TECHNOLOGY > > Resilience


« Back to News

2015-10-05

Insiders Responsible for 43% of Data Breaches

Among companies experiencing data breaches, internal actors were responsible for 43% of data loss, half of which was intentional, half accidental.

2015-09-22

Why Aren’t Companies Using Military Security?

Why do defense companies have classified networks to prevent cyber attack, while companies handling our critical utilities don’t?

2015-09-14

Top Risk Management Concerns: Survey Results

Companies’ fears regarding cyber threats are significant, including hacking incidents, information theft. loss of network & website access.

2015-08-04

Identity Access Management: Lessons From JPMorgan’s Insider Breaches

Another JPMorgan Chase & Co. employee arrested on charges of stealing customer data & trying to sell it for thousands of dollars.

2015-07-21

Combat the Insider Cyber Threat

Insider Threat Report uncovers the hard facts on insider threats.

2015-07-20

The Most Damaging Ramifications of DDoS Attacks

Loss of customer trust & confidence are the most damaging consequences of DDoS attacks.

2015-07-13

Use Threat Intelligence to Boost Mobile Security

Security professionals recommend companies integrate threat intelligence about cyber security with mobile device management platforms.

2015-07-10

Data Scientist: The Sexiest Job of the 21st Century

Automated solutions, whether hardware or software, are getting cheaper, faster & more versatile at an ever-increasing rate.

2015-06-29

The Cybersecurity Company Helping Sony Fend Off Hackers

Bad news for everyone else is excellent news for those in the business of fighting such cyber villains.

2015-06-23

WhiteHat Security: Majority of Websites Are Vulnerable to Data Thieves

Public administration websites had the worst record with 64% at risk every day, followed by Retail at 55%.

2015-06-23

PwC says UK Security Breaches Often Not Reported

The majority of UK organisations suffering a security or data breach will never report it.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Cyber Security Associates (CSA)

Cyber Security Associates (CSA)

Cyber Security Associates provides cyber consultancy and cyber managed services which help to detect, protect and educate against the ever-changing cyber threat.

Bishop Fox

Bishop Fox

Bishop Fox is a leading authority in offensive security, providing solutions ranging from continuous penetration testing and attack surface management to product and application security assessments.

Cloudera

Cloudera

Cloudera provide the world’s fastest, easiest, and most secure data platform built on Hadoop.

Global Digital Forensics (GDF)

Global Digital Forensics (GDF)

GDF specialise in Digital Forensics and e-Discovery. Other services include Data Breach Response and Cyber Security.

Altius IT

Altius IT

Altius IT reviews your website for security vulnerabilities and provides a report identifying vulnerabilities and recommendations to make secure.

Science Applications International Corporation (SAIC)

Science Applications International Corporation (SAIC)

SAIC is a premier technology integrator in the technical, engineering, intelligence, and enterprise information technology markets. Services and solutions include Cybersecurity.

Purple Security

Purple Security

Purple Security arises from the association of specialists in offensive security (ethical hackers, white hats) and experts in insurance, compliance and implementation of industry standards.

M2SYS

M2SYS

M2SYS is a worldwide leader in identification and authentication solutions.

Vaadata

Vaadata

Vaadata are experts in ethical hacking. We secure your web, mobile and IoT platforms.

Amadeus Capital Partners

Amadeus Capital Partners

Amadeus Capital Partners offers over 20 years’ experience in technology investment. Our areas of focus include AI & machine learning and cyber security.

SimSpace

SimSpace

SimSpace is the visionary yet practical platform for measuring how your security system responds under actual, sustained attack.

Security Weaver

Security Weaver

Security Weaver is a leading provider of governance, risk and compliance management (GRCM) software.

Harvey Nash

Harvey Nash

Harvey Nash is a leading global provider of talent and technology solutions.

Dexian

Dexian

Dexian is a leading provider of staffing, IT, and workforce solutions with nearly 12,000 employees and 70 locations worldwide.

Aeris

Aeris

Aeris IoT Watchtower is the world’s first fully integrated cyber security solution for cellular IoT devices.

SecuRedact

SecuRedact

SecuRedact is an AI-powered tool to detect and pseudonymize personal data in text and images. Fast, local, secure, and free to try.