TECHNOLOGY > > Resilience


« Back to News

2016-11-16

Cant Be Bothered: Non-Security Policy Used By 90% Of Workers

Most workers put convenience ahead of security policies, with 90% of them admitting to ignoring them when they feel they need to.

2016-11-11

A Career In Cyber Security Governance?

Cyber security governance jobs are growing faster than IT and there just aren't enough skilled professionals to fill the available jobs.

2016-11-10

Education Is The Key To Minimise Cyber Risk For Business

Cyber criminals are constantly coming up with new ways to steal information; sometimes sophisticated, sometimes not, but all can be effective.

2016-10-29

DDoS: Deceptive Denial Attacks

Increasingly sophisticated techniques deployed by attackers using DDOS methods are making the reported size of such attacks redundant.

2016-10-19

Dealing With Insider Data Theft

To learn that your company's confidential data was stolen, not by a hacker, but by an employee, is a nightmare scenario nobody wants to face.

2016-10-18

The Science of Threat Intelligence

Threat intelligence is a new technique that helps security organisations recognise attack indicators and target their response fast & accurately.

2016-09-30

‘USB Killer’ Destroys Electronic Devices

A small USB device that can destroy any electronic device into which it is plugged.

2016-09-26

Managing Cyber Risk

Effective cybersecurity depends on humans and artificial machine intelligence working together to protect businesses, institutions and communities.

2016-09-26

Staff Training 'Not enough to stop most data breaches'

Companies leave themselves wide open to cyber-attacks due to staff negligence. Training alone is not sufficient to change risky employee behaviour.

2016-09-20

Cloud-Based Malware Now Delivers Ransomware

Concerns over ransomware are growing and a new study finds that nearly half of all cloud-based malware now delivers ransomware applications.

2016-09-14

US Spy Agencies Will Analyse Insider-Threats

Sentimental: US spy agency plans to identify the people inside the organization most likely to abuse their access privileges by analysing text.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

SecDev

SecDev

SecDev is a consulting firm working at the intersection of geopolitical, digital, urban, energy and cyber risk.

Array Networks

Array Networks

Array Networks, the network functions platform company, develops purpose-built systems for hosting virtual networking and security functions with guaranteed performance.

Athena Dynamics

Athena Dynamics

Athena Dynamics focuses on Cyber Security, especially in Critical Information Infra-structure Protection and Enterprise IT Operation Management products and Services.

D3 Security

D3 Security

D3's Smart SOAR platform is at the forefront of the security automation revolution, helping clients around the world to rapidly identify, analyze, and resolve advanced threats.

Berwick Partners

Berwick Partners

Berwick Partners’ Cyber Security Practice is a leading recruiter of senior management positions in this field; we have an exceptional understanding of the constantly changing Cyber landscape.

CSIRT-IE

CSIRT-IE

CSIRT-IE is the body within the NCSC that provides assistance to constituents in responding to cyber security incidents at a national level for Ireland.

Innovative Solutions (IS)

Innovative Solutions (IS)

Innovative Solutions is a specialized professional services company delivering Information Security products and solutions for Saudi Arabia and the Gulf region.

Nucleon

Nucleon

Nucleon enables cybersecurity tools, organizations and software developers to become proactive by blocking threats before they become breaches.

Desec Security

Desec Security

Desec's training platform allows professionals around of the world to acquire knowledge and practical experience in Information Security.

Inavate Consulting

Inavate Consulting

Inavate Consulting are experts in defining and implementing information assurance solutions and governance frameworks. Our ISO27001 consultants are the most experienced in the industry.

Lewis Brisbois

Lewis Brisbois

Lewis Brisbois offers legal practice in more than 40 specialties, and a multitude of sub-specialties including Data Privacy & Cybersecurity.

KETS Quantum Security

KETS Quantum Security

KETS harnesses the properties of quantum mechanics to solve challenging problems in randomness generation and secure key distribution and enable ultra secure communications.

Conquest Cyber

Conquest Cyber

Conquest Cyber builds adaptive risk management programs where innovation is most needed – within defense, intelligence, federal civilian agencies and the industrial base that supports them.

Trustifi

Trustifi

Trustifi leads the market with the easiest to use and deploy email security products, providing both inbound and outbound email security from a single vendor.

WiebeTech

WiebeTech

WiebeTech’s line of digital forensics tools provide innovative and rugged devices for efficient disk imaging and evidence capture.

ClearShark

ClearShark

Since 2001, ClearShark has been a go-to adviser in the U.S. Public Sector for creating customized and integrated solutions for the most secure of networks.