TECHNOLOGY > > Resilience


« Back to News

2020-11-11

The Five Best Ways To Secure Your Cloud Environment

Cloud migration is almost complete for many businesses. Unfortunately, cloud account breaches are increasing. What's to be done? By Mina Khaki

2020-10-27

Anticipating Cyber Attacks

Cyber security teams need to shift their focus inside the network and implement tools that help detect cyber attacks as early as possible.

2020-10-13

The Software Industry Delivers Appliances With Known Vulnerabilities

Software vendors often distribute their products on virtual appliances with exploitable vulnerabilities running on outdated operating systems.

2020-09-16

Cyber Security Training For Employees

It's a plain truth that employees, from senior management to part-timers, are the largest cyber security vulnerability that any organisation faces.

2020-09-10

Need to Evolve to a Risk-Based Vulnerability Management Strategy but Don’t Know How? This Guide Will Show You.

Implementing a Risk-Based Vulnerability Management Solution is easier than you think. This Guide from Tenable shows how: Download

2020-09-04

Cyber Security: Take Action

Cyber Resilience: Keeping a business cyber-secure is not an easy option and requires specialist knowledge and analysis. We can help.

2020-09-07

The Risks & Benefits Of Cloud Security

Cloud computing involves relying on a service provider to store and process your vital data, which requires a willingness to give up control.

2020-09-08

Cyber Security Training For Home & Mobile Working

Remote work has become a necessity for organisations trying to secure business continuity and that comes with big new risks to be managed.

2020-09-01

Boards Should Insist On A Cyber Audit

Corporate boards are pivotal in improving the levels of company-wide cyber security and are responsible for managing cyber security resilience.

2020-09-10

Webinar: How to continuously monitor and assess your security posture in the AWS Cloud

Join SANS and AWS Marketplace to learn how to implement an effective continuous monitoring and assessment strategy in the AWS Cloud.

2020-08-25

AI Helps Organisations Resist Cyber Crime

Attacks are growing in volume and complexity all the time and AI is helping under-resourced cyber security teams stay ahead of threats.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

EC-Council

EC-Council

EC-Council is a member-based organization that certifies individuals in various e-business and information security skills.

Digital Defense Inc (DDI)

Digital Defense Inc (DDI)

DDI offers vulnerability scanning, penetration testing, web application testing, social engineering and additional security assessments.

idappcom

idappcom

idappcom provides unique industry approved software solutions for auditing and enhancing the threat recognition and response capabilities of your corporate security defences.

Veriato

Veriato

Veriato develops intelligent solutions that provide companies with visibility into the human behaviors and activities occurring within their network, making them more secure and productive.

Sponge

Sponge

Sponge is a world-renowned digital learning provider on a mission to make learning unforgettable.

EPIC Insurance Brokers & Consultants

EPIC Insurance Brokers & Consultants

EPIC is an insuarnce broker and consultancy firm. Risk management services include risk consultancy and cybersecurity insurance.

QuillAudits

QuillAudits

QuillAudits offers advanced Ethereum, EOS, TRON smart contract audit, blockchain protocol security and formal verification to ensure your platform’s integrity.

Sprint Networks

Sprint Networks

Sprint Networks is a trusted compliance and risk program advisor which deliver cost-effective technology to reduce enterprise-wide risk.

Redhorse

Redhorse

Redhorse provides top-tier consulting to help clients address mission-critical government problems in National Security, Networking Technology, Energy and the Environment.

Retruster

Retruster

Protect your users against phishing emails, ransomware & fraud with the most advanced, user-friendly, non-intrusive solution available.

Womble Bond Dickinson

Womble Bond Dickinson

Womble Bond Dickinson is a transatlantic law firm, providing high-quality legal experience and outstanding personal service from key locations across the United Kingdom and United States.

Strata Information Group (SIG)

Strata Information Group (SIG)

Strata Information Group (SIG) is a trusted partner in IT solutions and consulting services.

WeVerify

WeVerify

WeVerify is a platform for collaborative, decentralised content verification, tracking, and debunking.

Compugen Systems Inc (CSI)

Compugen Systems Inc (CSI)

Compugen Systems is an IT service delivery company that focuses on enabling your business outcomes.

Platview Technologies

Platview Technologies

Platview Technologies is an innovative and agile cybersecurity company with the goal of safe-guarding businesses with our world-class, industry-leading services and technology solutions.

Scytale

Scytale

Scytale is the global leader in security compliance automation, helping companies get compliant and stay compliant.