TECHNOLOGY > > Resilience


« Back to News

2025-03-13

Protecting Digital Infrastructure Without Going Broke

A modern, data-driven age requires modern, data-storage infrastructures that protect the interests of our nation's citizens. By Adrian Fern

2025-03-11

How CISOs Can Demonstrate The Value Of Their Investments

CISOs Face Many Budget Challenges: Key strategies CISOs can adopt to communicate the value of their investments effectively. By Chad LeMaire

2025-03-10

ZTNA - Back To Basics

Zero Trust Network Architecture: Redefining cybersecurity by treating every user, device & connection as inherently untrustworthy. By Christian Have

2025-03-09

Data Breaches Cause A Financial Burden

A Multi-Faceted Approach: Risk leaders identify data breaches as a leading source of man-made disruptions causing financial burdens.

2025-03-05

Getting Ready To Stop Ransomware Attacks

Look For Warning Signs: Ransomware attacks are a process that gradually invade defensive systems in stages and need to be adequately prepared for.

2025-02-24

Cyber Doomsday Warnings Do More Harm Than Good

The constant escalation of doomsday language is a distraction from more urgent and practical cybersecurity priorities. By Joyce Hakmeh

2025-02-25

Preparing For A Cyber Crisis

How can business leaders best prepare for a cyber crisis, and what does effective management look like when an attack occurs? By Dan Potter

2025-02-23

Ransomware Trends & Top Six Predictions For 2025

Key Trends: Ransomware threats are expected to escalate in 2025, with cybercriminals adopting more sophisticated tactics to maximize their impact.

2025-02-19

The Difference Between Perception & Reality In Email Security

Mind The Gap: Outbound email security doesn’t get much attention beyond compliance, but it is the silent security killer. By Rick Goud

2025-02-14

Britain Fast-Tracks Military Recruitment For Cyber Defence

Less Rifle Drill, More Keyboard Drill: New cyber service personnel will have reduced basic training before three months of special cyber training.

2025-02-17

Business Interruption Is The #1 Cyber Risk

Cyber security risk, including ransomware, data breaches and IT disruptions, remain the top business concern worldwide over the past year.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Capita

Capita

Capita is a consulting, digital services and software business, providing end-to-end enterprise IT services and solutions focused around digital transformation and innovation.

United Security Providers

United Security Providers

United Security Providers is a leading specialist in information security, protecting IT infrastructures and applications for companies with high demands on security.

sayTEC

sayTEC

sayTEC's mission is to develop and deliver next-generation products and services in encrypted data and voice transmission.

Indusface

Indusface

Indusface offers best website security, web application firewall and SSL certificate to keep your online business much safer.

Drootoo

Drootoo

Drootoo is transforming businesses and making them high performing entities with its unified cloud platform.

NexGenT

NexGenT

NexGenT have combined military-style training with decades of network engineering and cyber security experience into an immersive program to get people into cyber security fast and effectively.

VLATACOM Institute

VLATACOM Institute

Vlatacom Institute is privately owned accredited research and development institute, system integrator and turn-key solution provider. Areas of expertise include encryption and authentication.

AgileBlue (Agile1)

AgileBlue (Agile1)

AgileBlue (formerly Agile1) is a managed breach detection company with an Autonomous SOC-as-a-Service for 24×7 monitoring, detection and guided response.

Cyber Management Alliance

Cyber Management Alliance

Cyber Management Alliance is closing the divide in cyberspace by bringing together the best qualities of thought leadership and operational mastery of cyber security management.

Eunetic

Eunetic

Eunetic IT security solutions - we secure your websites, emails, domains and data.

Krista Software

Krista Software

Krista is an intelligent automation platform that combines iPaaS and Conversational AI to automate complete business processes across your teams and apps.

Beyon Cyber

Beyon Cyber

Beyon Cyber offer a complete portfolio of advanced solutions & services for cyber security in Bahrain.

Cybecs Security Solutions

Cybecs Security Solutions

Cybecs was founded to address rapid technological advancement, changing business models, global privacy regulations, and increasing cyber threats for global organizations.

Aardwolf Security

Aardwolf Security

Aardwolf Security specialise in penetration testing to the highest standards set out by OWASP. We ensure complete client satisfaction and aftercare.

IT.ie

IT.ie

IT.ie are a comprehensive provider of Managed IT Services, Cloud Solutions, Cyber Security, and proactive IT support services.

Cyberus

Cyberus

Cyberus brings together industry, business, and government to collaboratively create a secure digital future for Russia and the world.