TECHNOLOGY > > Resilience


« Back to News

2021-03-23

British Companies Compromised By Exchange Email Hacking

Hundreds of UK company email servers have been hacked in the Microsoft Exchange breach and many are not even aware they are victims.

2021-03-22

Cyber Security For US Weapons Systems Criticised

Audit Report: Of the five branches of the US military, only the Air Force is taking the cyber security of critical weapons systems seriously.

2021-03-22

Focused Security Analysis For Your Organisation’s IT Systems

CENSUS helps clients with the cybersecurity journey by providing end-to-end, state-of-the-art assessment of their customers security posture.

2021-03-18

A New Data Management Strategy

Data growth is no longer a novelty and business organizations need to start thinking about their data as a genuine resource and not just a liability.

2021-03-16

Britain Will Build Up Its Military Cyber Capabilities

British Prime Minister Boris Johnson says the country needs to advance its cyber capabilities to ensure it can deal effectively with enemy threats.

2021-03-16

Maritime Cyber Security Is Equally Important On Land

With the global shipping industry already under pressure, addressing the risk to port infrastructure from cyber attacks has never been more critical.

2021-03-15

Ethical Hackers Are Getting Rich

Ethical hackers can make $millions when companies pay them for exposing their vulnerabilities and stress- testing their IT systems.

2021-03-15

British Cyber Security Spending Is Rising

British business is aware of the value of maintaining cyber security spending in an increasingly complex threat landscape. But is it enough?

2021-03-10

Cyber Security For The Internet of Medical Things

The Internet of Medical Things (IoMT) has the potential to improve healthcare, but if not properly secured, these devices can pose huge risks.

2021-03-04

Using AI & ML With Cyber Security

Organisations from technology companies, across healthcare to social media websites have all started to use AI in order to stop cyber attacks.

2021-03-03

Properly Securing Your Cloud System

Security in the cloud is not the same as security in the data center. Different rules and thinking apply and you should never assume your data is safe.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

BakerHostetler

BakerHostetler

BakerHostetler is one of the largest law firms in the USA We have five core practice groups including a specialty practice team in Privacy and Data Protection.

Muninn

Muninn

At Muninn (aka Wehowsky), we specialize in mitigating potential risks within your network, providing one of the leading network detection and response (NDR) solutions on the market.

CyberGuarded

CyberGuarded

CyberGuarded are an accredited vendor independent information security testing and auditing company.

Asseco Group

Asseco Group

Asseco Poland stands at the forefront of the multinational Asseco Group. We are a leading provider of state-of-the-art IT solutions in Central and Eastern Europe.

TypingDNA

TypingDNA

TypingDNA uses AI to recognise people by the way they type on desktop keyboards and mobile devices.

CryptoSec.info

CryptoSec.info

CryptoSec.info is a web resource focused on educating the beginners in the cryptocurrency space on how to properly secure their online assets from hackers and scammers.

Peraton

Peraton

Peraton provides innovative solutions for the most sensitive and critical programs in government today, developed and executed by scientists, engineers, and other experts.

Research Institute in Secure Hardware and Embedded Systems (RISE)

Research Institute in Secure Hardware and Embedded Systems (RISE)

The UK Research Institute in Secure Hardware and Embedded Systems (RISE) seeks to identify and address key issues that underpin our understanding of Hardware Security.

Allied Telesis

Allied Telesis

Allied Telesis delivers the secure, flexible, and agile solutions needed to meet the expectations of any industry’s critical mission.

B2Bcert

B2Bcert

B2BCERT one of the top companies offering ISO 9001, ISO 14001, ISO 45001, ISO 22000, ISO 27001, ISO 20000,CE Marking, HACCP, and other globally accepted standards and Management solutions.

Versent

Versent

Versent is an Australian-born technology company, focused on architecting, building & operating cloud native applications, data streams, platforms, and services.

Ingenics Digital

Ingenics Digital

Ingenics Digital is a recognized initiator and leading service provider in the areas of software development and embedded systems.

Vantor

Vantor

Vantor is a Managed Security Services Provider (MSSP) that specializes in providing outsourced, managed cybersecurity services.

ViroSafe

ViroSafe

ViroSafe is a leading value-added distributor of IT security solutions in Norway.

Operational Systems (OpSys)

Operational Systems (OpSys)

OpSys is a leading Managed IT and Cyber Security provider protecting the critical elements of businesses across the globe.

CallCabinet

CallCabinet

CallCabinet is the premier cross-platform SaaS provider for end-to-end compliant call recording, AI-driven conversation analytics, call QA, and custom business intelligence reporting.