TECHNOLOGY > > Resilience


« Back to News

2022-11-07

Artificial Intelligence & Its Impact On Cyber Security

Detecting the most dangerous attacks that can take down the network, versus intrusions which are problematic but won't take everything down.

2022-10-31

Make Sure Your MSP Isn’t Your Security Achilles’ Heel

Supply Chain Risks: Seven traits you need to identify to be sure your Managed Services Provider has a strong security stance. By Leyton Jefferies

2022-10-26

The Five Stages Of A Cyber Attack

Attack Paths Matter: Escalating access privileges from Ordinary User to Admin can give attackers almost unlimited power. By Bryan Patton

2022-10-21

Under Pressure - Can CISOs Avoid Burnout?

CISOs are concerned about ransomware attacks evolving beyond their team’s knowledge, skills & capabilities. By Mark Guntrip

2022-10-18

Network Security Recommendations Tailored To Your Business

Byos Network Security Maturity Assessment: A free tool that enables companies to rapidly evaluate the strength of their cyber security strategy.   

2022-10-19

Making Cyber Attack Detection Easier With Artificial Intelligence

New AI software tools enable collection of electricity usage data from network devices to detect fluctuations and swiftly identify and stop attacks.

2022-10-14

Legacy Technology is Undermining How Business Responds To Ransomware

Obsolete: Half of UK organisations surveyed depend on outdated, legacy backup and recovery infrastructure to manage & protect their data.

2022-10-14

Microsoft Teams Is Vulnerable To GIFShell Attacks

GIFShell: A new attack technique allows threat actors to exploit Microsoft Teams for phishing attacks and remote data theft using image files.

2022-10-18

Security Patching As A Service

Aunalytics launches its Security Patching Platform, Co-managed Patching As A Service to complement their Advanced Security solution suite.

2022-09-29

How To Outsmart Increasingly Complex Cyber Attacks

Outsourcing elements of security can help organisations reach better security outcomes previously exclusive to large enterprises. By Leyton Jefferies

2022-10-03

Cyber Crime Weaponised: What Business Can Learn From Ukraine

A New Era Of Cyber Warfare: The cyber aspects of the conflict in Ukraine will continue to resonate long after the guns have been silenced.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

UK Cyber Week Expo & Conference

UK Cyber Week Expo & Conference

Award-winning event organiser ROAR B2B announces the launch of UK Cyber Week and its inaugural event on 4 and 5 April 2023 at the Business Design Centre, London.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Global Secure Solutions (GSS)

Global Secure Solutions (GSS)

Global Secure Solutions is an IT security and risk consulting firm and authorised ISO training partner for the PECB.

My Data Recovery Lab

My Data Recovery Lab

We recover data from: HDDs, RAIDs, NAS, SSDs, USB Flash Devices, Desktop Computers, Mobile devices and other data storage media.

European Network for Cyber Security (ENCS)

European Network for Cyber Security (ENCS)

ENCS’s core focus is around educating and solving cyber security challenges in the development and operation of energy grids across Europe.

QuintessenceLabs

QuintessenceLabs

QuintessenceLabs offers a suite of Data Security technology, products and solutions to secure digital information in-transit, at-rest or in-use.

4iQ

4iQ

4iQ fuses surface, social, deep and dark web sources to research and assess risks to people, infrastructure, intellectual property and reputation.

Averon

Averon

Averon's technology is the new gold standard for digital identity - the easiest, fastest and most secure verification solution for users on both WiFi and LTE.

ERPScan

ERPScan

ERPScan’s primary mission is to provide Smart solutions to assess and protect ERP systems and business-critical applications from both cyber-attacks and internal fraud.

Cyber London (CyLon)

Cyber London (CyLon)

CyLon is a leading cyber security accelerator and seed investment programme. We help entrepreneurs from across the globe to build cyber security businesses, raise investment, and develop partnerships.

Wayra UK

Wayra UK

Wayra UK, part of Telefónica Open Future, has been chosen to run a new cyber accelerator facility to help UK start-ups grow and take the lead in producing the next generation of cyber security systems

Romanian Association for Information Security Assurance (RAISA)

Romanian Association for Information Security Assurance (RAISA)

RAISA promotes and supports information security activities and creates a community for the exchange of knowledge between specialists, academic and corporate environment in Romania.

IXDen

IXDen

IXDen provides a novel software-based approach to OT systems protection, covering Industrial IoT cybersecurity and sensor data integrity.

TOAE Security

TOAE Security

TOAE Security is a trusted cyber security consulting partner helping today's leading organizations protect their most important assets from evolving cyber threats.

InCyber

InCyber

InCyber's mission is to defend enterprises against Insider Threats and/or those who are impersonating Insider credentials such as Hackers, Terrorists, and Malware.

SIA Group

SIA Group

SIA Group, an Indra company, combines Consulting, Systems Integration and Managed Services in four specialized business areas: Information Security, Storage, IT Management and IT Mobility.

Mandiant

Mandiant

Mandiant deliver dynamic cyber defense solutions powered by industry-leading expertise, intelligence and innovative technology.

Magna5

Magna5

Magna5 is a managed IT service provider focusing in network and server monitoring, backup and disaster recovery, cybersecurity, help desk and SD-WAN.