TECHNOLOGY > > Resilience


« Back to News

2017-05-02

Technology Can Not Diminish Insider Threats By Itself

The key to reducing insider threats lies in understanding the individual’s mindset and having robust monitoring on that person's systems & data.

2017-04-26

Time To Speak The Language Of Risk

Cybersecurity is changing from a technical problem to being a risk-based issue. Security leaders stuck in reactive mode who do not adapt will fail.

2017-04-25

Cybercrime Is A Growing Threat To Small Business

Companies that are the victims of cybercrime and data breach suffer significant costs which can lead to bankruptcy for SMEs.

2017-04-24

Cybercrime Cost The Global Economy $450Billion In 2016

Hiscox Insurance chief says there is an epidemic of cybercrime costing billions. Yet, 53% of US, UK and German businesses are unprepared.

2017-04-14

Insurers Get Much More Cautious About Cyber Risk

Major US insurer Anthem wants reviews of PC usage by customers seeking damages as it may be solely their client’s fault.

2017-04-12

Ransomware 'customer support' Chat Reveals Criminals' Ruthlessness

Held to ransom by cyber extortionists? You might get easy payment terms, but absolutely no discount.

2017-03-22

New Malware Hides In Memory

DNSMessenger: Researchers at the Talos threat research group have published a report on a new form of malware that’s very difficult to detect.

2017-03-21

A Common Language For Sharing Intelligence On Cybersecurity Threats

Threat analysts need a more robust framework for characterizing suspicious activity on their endpoints and networks. By Jane Ginn

2017-03-27

Increasing Healthcare Cybersecurity Risks

As healthcare professionals and organisations become more connected via use of IoT and BYOD devices the greater the risk of a major breach.

2017-04-07

Internet of Things Is The Next Big Security Risk

The Internet of Things (IoT) has been the target of many recent high profile cyber-attacks, but the full scale of its vulnerability is yet to be seen.

2017-03-24

Stealthy Malware Is Going Mainstream

Fileless malware avoids detection by hiding its payload in secluded spots, like a computer’s RAM or kernel, independent of hard drive files to run on.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Pondurance

Pondurance

Pondurance is an IT Security and Compliance company providing services in Cyber Security, Continuity, Compliance and Threat Management.

Sepior

Sepior

Our vision is to make Sepior the leading provider of cloud-encryption software in the world.

Riskified

Riskified

Riskified is a leading eCommerce fraud-prevention company, trusted by hundreds of global brands – from luxury fashion houses and retail chains, to gift card and ticket marketplaces.

ComCERT

ComCERT

ComCERT SA is an independent, private consulting company focusing in the assistance of its customers facing the dangers of cyber threats and security incidents.

Keynetic Technologies

Keynetic Technologies

Keynetic focuses on developing cybersecurity solutions for Industry 4.0.

InFyra

InFyra

InFyra is an IoT & Telecoms specialist consultancy, with extensive global and local experience in business and technology strategy, networks and solutions development.

InferSight

InferSight

InferSight can help you design an architecture that takes into account security, performance, availability, functionality, resiliency and future capacity to avoid technological lock in and limitations

Midwest Cyber Security Alliance (MCSA)

Midwest Cyber Security Alliance (MCSA)

Midwest Cyber Security Alliance is a nonprofit, nonpartisan collaboration of individuals, businesses, government entities, and professionals advocating for more effective cyber security solutions.

CyberQP

CyberQP

CyberQP (formerly Quickpass Cybersecurity) provide Privileged Access Management built for MSPs. Our system is designed to reduce ransomware and social engineering attack risks.

Ghost Security

Ghost Security

Ghost is a venture backed, product-led startup building the new standard in application security for the modern enterprise.

Hexens

Hexens

Hexens introduces a whole new approach to cybersecurity solutions. Indisputable skills and a unique super-focused perspective on every single case are the values we create.

Transatlantic Cyber Security Business Network

Transatlantic Cyber Security Business Network

The Transatlantic Cyber Security Business Network is a coalition of UK and US cyber security companies which facilitates collaboration to help address critical cyber security challenges.

SolidityScan

SolidityScan

SolidityScan is an advanced smart contract scanning tool designed to uncover vulnerabilities and proactively address risks within your code.

Effectiv

Effectiv

Effectiv is a real-time fraud & risk management platform for Financial Institutions and Fintechs.

Aura Information Security

Aura Information Security

Aura Information Security consists of a team of highly-skilled and renowned information security professionals spanning Australia and New Zealand.

Repello AI

Repello AI

Repello - making AI safe to trust. We help you continuously red-team your GenAI applications against ever-evolving AI threat landscape.