TECHNOLOGY > > Resilience


« Back to News

2016-10-29

DDoS: Deceptive Denial Attacks

Increasingly sophisticated techniques deployed by attackers using DDOS methods are making the reported size of such attacks redundant.

2016-10-19

Dealing With Insider Data Theft

To learn that your company's confidential data was stolen, not by a hacker, but by an employee, is a nightmare scenario nobody wants to face.

2016-10-18

The Science of Threat Intelligence

Threat intelligence is a new technique that helps security organisations recognise attack indicators and target their response fast & accurately.

2016-09-30

‘USB Killer’ Destroys Electronic Devices

A small USB device that can destroy any electronic device into which it is plugged.

2016-09-26

Managing Cyber Risk

Effective cybersecurity depends on humans and artificial machine intelligence working together to protect businesses, institutions and communities.

2016-09-26

Staff Training 'Not enough to stop most data breaches'

Companies leave themselves wide open to cyber-attacks due to staff negligence. Training alone is not sufficient to change risky employee behaviour.

2016-09-20

Cloud-Based Malware Now Delivers Ransomware

Concerns over ransomware are growing and a new study finds that nearly half of all cloud-based malware now delivers ransomware applications.

2016-09-14

US Spy Agencies Will Analyse Insider-Threats

Sentimental: US spy agency plans to identify the people inside the organization most likely to abuse their access privileges by analysing text.

2016-09-21

WiFi Can Spy On You

City dwellers spend nearly every moment of every day awash in Wi-Fi signals and they can be used to monitor people in surprisingly detailed ways.

2016-09-01

Benefits of Penetration Testing

The means to identify potential vulnerabilities in your systems and prevent threats from being enacted before they can occur is vital

2016-08-30

Over 50% Data Breaches Are Due To Human Error

Cyber-fraud is malicious while a breach caused by user ignorance is not.Their organisational consequence can be equally severe.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

F5 Networks

F5 Networks

F5 products ensure that network applications are always secure and perform the way they should—anywhere, any time, and on any device.

Cyber Security Centre - University of Hertfordshire

Cyber Security Centre - University of Hertfordshire

The Cyber Security Centre provides training, teaching and research in the fast paced topics of cyber security and digital forensics.

Actiphy

Actiphy

Actiphy provides a tried and proven backup and disaster recovery software solution to ensure business continuity at all times.

WISeKey

WISeKey

WISeKey is a leading cybersecurity company currently deploying large scale digital identity ecosystems for people and objects using Blockchain, AI and IoT.

Findings

Findings

Findings (formerly IDRRA) is a scalable AI powered assessment platform that streamlines security compliance across sectors, jurisdictions and regulatory frameworks.

SensorHound

SensorHound

SensorHound’s mission is to improve the security and reliability of the Internet of Things (IoT).

SurePassID

SurePassID

SurePassID is a provider of highly secure, highly extensible multi-factor authentication (MFA) solutions.

AdEPT Technology Group

AdEPT Technology Group

AdEPT are a managed services and telecommunications provider offering award-winning, proven and uncomplicated technical solutions for over 12,000 organisations across the UK.

Hex-Rays

Hex-Rays

Founded in 2005, privately held, Belgium based, Hex-Rays SA focuses on the development of fast, stable, and robust binary analysis tools for the IT security market.

Quad9 Foundation

Quad9 Foundation

Quad9 is a free security solution that uses DNS to protect your system against the most common cyber threats. It improves your system's performance, plus, it preserves and protects your privacy.

Hadrian

Hadrian

Hadrian is modernizing offensive security practices with automation, making them faster and more scalable. Equipped with the hacker’s perspective, companies can now know what their critical risks are.

Halogen Group

Halogen Group

Halogen Group is the leading Security Solutions Provider in West Africa. Services encompass Physical Security, Electronic Security, Virtual & Cyber Security, Risk Assessments and Training.

Nicoll Curtin

Nicoll Curtin

Nicoll Curtin is a global company with over 20 years of experience in connecting outstanding talent with industry leading companies within Technology, Change and Cyber Security.

Beround

Beround

Beround is an IT consultancy firm specialized in software testing.

Fusion5

Fusion5

Fusion5 is a leading ANZ Business Services and IT Solutions provider. Our customers trust us to make their potential reality by providing advisory, IT project deployment, and managed services.

Axiotrop

Axiotrop

AXIOTROP is a Cybersecurity firm offering leading services in assessment, remediation, and validation to protect the confidentiality, integrity, and availability of regulated information.