TECHNOLOGY > > Resilience


« Back to News

2016-03-28

Cybersecurity Training, Military Style

Cybersecurity-training programs modeled on military tactics are making their way to the private sector.

2016-03-09

Reduce Risk With Threat Intelligence

Do you want to be more proactive in managing risk? What is the risk if you don’t pay attention to knowledge learned from previous events?

2016-03-02

Big Data & Predictive Analytics Can Identify Cyber Risks

Using predictive indicators to detect the unknown risk is incredibly challenging but, properly used, big data can solve big business problems.

2016-02-24

Cyber Risk Insurance Is A Patchwork

Use of cyber-specific wording and products may be an effective way of filling gaps of cover which exist in conventional lines of insurance.

2016-02-26

Cybersecurity To Go On The Offensive

Organizations with a sophisticated approach to cybersecurity are no longer satisfied with locking the doors after the robbery has been committed.

2016-02-10

How to Recover From The Hack Nightmare

It’s more than just the PR department’s “problem.” IT executives need to be involved in managing the fallout and crafting responses.

2016-02-02

90% of Data Breaches Are Avoidable

Nine of every ten data breaches in 2015 could have been “easily prevented,” according to a study by The Online Trust Association.

2016-02-01

Lloyd’s Insurer Says Cyber Risks Are Too Big to Cover

The head of the largest of Lloyd’s of London insurers says the potential liabilities from risks of cyber attack are too large to cover.

2016-01-25

World Economic Forum Says Cyber-attack Is A Top Risk To Business.

In 140 economies cyber-attacks rank in the top ten threats in 2016.

2016-01-13

Predictive Analytics Tools Confront Insider Threats

Advanced data analytic technology can give analysts an advantage in finding insider threats.

2015-12-24

The Secure Perimeter Cybersecurity Model Is Broken

The system is broken. It isn’t keeping us, companies, or our government safe. Worse yet, no one seems to know how to fix it.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: Harnessing the power of Security Information and Event Management (SIEM)

ON-DEMAND WEBINAR: Harnessing the power of Security Information and Event Management (SIEM)

Join our experts as they give the insights you need to power your Security Information and Event Management (SIEM).

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

DCL Search & Select

DCL Search & Select

DCL Search & Selection connect candidates to the best companies in the IT Security, Telco, UC, Outsourcing, ERP, Audit & Control markets.

National Cyber Directorate Israel

National Cyber Directorate Israel

The Israeli National Cyber Directorate provides incident handling services for civilian entities and critical infrastructures and works to increase national resilience against cyber threats.

CybergymIEC

CybergymIEC

CybergymIEC is a global leader in cyber defense solutions and training services.

Certego

Certego

Certego is a company of the VEM Sistemi Group specialised in providing managed computer security services and to combat Cyber Crime.

Vysk Communications

Vysk Communications

Vysk is an award-winning mobile security firm that has developed the world’s most secure system for voice communication.

Olfeo

Olfeo

Olfeo is a content filtering software vendor. Our proxy and filtering solution helps our customers to manage, monitor and secure their Internet traffic.

Zeusmark

Zeusmark

Zeusmark are a digital brand security company. We enable companies to successfully defend their brands, revenue and consumers online.

Global Cyber Security Capacity Centre (GCSCC) - Oxford University

Global Cyber Security Capacity Centre (GCSCC) - Oxford University

GCSCC's work is focused on developing a framework for understanding what works, what doesn’t work and why – across all areas of cybersecurity capacity.

GoSecure

GoSecure

GoSecure Managed Detection and Response helps all organizations reduce dwell time by preventing breaches before they happen.

DMARC360

DMARC360

DMARC360 analyzes your email traffic patterns and sources, rapidly deploys email authentication protocols and monitors your email domains with automated recommendations and incident response.

Raqmiyat

Raqmiyat

Raqmiyat provides end-to-end IT Services and business solutions including consultancy, digital transformation, infrastructure and cybersecurity.

spriteCloud

spriteCloud

spriteCloud is an independent software testing, test automation and cybersecurity services provider.

Adarma Security

Adarma Security

Adarma are specialists in threat management including SOC design, build & operation.

C3.ai Digital Transformation Institute

C3.ai Digital Transformation Institute

The C3.ai Digital Transformation Institute is a research consortium dedicated to accelerating the benefits of artificial intelligence for business, government, and society.

Ascent Solutions

Ascent Solutions

Ascent is built to help firms evolve their cybersecurity posture, modernize their Microsoft solutions, and accelerate their journey to the cloud.

OxCyber

OxCyber

OxCyber's mission is to ignite and encourage cybersecurity and technology growth in the Thames Valley through meetings, webinars, in person events, workshops and mentorship programs.