for industries that never stop.

Aeris

Aeris

Aeris IoT Watchtower is the world’s first fully integrated cyber security solution for cellular IoT devices.