TECHNOLOGY > > Resilience


« Back to News

2019-07-19

SMEs Run Outdated & Vulnerable Operating Systems

Security weaknesses in SMEs include antiquated Microsoft operating systems, encryption defects, poor patching and outdated email servers.

2019-06-28

SMEs Need A Disaster Recovery Plan

For Small and Medium sized businesses the cost of not updating Disaster Recovery systems can far exceed the price of staying on top of the risks.

2019-06-06

Two Years After WannaCry Severe Risks Remain

A single vulnerable and an internet-exposed system was enough to wreak havoc, yet with over a million devices still unpatched, the risks remain.

2019-05-01

Authenticating Digital Evidence

With a huge growth of digital media, the question of what types of evidence available to the police that are also admissible in court is complex.

2019-04-30

Social Media Crime Is A Threat To Business

Employees are devoting more than three hours per week to sites proven to be hotbeds of malware and that is affecting the businesses they work for.

2019-04-02

How Can Boardrooms Effectively Manage Cyber Risk?

For too long, cyber security standards and best-practice have been targeting technical and operational levels, too complex for boards to grasp.

2019-03-28

Over 90% Of Security Pros Fear Insider Threats

The vast majority of IT and security professionals surveyed said they feel vulnerable to insider threats, either malicious or accidental.

2019-03-23

Bank of England Testing Banks' Cyber Resilience

Britain's banks will have to show they could recover from a cyber-attack within hours to avoid customer payments being delayed.

2019-03-19

Cybercrime Misconceptions Put Consumers At Risk

A third of British people surveyed incorrectly believe that public Wi-Fi has to, by law, have effective security. It gets worse.

2019-03-12

Your Employees Are The Major Risk To Cyber Security

Employees are still the weak link in cybersecurity. A third of workers in Ireland used own email for work, and 24% shared files with friends.

2019-02-20

Take An Analytical Approach To Cybersecurity Training

There are many solutions designed to protect businesses from just about any security threat, yet an enterprise's biggest weakness is its people.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Nimbusec

Nimbusec

Nimbusec scans your website around the clock and informs immediately if it has been hacked or manipulated

Zentera Systems

Zentera Systems

Zentera's CoIP (Cloud over IP) solution offers enterprise-grade networking and security for the emerging cloud ecosystem.

KnowBe4

KnowBe4

KnowBe4 is an integrated platform for security awareness training combined with simulated phishing attacks.

Digital Transformation EXPO (DTX)

Digital Transformation EXPO (DTX)

Digital Transformation EXPO showcases the latest technology and insight from the world’s leading brands and experts in DX.

ThirdWatch

ThirdWatch

ThirdWatch is a Data Science company with real-time automated fraud prevention solutions.

IdentityIQ

IdentityIQ

IdentityIQ is a US-based identity theft and credit protection company designed to help users stay on top identity thieves and data breaches.

Fingent

Fingent

Fingent develops strategic software solutions for businesses across the globe in areas including Network Security, Infrastructure Security, Application Security, Risk and Compliance.

CoursesOnline

CoursesOnline

CoursesOnline.co.uk is a database listing IT security courses from providers across the UK.

3Lines Venture Capital

3Lines Venture Capital

3Lines Venture Capital invests in exceptional founders and startups working on broad disruptive themes of Future of Work, AI enabled enterprises, and Industry 4.0.

Talion

Talion

Talion aim to reduce the complexity involved in securing your organisation and to give security teams unrivalled visibility into their security operations, so they can make optimal decisions, fast.

Sydeco

Sydeco

Sydeco offer a complete range of products that secure computer and industrial networks, servers, programs and data against any type of computer attack.

Com Olho

Com Olho

Com Olho provides the measurement, analytics, quality assurance, and fraud protection technologies brands need for their business and customers.

Cyber Ranges

Cyber Ranges

Cyber Ranges is the next-generation cyber range for the development of cyber capabilities and the validation of cyber security skills and organizational cyber resilience.

Inholo

Inholo

Inholo offers tools to manage the risks of synthetic realities, starting with an AI-photo detection service.

Palindrome Technologies

Palindrome Technologies

Palindrome Technologies help clients defend against cyberattacks across all attack surfaces, including hardware, software, network-to-cloud, people, and emerging technologies.

Styx Intelligence

Styx Intelligence

Styx Intelligence’s platform provides visibility and supports remediation against threats targeting your digital assets.