TECHNOLOGY > > Resilience


« Back to News

2023-05-11

What The Latest Cybersecurity Trends Mean For Your SME 

Prevention Is Better Than Cure: Employee awareness, a protected domain name and strong authentication protocols can help manage risk.

2023-05-05

Encryption, Security & Privacy

The Intrusive Nation State: How can fully homomorphic encryption advance security practices while preserving privacy? By Ghazi Ben Amor

2023-05-15

Cyber Security And Ransomware Attacks - Problems & Solutions

Stay Ahead Of The Criminals: Five best practices will help you create a roadmap for a comprehensive ransomware prevention strategy. 

2023-05-03

Retrofixing The Remote Workforce

Combining technologies over a single platform can provide a cohesive security solution that can monitor endpoints & network access. By Tim Wallen

2023-05-03

Is ISO 27001 Worth It?

The Only Auditable International Standard For Information Security: What are the relative pros & cons of ISO 27001 - is it worth it? By Phil Robinson

2023-05-03

Why Zero Trust Is Fundamental In Today’s Economic Climate

Harnessing affordable zero trust architecture based solutions is preferable to investing in multiple expensive solutions. By Dominik Birgelen

2023-04-20

What Is A Credential Stuffing Attack & How To Protect Your Organization

Credential stuffing is a type of attack that relies on the fact that many people use the same usernames & passwords across multiple accounts.

2023-04-25

As A Business Leader, You Must Manage Cyber Risk 

Cyber attacks are a key risk for boards and any director seeking to add value for corporate stakeholders should appreciate the growing jeopardy.

2023-04-14

Has Someone Taken Out A Subscription Against You?

LogIn To Go Hacking: Criminals can now buy ransomware-as -a service just as cheaply as they can subscribe to Netflix. By Rob Quickenden

2023-04-12

Immutable Storage Is The One Solution That Will Keep Your Data Safe

Immutable data storage ensures data security and integrity in multi-cloud and hybrid-cloud environments in several ways. By Florian Malecki

2023-03-31

If It’s Convenient Be Suspicious – The Human Aspect

When 21% of breaches occur because of human error, how do CIOs encourage employees to care about security? By Travis Everett

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Ciklum

Ciklum

Ciklum provide specialist software QA and testing services including Security QA and Performance QA, QA Automation and Manual QA.

Arsenal Insurance Company

Arsenal Insurance Company

Arsenal is an insurance provider based in Moscow, Russia. Services offered include Cyber Risk insurance.

Napatech

Napatech

Napatech develops and manufactures high speed network accelerators specifically designed for real-time network monitoring and analysis applications.

idappcom

idappcom

idappcom provides unique industry approved software solutions for auditing and enhancing the threat recognition and response capabilities of your corporate security defences.

TCPWave

TCPWave

TCPWave IPAM is the world’s first acclaimed DNS/DHCP management software to pass the most stringent Information security tests.

ZenMate

ZenMate

ZenMate is a Virtual Private Network services provider offering secure encrypted access to the internet.

Bluink

Bluink

Bluink specializes in identity and access management and customer identity verification, using your smartphone as a strong authenticator and secure identity store.

Emirates International Accreditation Center (EIAC)

Emirates International Accreditation Center (EIAC)

EIACI is the national accreditation body for the United Arab Emirates. The directory of members provides details of organisations offering certification services for ISO 27001.

MISP Project

MISP Project

The MISP threat sharing platform is a free and open source software helping information sharing of threat intelligence including cyber security indicators.

Research Institute in Secure Hardware and Embedded Systems (RISE)

Research Institute in Secure Hardware and Embedded Systems (RISE)

The UK Research Institute in Secure Hardware and Embedded Systems (RISE) seeks to identify and address key issues that underpin our understanding of Hardware Security.

IN4 Group

IN4 Group

IN4 Group is a skills, innovation and start-up services provider that specialises in supporting businesses with the training, communities, networks and advice they need to scale.

Celebrus

Celebrus

Celebrus Fraud Data Platform, by D4t4 Solutions, works with existing fraud structures to augment functionality and turn fraud management into true fraud prevention.

Fairdinkum Consulting

Fairdinkum Consulting

Fairdinkum is a leading full-service IT consulting firm with more than two decades of experience in the industry.

Strata Information Group (SIG)

Strata Information Group (SIG)

Strata Information Group (SIG) is a trusted partner in IT solutions and consulting services.

SIEM Xpert

SIEM Xpert

SIEM Xpert is a leader in Cyber Security Trainings and services since 2015.

Mercury Systems

Mercury Systems

Mercury Systems is the leader in making trusted, secure mission-critical technologies profoundly more accessible to aerospace and defense.