TECHNOLOGY > > Resilience


« Back to News

2024-07-19

Large-Scale IT Outage Causing International Disruption

Supply Chain Incident: Services in multiple countries are affected. Airlines, government agencies, banks, telecoms & media outlets in chaos.

2024-07-18

Are Any Of Your Suppliers A Security Risk Waiting To Happen?

Organisations are only as strong as the weakest link in their supply chain. Avoiding risky 3rd-party vendors & suppliers is vital. By Manuel Sanchez

2024-07-16

The Top Nine API Security Vulnerabilities

Understanding common API vulnerabilities, how cybercriminals are targeting them, and what you can do to prevent them. By Marco Palladino

2024-07-12

Human Error - The Weakest Point In Cyber Security 

In a survey, 74% of CISOs report human error to be perceived as the weakest point and the most significant vulnerability in cybersecurity.

2024-07-10

Navigating The Complexities Of Data Backups In A Hybrid World

Going Hybrid: Many businesses mistakenly believe that cloud providers handle all backup needs, but this is usually not the case. By Brent Torre

2024-07-03

Treading A Safe Path - Navigating Hidden Ransomware Risks

Urgent Decisions - To Pay Or Not To Pay?: It’s not just a financial transaction, but a complex legal & ethical minefield. By Rob Smith

2024-07-11

Rising AI Security Threats To Small Businesses

Be Prepared: What are the top AI-driven cybersecurity threats that small businesses must be aware of and be prepared to combat in 2024?

2024-07-01

Safeguarding Enterprises & Individuals In The IoT Era

The Internet of Things introduces significant privacy & security risks that must be addressed to safeguard enterprises. By John Linford

2024-07-01

Cybersecurity Is A Serious Concern For The Mid-Market

Many mid-market businesses that handle their own security suffer from alarming gaps in basic protections & a lack of expertise. By Pravesh Kara

2024-06-28

The Crucial Role Of AI Red Teaming In Safeguarding Systems & Data

Red teaming exercises are one of the best ways to identify security & safety concerns in emerging technologies like generative AI. By Dane Sherrets

2024-06-25

How To Effectively Detect & Prevent SAP Threats

Porous Entry Points: SAP systems contain IT-enabled or overlooked vulnerabilities which leave them open to exploitation. By Christoph Nagy

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Blue Solutions

Blue Solutions

Blue Solutions is a consultancy-led, accredited software distributor who provides IT solutions and support to small and medium enterprises.

Secure India

Secure India

Secure India provides Forensic Solutions that help Government and Business in dealing with prevention and resolution of Cyber related threats.

SentinelOne

SentinelOne

SentinelOne is a pioneer in delivering autonomous security for the endpoint, datacenter and cloud environments to help organizations secure their assets with speed and simplicity.

FedRAMP

FedRAMP

FedRAMP, is a government-wide program that provides a standardized approach to security assessment, authorization, and continuous monitoring for cloud products and services.

TechCERT

TechCERT

TechCERT is Sri Lanka’s first and largest Computer Emergency Readiness Team (CERT).

ATIA

ATIA

ATIA provides consulting services in the design and implementation of IT system, Information Security, ISO certification, and professional IT training and education.

AXA XL

AXA XL

AXA XL is the P&C and Specialty Risk Division of AXA. Professional insurance products include Cyber Insurance.

Cyan Securiy Group

Cyan Securiy Group

Cyan provide best-in-class cyber security solutions for mobile Internet and mobile devices that are extremely effective and highly intuitive in their use.

American Cybersecurity Institute

American Cybersecurity Institute

American cybersecurity Institute is a newly formed not-for-profit organization dedicated to education, advocacy, study and analysis in the space of cybersecurity law and policy.

SECFORCE

SECFORCE

SECFORCE is a leading information security consultancy specialising in bespoke penetration testing and red team engagements.

Lightspin

Lightspin

Lightspin is a contextual cloud security platform that continuously visualizes, detects, prioritized, and prevents any threat to your cloud stack.

CyberHub

CyberHub

CyberHub is an educational platform that offers professional courses and knowledge sharing through articles and videos to help students discover their potential in cybersecurity.

Beyon Cyber

Beyon Cyber

Beyon Cyber offer a complete portfolio of advanced solutions & services for cyber security in Bahrain.

BuddoBot

BuddoBot

BuddoBot has been a pioneering force in cybersecurity and information technology since 2008.

Token

Token

Token is changing the way our customers secure their organizations by providing passwordless, biometric, multifactor authentication.

Coalition for Secure AI (CoSAI)

Coalition for Secure AI (CoSAI)

CoSAI is an open ecosystem of AI and security experts from industry leading organizations dedicated to sharing best practices for secure AI deployment and collaborating on AI security research.