TECHNOLOGY > > Resilience


« Back to News

2022-09-14

Securing Hybrid Identity

Active Directory: Hybrid environments are prone to errors & misconfigurations that leave the door wide open to cyber attacks. By Guido Grillenmeier 

2022-09-12

The Top 4 Cyber Threats - Is Your Business Protected?

Is it possible for businesses to really be protected? Absolutely – if organisations give cyber security the attention it deserves. By Keiron Holyome

2022-09-08

Locking Down Cyber Security

Managing The Basics: Educating employees and partnering with the right cyber security technology providers will empower them to lock criminals out.

2022-09-07

VPN Configuration: Understanding DNS Leaks & How to Prevent Them

VPNs are a great way to keep your browsing activity private, but you need to ensure you choose one that offers privacy protection. By Idrees Shafiq

2022-09-07

How To Prepare For A Cyber Crisis

Crisis preparedness is about minimising the consequences of an attack as quickly as possible & maintaining business continuity. By Jo De Vliegher

2022-09-06

US Government Will Invest $15 Billion In National Cyber Security

2023 will be a good year for approved vendors as the US government goes large on defence & research spending on national cyber security.

2022-09-05

DMS Alerts Should Be Key To Organisations’ Security Orchestration

Document & Email Management System: DMS is an essential element in any organization's cyber security strategy. By Manuel Sanchez

2022-09-05

Email Infection Chains Are Diversifying In 2022

Maldocs Are The Weapon Of Choice: Over 60% of malicious payloads are embedded in various document types attached to email. By Ian Porteous

2022-08-30

It's Just Good Business To Collaborate With A Web Data Collection Partner You Can Trust

Web data enables security operators to identify and prevent real-time threats and vulnerabilities through better visibility & detection proficiency.

2022-08-29

Detect Spoofing Before Your Organisation Suffers Fraud

Business Email Compromise fraud is where cyber criminals impersonate senior managers and end users should be very cautious before paying invoices.

2022-08-26

Bluetooth Standards Are Reshaping Medical Devices

The Internet of Medical Threats: Bluetooth vulnerabilities in a new generation of medical devices can jeopardise patient safety. By Scott Register

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: How to improve your security posture with a web application firewall (WAF)

ON-DEMAND WEBINAR: How to improve your security posture with a web application firewall (WAF)

Watch this webinar to discover how a WAF goes beyond a standard firewall and helps you meet security industry compliance.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

SC Media

SC Media

SC Media arms information security professionals with the in-depth, unbiased business and technical information they need to tackle the countless security challenges they face.

Paramount

Paramount

Paramount is a regional leader in the Middle East for cybersecurity solutions and consulting services.

Feedzai

Feedzai

Feedzai provide software that uses big data analysis and machine-based learning to prevent fraud in ecommerce.

Cybersecurity & Infrastructure Security Agency (CISA)

Cybersecurity & Infrastructure Security Agency (CISA)

CISA leads the national effort to defend critical infrastructure against the threats of today and to secure against the evolving risks of tomorrow.

Digiserve

Digiserve

Digiserve by Telkom Indonesia is an end-to-end managed solutions provider committed to empowering enterprises in Indonesia.

ReFirm Labs

ReFirm Labs

ReFirm Labs provides the tools you need for firmware security, vetting, analysis and continuous IoT security monitoring.

Healthcare Fraud Shield (HCFS)

Healthcare Fraud Shield (HCFS)

The focus of Healthcare Fraud Shield is solely on healthcare fraud prevention and payment integrity with a successful approach based on many unique advantages we deliver to our clients.

Option3Ventures (O3V)

Option3Ventures (O3V)

Option3Ventures LLC specializes in finding and developing attractive investment opportunities at the frontiers of cybersecurity and immediately adjacent technologies.

Binary Defense

Binary Defense

Binary Defense protect businesses of all sizes through advanced cybersecurity solutions including Managed Detection and Response, Security Information and Event Management and Counterintelligence.

Maritime Cyber Threats Research Group - University of Plymouth

Maritime Cyber Threats Research Group - University of Plymouth

The Maritime Cyber Threats research group of the University of Plymouth is focused on investigating marine cyber threats and researching solutions.

Centre for Cyber Security Research and Innovation (CSRI) - Deakin University

Centre for Cyber Security Research and Innovation (CSRI) - Deakin University

CSRI solves the cyber security threats of tomorrow, today. We work with industry and government leaders on innovative research that has real-world impact.

Invicti Security

Invicti Security

Invicti Security is an AppSec leader transforming the way web applications are secured.

NXM Labs

NXM Labs

NXM is a leader in a leader in advanced cybersecurity software for connected devices.

AccountabilIT

AccountabilIT

AccountabilIT is a full spectrum information technology services firm for enterprises with complex information technology needs seeking relief from those challenges.

Nudge Security

Nudge Security

Nudge Security offer the world's first-ever SaaS security solution to discover shadow IT and curb SaaS sprawl across any device or location and nudges employees towards optimal security behavior.

Heron Technology

Heron Technology

Heron Technology are a technology solutions consultancy with core competencies in the areas of Cyber Security and Digital Aviation.