TECHNOLOGY > > Resilience


« Back to News

2023-11-07

Five Critical Security Measures To Enforce API Security 

Application Programming Interfaces are popular targets for attack - proper attention to security & governance can reduce your risk. By Marco Palladino 

2023-11-01

The Criminal Use Of AI Is Increasing 

A Whole New Level Of Threat: The dynamic nature of AI-driven attacks can render established static & legacy defense techniques ineffective. 

2023-10-31

Defenders Of The Cybersecurity Command Centre  

The SecOps Team: Serving as the frontline by protecting the digital fortress from the myriad of tools available to threat actors. By Fabien Rech

2023-10-30

Senior Managers Need Higher Cyber Security Awareness Than Other Employees

Walking The Walk: Cyber risk awareness among top-level management teams is increasing, as they focus more on cyber security.

2023-10-30

Cyber Risk & Ransomware In 2023

Not If But When: Every 11 seconds a business falls victim to a ransomware attack and it's vital to stay ahead of the evolving threat. By Rob Smith

2023-10-30

The Security Measures Professionals Use To Prevent Being Attacked

Expert Advice: Understanding the consequences of an online action will lead users to understand their risks and take the right precautions. 

2023-10-26

How Businesses Can Avoid Firewall Vulnerabilities

Managed Firewall Services: Without help, thinly spread cybersecurity teams risk failing to protect valuable company data. By Erik Nordquist

2023-10-25

How Cybercriminals Could Be Infiltrating Your Supply Chain

Island Hopping: Infiltrating a single, weaker target to exploit existing credentials and gain access into larger enterprises. By Stuart Hodkinson

2023-10-23

ZTNA Is The Foundation Of Great VDI Deployments

Virtual DeskTop Infrastructure: Ensuring security in hosted desktop architectures can be a challenge. Zero Trust is the solution. By Karen Gondoly

2023-10-20

Four Key Cybersecurity Trends For Industrial Companies

Unlocking Cybersecurity: Manufacturing, energy, transport & utility firms offer hackers many entry points to find vulnerabilities. By Edgardo Moreno

2023-10-16

Understanding The Threat Of QR Codes & Quishing

Don't Take The Bait: What is quishing? What are the risks to your organisation and what can you do to mitigate them? By Steve Jeffery

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

WhiteHat Security

WhiteHat Security

WhiteHat’s products enable customers to “Hack Yourself First” so that they gain a greater understanding of the actual risk to their business.

Marsh

Marsh

Marsh is a global leader in insurance broking and risk management and has been a leader in combatting cyber threats since their emergence.

Green Hills Software

Green Hills Software

Green Hills Software is the largest independent vendor of embedded secure software solutions for applications including the Internet of Things.

OnSystem Logic

OnSystem Logic

OnSystem Logic has developed a unique, patent-pending solution to solve the problem of the exploitation of flaws in application software as a technique for cyber attacks.

Assystem

Assystem

Assystem delivers a comprehensive security approach for the industrial and service sectors that integrates physical security systems, industrial cyber-security, functional safety and dependability.

Garland Technology

Garland Technology

Garland Technology specializes in network access points (TAPs) for 100% visibility allowing you to see every bit, byte, and packet flowing through your network.

Global Lifecycle Solutions EMEA (Global EMEA)

Global Lifecycle Solutions EMEA (Global EMEA)

Global EMEA provides full lifecycle services to corporate Clients covering procurement, configuration, support, maintenance and end-of-life asset management.

Australian Cyber Collaboration Centre (A3C)

Australian Cyber Collaboration Centre (A3C)

A3C assists business to understand and navigate the cyber ecosystem to address their specific cyber needs. It is a central connection point for businesses looking to improve their cyber resilience.

AiCULUS

AiCULUS

AiCULUS is a global technology company that specializes in API security and Risk Management products.

Sertainty

Sertainty

Sertainty enables developers to mix intelligence into data files for active risk mitigation and data control. Discover the impact of Data: Empowered.

CybrHawk

CybrHawk

CybrHawk is a leading provider of information security-driven risk intelligence solutions focused solely on protecting clients from cyber-attacks.

Laminar

Laminar

Laminar provides the only Public Cloud Data Protection solution that provides full visibility and enforcement capabilities across your entire public cloud infrastructure.

Zeva

Zeva

Zeva solves complex identity and encryption challenges for the federal government and corporations around the globe.

Oxeye

Oxeye

Oxeye fills the gap between cloud and code to show exploitable vulnerabilities, and their path from API to code. More visibility. Less noise. More time to build.

InfoSec Brigade

InfoSec Brigade

InfoSec Brigade offers a suite of specialized solutions that help businesses to mitigate risk by integrating cyber and IT security protocols with business goals.

Silent Circle

Silent Circle

Silent Circle is the leader in end-to-end enterprise solutions for secure mobile communications.