TECHNOLOGY > > Resilience


« Back to News

2021-06-01

Preventing Ransomware Attacks

The chances of ransomware infection can be significantly reduced by security software and by paying sufficient attention to some basic rules.

2021-05-31

Get The Best Cyber Security Audits & Training

Organisations often invest heavily in cyber security technology, but they don’t spend enough time on training, audit and the vital human factor.

2021-05-31

Missing Patches Place Security At Risk

Public sector security professionals admit that one in three UK breaches result from vulnerabilities that they should have already patched.

2021-05-28

Managing A Remote Team To Protect Against Cyber Attacks

Many more organisations are adopting remote working, but how can they manage a remote team while prioritizing cybersecurity? By Chioma Iwunze

2021-05-18

The Role Of Enterprise Architecture In Cyber Defence

Learning the lessons from the unprecedented SolarWinds attack and the role that Enterprise Architecture has to play. By Rupert Colbourne

2021-05-17

Responding To Ransomware Attacks

Ransomware attacks on business are becoming much more frequent and severe. The victims can be too paralysed to make an effective response.

2021-05-13

Stop Taking Risks Online

Here are seven risky online habits you should stop right now, plus advice on better habits that can help keep you and your family safe online.

2021-05-08

Writing An Effective Cybersecurity Policy: 5 Essential Steps

How to compile an effective operational cybersecurity policy that will make life easier in the event of a security breach. By Jessica Fender

2021-05-11

Cyber Security Shared Skills Group Created

Members will gain from actionable intelligence and tactics to improve their defensive strategies for a more resilient cyber security infrastructure.

2021-05-06

Key Trends In Cyber Security

Along with the change in many people's work environment in 2020, there are several rising trends companies need to be aware of in 2021.

2021-05-06

Securing Smart Devices

Data centers may be safe from outside intrusion, but IoT devices are often at risk of being exploited by those looking for an easier way into systems.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Digital Shadows

Digital Shadows

Digital Shadows is a cyber threat intelligence company that helps clients discover sensitive data exposed through social media, cloud services and mobile devices

France Cybersecurity

France Cybersecurity

France Cybersecurity represents the French cybersecurity industry to raise international awareness of French cybersecurity capabilities and solutions.

CERT Bulgaria (CERT.BG)

CERT Bulgaria (CERT.BG)

CERT Bulfaria is the National Computer Security Incidents Response Team for Bulgaria.

Cysec - TU Darmstadt

Cysec - TU Darmstadt

CYSEC is the Cybersecurity faculty of the Technical University of Darmstadt and performs internationally renowned research in numerous areas of cybersecurity.

Mission Secure (MSi)

Mission Secure (MSi)

MSi is a specialized provider of next generation cyber defense solutions protecting control systems and critical physical assets in energy, transportation and defense.

PROOF

PROOF

PROOF is a Brazilian leader in cybersecurity. Our goal is to assist our Customers in managing security efficiently and in tune with business needs.

S2S Group

S2S Group

S2S Group specialise in the destruction and management of IT assets at the end of the lifecycle.

AlertEnterprise

AlertEnterprise

AlertEnterprise uniquely eliminates silos and uncovers blended threats across IT Security, Physical Access Controls and Industrial Control Systems.

Ecubel

Ecubel

Ecubel is the market leader in Belgium in buying and selling used IT harware guaranteed by a certified data erasure.

Fiserv

Fiserv

Fiserv offers a wide array of Risk & Compliance solutions to help you prevent losses from fraud and ensure adherence to regulatory and compliance mandates.

US-Africa Cybersecurity Group (USAFCG)

US-Africa Cybersecurity Group (USAFCG)

USAFCG provides cybersecurity consulting services and delivers training programs for capacity building in Africa.

Network Center Inc (NCI)

Network Center Inc (NCI)

NCI is one of the largest IT solution providers in the Midwest. We specialize in industry specific technology solutions, service, support, and expertise for small to enterprise businesses.

ByteSnipers

ByteSnipers

ByteSnipers specialize in penetration testings and secure development services. Our focus is on your security.

Open Data Security (ODS)

Open Data Security (ODS)

Open Data Security is a market leader in the information security sector, offering services to companies, governments and individuals, helping them shield from hackers and cyber attacks.

CrossCountry Consulting

CrossCountry Consulting

CrossCountry Consulting is a trusted business advisory firm that provides customized finance, accounting, human capital management, risk, operations and technology consulting services.

Somerville

Somerville

Somerville are a full service IT partner with over 40 years experience delivering exceptional service and value to our customers.