TECHNOLOGY > > Resilience


« Back to News

2020-02-13

Poor Cyber Resilience In Aviation

Only 3 out of 100 of the world's largest airports are secure against cyber security risks like vulnerable data and misconfigured applications.

2020-02-12

WEBINAR: How To Leverage Endpoint Detection & Response (EDR) In AWS Investigations

Thursday, February 20 | Join SANS & AWS Marketplace to learn about adding EDR features to your Amazon Web Services environment.

2020-01-28

Travelex Slowly Recovering From Ransomware Attack

Travelex has restored some of its systems after a crippling malware attack, but is declining to say if it has paid the hackers a ransom.

2020-01-20

Five Risks That Will Define Cyber Security In 2020

2019 was a bad year for data security and there is no indication that 2020 will be any better. Here are five big risks that endanger company data.

2020-01-17

The Scope Of A Cyber Security Audit

A false sense of security is prevalent across many organisations and is one of the major reasons why cyber criminals continue to be so successful.

2020-01-17

Artificial Intelligence Is Transforming Cyber Security

AI applications can enable organisations to detect, prevent or react to emerging cyber threats more promptly and more effectively than ever before.

2020-01-13

WEBINAR: How to improve security visibility and detection-response operations in AWS

Thursday, January 30 2020 | 11:00AM PT (2:00PM ET) How to reduce noise from security alerts & prioritize incidents more effectively.

2019-12-18

Insiders Are Cyber Criminals Favourite Connection

Many companies fail to consider their people to be just as important as the software & systems they use to protect themselves against cyber threats.

2019-12-16

Cybercrime’s Deadly Impact On Business

A single successful attack can seriously damage your business, cost big money, burden your customers and affect your business's reputation.

2019-12-10

Can Small Business Beat Cyber Attacks?

A good cybersecurity strategy is essential for any business, no matter its size, but with the severe skills shortage, what’s a small business to do?

2019-12-06

Creating A Cyber Incident Response Policy

Incident response is an organised approach to addressing and managing the aftermath of a security breach or cyberattack. You might need it.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Computer Laboratory - University of Cambridge

Computer Laboratory - University of Cambridge

Computer security has been among the Laboratory’s research interests for many years, along with related topics such as cryptology

IPCopper

IPCopper

IPCopper specializes in network packet capture appliances for cybersecurity, cybersurveillance and network monitoring, and encrypted data storage.

OPSWAT

OPSWAT

OPSWAT is a software company that provides solutions to secure and manage IT infrastructure.

CERT-AM

CERT-AM

CERT-AM is the national Computer Emergency Response Team for Armenia.

Oznet Cyber Security

Oznet Cyber Security

Oznet Cyber Security is dedicated to offering integral solutions oriented to the support and security of information.

IAmI Authentications

IAmI Authentications

IAmI is a first in Tokenization Cloud-based IAM Security Services, delivering the most advanced form of Two-Factor Authentication.

DataFleets

DataFleets

DataFleets is a privacy-preserving data engine that unifies distributed data for rapid access, agile analytics, and automated compliance.

IDX

IDX

IDX is the leading consumer privacy platform built for agility in the digital age.

SolCyber

SolCyber

SolCyber, a Forgepoint company, is the first modern MSSP to deliver a curated stack of enterprise strength security tools and services that are accessible and affordable for any organization.

Schneider Downs

Schneider Downs

Schneider Downs & Co. provides accounting, tax and business advisory services through innovative thought leaders who deliver their expertise to meet the individual needs of each client.

Charles IT

Charles IT

Charles IT is your friendly, no-nonsense IT team focused on helping companies make their technology work for them. We focus on building relationships that deliver results.

Atlantic Data Security

Atlantic Data Security

Atlantic Data Security is skilled in the analysis, recommendation, deployment, and management of all critical components of the security infrastructure.

Pessimistic Security

Pessimistic Security

The team behind Pessimistic helps blockchain startups meet modern security challenges since 2017.

KBE Information Security

KBE Information Security

KBE is a global consulting firm, with offices in Toronto and Milan, which specializes in the area of IT and information security with over 20 years of experience.

Exacom

Exacom

Exacom is a leading provider of multimedia logging/recording solutions across public safety, government, DoD, energy, utilities, transportation, and security applications.

Argantic

Argantic

Argantic aims to help organisations thrive and reach their full potential in a modern cloud-centric era.