TECHNOLOGY > > Resilience


« Back to News

2016-04-19

Seven Profiles Of Highly Risky Insiders

To understand these insiders and why they pose a risk, start by looking at the root of the problem.

2016-04-13

Cyber Crime Forensics

Cybercrime is the fastest growing area of crime in the world. The demand for cyber security professionals is higher than ever.

2016-04-13

Mapping Unknown Risk

Business and cyber attackers are at a constant war. Its scale is enormous and the techniques deployed are incredibly intricate.

2016-04-13

People Are (Still) The Biggest Security Risks

Curiosity: It's better to think before you click.

2016-04-13

Execs: We’re Not Responsible For Cybersecurity

More than 90% of corporate executives say they can't read a cybersecurity report and are not prepared to handle a major attack.

2016-04-11

Is Breach Notification Part Of Your Response Plan?

Is customer-facing breach notification and response a part of your incident response plan? It should be!

2016-04-06

The Top 4 IT Risks For Small Businesses

Most small businesses assume that the bigger enterprises are more under cyber threat. This assumption is not right.

2016-03-31

Facial Recognition Might Stop the Next Brussels

Keeping terrorists away from crowded spaces requires recognizing them before they get there. No easy task.

2016-03-28

Cybersecurity Training, Military Style

Cybersecurity-training programs modeled on military tactics are making their way to the private sector.

2016-03-09

Reduce Risk With Threat Intelligence

Do you want to be more proactive in managing risk? What is the risk if you don’t pay attention to knowledge learned from previous events?

2016-03-02

Big Data & Predictive Analytics Can Identify Cyber Risks

Using predictive indicators to detect the unknown risk is incredibly challenging but, properly used, big data can solve big business problems.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Bsquare

Bsquare

Bsquare DataV software and engineering services help enterprises implement business-focused Internet of Things systems.

Zayo

Zayo

Zayo is a leading global bandwidth infrastructure services provider for high-performance connectivity, secure colocation and flexible cloud services.

Onapsis

Onapsis

Onapsis is a pioneer in cybersecurity and compliance solutions for cloud and on-premise ERP and business-critical applications.

Malta Information Technology Agency (MITA)

Malta Information Technology Agency (MITA)

MITA is the central driver of Government Information and Communications Technology (ICT) policy, programmes and initiatives in Malta.

Protocol Policy Systems

Protocol Policy Systems

Protocol Policy Systems specialise in IT policy deployment and management systems that deliver compliance and secure computing environments.

Celestya

Celestya

Celestya is dedicated to providing the most advanced and cost effective systems for human behavior education on cybersecurity awareness training.

BeDefended

BeDefended

BeDefended is an Italian company operating in IT Security and specialized in Cloud and Application Security with years of experience in penetration testing, consulting, training, and research.

Ritz

Ritz

Ritz is the largest holistic pure-play cyber security solutions provider in Myanmar.

Armorblox

Armorblox

Armorblox stops targeted email attacks such as 0-day credential phishing, payroll fraud, vendor fraud, and other threats that get past legacy security controls.

Collins Aerospace

Collins Aerospace

Collins Aerospace provides cybersecurity services and systems to protect critical infrastructure facilities and railroad operations.

Constella Intelligence

Constella Intelligence

Constella Intelligence provides digital risk protection services to quickly and efficiently disrupt cyber attacks and data breaches before they occur.

Wadilona Cyber Securities

Wadilona Cyber Securities

Wadilona Cyber Securities' sole aim is to bring and secure Information and Communications Technology (ICT) to and work for humans in its simplest terms.

Cybalt

Cybalt

Cybalt is a security services company that provides end-to-end security solutions to help clients achieve their business goals.

Zeus Cloud

Zeus Cloud

Zeus Cloud provide clients with world-class web hosting services to businesses both big and small.

ITButler e-Services

ITButler e-Services

At IT Butler, our mission is crystal clear: we are dedicated to providing top-tier cybersecurity solutions and best-practice methodologies to secure and enhance your digital infrastructure’s resilienc

Cyberscore

Cyberscore

CyberScore specialize in digital security assessments that preventively make digital environments safer against malicious attacks from inside and outside.