TECHNOLOGY > > Resilience


« Back to News

2020-12-07

In The Age of Risk, Cyber Security Is The Leading Concern

A top insurance CEO says that Cyber Security is the most pressing exposure for business, more than the Coronavirus and climate change.

2020-11-20

Cyber Security Training For Employees

Employees, from senior management to part-timers, are the largest cyber security vulnerability that any organisation faces. They need training.

2020-11-11

The Five Best Ways To Secure Your Cloud Environment

Cloud migration is almost complete for many businesses. Unfortunately, cloud account breaches are increasing. What's to be done? By Mina Khaki

2020-10-27

Anticipating Cyber Attacks

Cyber security teams need to shift their focus inside the network and implement tools that help detect cyber attacks as early as possible.

2020-10-13

The Software Industry Delivers Appliances With Known Vulnerabilities

Software vendors often distribute their products on virtual appliances with exploitable vulnerabilities running on outdated operating systems.

2020-09-16

Cyber Security Training For Employees

It's a plain truth that employees, from senior management to part-timers, are the largest cyber security vulnerability that any organisation faces.

2020-09-10

Need to Evolve to a Risk-Based Vulnerability Management Strategy but Don’t Know How? This Guide Will Show You.

Implementing a Risk-Based Vulnerability Management Solution is easier than you think. This Guide from Tenable shows how: Download

2020-09-04

Cyber Security: Take Action

Cyber Resilience: Keeping a business cyber-secure is not an easy option and requires specialist knowledge and analysis. We can help.

2020-09-07

The Risks & Benefits Of Cloud Security

Cloud computing involves relying on a service provider to store and process your vital data, which requires a willingness to give up control.

2020-09-08

Cyber Security Training For Home & Mobile Working

Remote work has become a necessity for organisations trying to secure business continuity and that comes with big new risks to be managed.

2020-09-01

Boards Should Insist On A Cyber Audit

Corporate boards are pivotal in improving the levels of company-wide cyber security and are responsible for managing cyber security resilience.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Snort

Snort

Snort is an open source intrusion prevention system capable of real-time traffic analysis and packet logging.

FinalCode

FinalCode

FinalCode offers a file encryption and file-based enterprise digital rights management (eDRM) platform.

Prim'X Technologies

Prim'X Technologies

Prim'X Technologies provides information protection solutions to prevent unauthorised access to sensitive data.

Bericon Forensics

Bericon Forensics

Bericon is one of the longest established forensic science consultancies in the UK. Activities include computer and mobile phone forensics.

Cyjax

Cyjax

Cyjax monitors the Internet to identify the digital risks to your organisation, including cyber threats, reputational risks and the Darknet.

CyberGRX

CyberGRX

The CyberGRX Exchange and our risk assessments-as-a-service help Enterprises and Third Parties cost-effectively identify, prioritize and mitigate risk.

Sadoff E-Recycling & Data Destruction

Sadoff E-Recycling & Data Destruction

Sadoff E-Recycling and Data Destruction protect the environment and your data with proven and trusted electronics recycling and data destruction services.

Vaadata

Vaadata

Vaadata are experts in ethical hacking. We secure your web, mobile and IoT platforms.

ramsac

ramsac

ramsac provide secure, resilient IT management, cybersecurity, 24 hour support and IT strategy to businesses in London and the South East.

Akamai Technologies

Akamai Technologies

Akamai's leading security, compute, and delivery solutions are helping global companies make life better for billions of people, billions of times a day.

FluidOne

FluidOne

FluidOne are an award-winning Connected Cloud Solutions provider. We design tailored solutions to help customers and partners digitally transform their IT and communications.

OccamSec

OccamSec

OccamSec is a leading provider in the world of cybersecurity. We provide accurate, actionable information to reduce risk and enable better informed decisions.

Antivirus Tales

Antivirus Tales

Antivirus Tales offers a platform to resolve all types of antivirus-related issues. The platform also provide various blog articles and informative guides to fix antivirus software errors.

Deepware

Deepware

Deepware is an emerging AI research company dedicated to exploring the potential of GenAI in both generation and detection.

DataKrypto

DataKrypto

DataKrypto’s advanced data encryption solutions protect data throughout its lifecycle.

Hive Systems

Hive Systems

Hive Systems specialize in tailored solutions that unify risk assessments, IT, security awareness, and cybersecurity operations for businesses of all sizes.