TECHNOLOGY > > Resilience


« Back to News

2018-06-27

A Guide To Addressing Corporate IoT Security

What can enterprises do to strengthen the security of their IoT environments? Here are some suggested best practices from industry experts.

2018-06-22

Its About Training, Stupid.

Both private & public sectors In S. Africa need to train their employees, the weak point in any organisation's defences, to counter cyber threats.

2018-06-20

How To Use AI & Predictive Analytics

Anticipate and prevent storage infrastructure problems by combining flash storage with cutting-edge predictive technology.

2018-06-18

How Computer Data Helped Investigate Quebec Shooter

The criminal proceedings against Quebec's mosque shooter provided insight on police use of computers to extract information about a suspect.

2018-06-15

EC-Council Sets New Application Security Training Standards

The information security certification body, EC-Council, is set to redefine application security by introducing an all new certification program.

2018-03-14

A Cyberattack Is The #1 Risk For Business

Businesses and the public sector must now push through effective cyber security initiatives to help mitigate this looming threat of cybercriminals.

2018-02-21

Tackling The Insider Threat: … Where To Start?

Many organisations still believe the insider threat is limited to a rogue employee, but insider threats don't have to be malicious.

2018-02-09

NHS Trusts Failed Cyber Security Assessment

Every single one of the 200 British NHS trusts so far assessed for cyber security resilience has failed an onsite assessment.

2018-02-01

The Role Of Blockchain In Helping Organisations Meet GDPR Compliance

Blockchain and the GDPR are two of the data management industry’s hottest buzzwords and they have more than just buzz in common.

2018-01-23

Insiders Are Behind Most Business Cybersecurity Incidents

Insider threats are a much bigger risk to cyber security than external hackers, with 74% of cyber incidents happening from within companies.

2018-01-08

GDPR Compliance & Personal Data Protection

GDPR is a fantastic opportunity to get your in-house policies, systems & technologies into shape, demonstrating compliance inside the deadline.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

MIIS Cyber Initiative

MIIS Cyber Initiative

The Cyber Initiative's mission is to assess the impact of the information age on security, peace and communications.

Grid32

Grid32

Grid32 provides independent computer system and physical security audit services to government and corporate clients of all sizes.

SolarWinds

SolarWinds

SolarWinds as a worldwide leader in solutions for network and IT service management, application performance, and managed services.

OPSWAT

OPSWAT

OPSWAT is a software company that provides solutions to secure and manage IT infrastructure.

HoxHunt

HoxHunt

HoxHunt is an automated cyber training program that transforms the way your employees react and respond to the growing amount of phishing emails.

Compnet

Compnet

Compnet is a service company that assists customers in integrating complete ICT systems including network infrastructure and security solutions.

QuickLaunch

QuickLaunch

QuickLaunch transforms how cloud-savvy institutions and companies manage human and device authentication, authorization, access control and integration.

ValidSoft

ValidSoft

ValidSoft is a security software company, providing telecommunications-based multi-factor authentication, identity and transaction verification technology.

Brimondo

Brimondo

At Brimondo we help you to maximize and protect your brand value by being a proactive and strategic partner within brand protection with experts within intellectual property and digital assets.

Port53 Technologies

Port53 Technologies

Port53 Technologies is focused on delivering enterprise-grade, cloud-delivered security solutions that are easy to deploy, simple to manage and extremely effective.

Bechtle

Bechtle

Bechtle is one of Europe’s leading IT service providers offering a blend of direct IT product sales and extensive systems integration services.

Bright Security

Bright Security

Bright Security is a developer-centric Dynamic Application Security Testing (DAST) solution that helps organizations ship secure applications and APIs quickly and cost-effectively.

ViewQwest

ViewQwest

ViewQwest is a regional telecommunications & information technology services company. We specialize in providing Connectivity, Managed Network, Managed SD-WAN, and Managed Security solutions.

Elba

Elba

Employee security needs to be reinvented. SaaS security needs to involve end-user and awareness needs to be actionable. Meet elba, the 5-in-one cybersecurity hub with no compromises.

Aegis9

Aegis9

Aegis9 is an Australian owned and sovereign consultancy that specialises in providing tailored security solutions for both public and private sector clients based on their specific needs.

Graphiant

Graphiant

Graphiant’s Data Assurance service gives businesses end-to-end control and visibility into how data travels throughout the entire business network.