TECHNOLOGY > > Resilience


« Back to News

2025-04-11

Do You Need Security That Starts With “Prove It”?

Deciding Between A Software-Defined Perimeter And A VPN: Both aim to secure remote access, by quite different routes. By Don Boxley

2025-04-11

Neurodiversity - The Untapped Talent Pool Solving Cybersecurity's Skills Gap 

Neurodiverse Talent: Embracing neurodiversity represents both an ethical imperative and a strategic opportunity. By Glen Williams

2025-04-07

Britain Is Unprepared To Defend Itself From Nation-State Hackers

The rising sophistication of cyber attacks and state-backed incidents has exposed many vulnerabilities within UK public sector organisations.

2025-04-08

Rethinking Cyber Defence For Tomorrow's Threats

Restricting access through identity management & authorisation can help organisations face cybersecurity challenges. By Spencer Young

2025-04-04

Vishing - The Voice Scam You Need To Know About

Dramatic Escalation In Vishing Attacks: Fighting cybercrime isn’t just about having the right tech - it’s also about being aware and cautious.

2025-04-07

DDoS Trends & Predictions For 2025

The aim is to paralyze the target’s operations - which is why DDoS protection measures are critical to an organization's cybersecurity strategy.

2025-04-07

The Security Risks Behind Shadow ML Adoption 

Defending AI: As AI models become more advanced and widely deployed, security concerns continue to mount. By Shachar Menashe

2025-04-04

Beyond MFA: A Multi-Layered Cybersecurity Strategy Is Essential

MFA Is Not Enough: Businesses must adopt a comprehensive and holistic security framework to safeguard their digital assets. By Jon Jarvis

2025-03-31

Rethinking The Role Of Penetration Testing

Security Check Box Or Key Intelligence Tool? Too many companies treat penetration testing as a static, once-a-year assessment By Rajeev Gupta

2025-03-27

Essential Strategies To Prevent Ransomware Attacks

Nurturing A Culture Of Protection: Banning ransom pay-outs addresses the symptoms, but we need to tackle the cause. By Robert Phan

2025-03-25

Combatting Rising AI Attacks With AI-Powered Defences 

User & Entity Behaviour Analytics: An effective approach to detect unknown threats by focusing on behavioural anomalies. By Kev Eley

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Scale Computing

Scale Computing

Scale Computing is an industry leading application platform for EDGE computing environments covering retail, manufacturing, financial services and government.

IoT Security Foundation (IoTSF)

IoT Security Foundation (IoTSF)

IoTSF is a collaborative, non-profit organisation with a mission to raise the quality and drive pervasive security in the Internet of Things.

Hillstone Networks

Hillstone Networks

Hillstone Networks offers a broad range of security solutions for enterprises and data center networks – whether physical, virtual, or in the cloud.

Global Information Assurance Certification (GIAC)

Global Information Assurance Certification (GIAC)

GIAC provides certification in the knowledge and skills necessary for a practitioner in key areas of computer, information and software security.

SYSGO

SYSGO

SYSGO is the leading European provider of real-time operating systems for critical embedded applications in the Internet of Things (IoT).

ScienceSoft

ScienceSoft

ScienceSoft is a provider of software development and IT consulting services including Information Security.

Velta Technology

Velta Technology

Velta Technology provide digital safety and cybersecurity solutions for the industrial space.

Mindmajix Technologies

Mindmajix Technologies

Mindmajix is a live and interactive e-learning platform that offers professional online IT training in areas including cyber security.

AwareGO

AwareGO

AwareGO is a global provider of security awareness training content and solutions that help enterprises improve cybersecurity awareness in the workplace.

Cigent Technology

Cigent Technology

Cigent keeps the most valuable asset in your organization safe—your data. Our advanced endpoint and managed network security solutions prevent ransomware and data theft.

SandboxAQ

SandboxAQ

SandboxAQ is an enterprise SaaS company combining AI + Quantum tech to solve hard problems impacting society.

FourNet

FourNet

FourNet is an award-winning provider of cloud and managed services; we work closely with our clients to enable digital transformation across their organisation.

Veriti

Veriti

Veriti is a unified security posture management platform that integrates with your security solutions and proactively identifies and remediates potential risks and misconfigurations.

Arsen Cybersecurity

Arsen Cybersecurity

Arsen is a French cybersecurity startup, dedicated to enhancing human behaviors in cybersecurity.

Kahootz

Kahootz

Kahootz is a highly secure cloud collaboration platform helping teams to work together across organisations.

Amplifier Security

Amplifier Security

Amplifier Security are on a mission to empower security teams to modernize their practice by connecting the dots between their security stack and their people.