TECHNOLOGY > > Resilience


« Back to News

2024-04-18

Problems With Underperforming Cyber Security Service Providers 

The Risks Of Reliance On Service Providers: It is increasingly hard for companies to disconnect from the digitised supply chain ecosystem.

2024-04-19

Large Language Models Are An Inflection Point For Cyber Security

The LLM Step Change: A technology event comparable to the invention of the Internet, driving a $multi‐billion race to dominate this market.

2024-04-11

The AI Future: Three Tips For SMBs

SMBs must get proficient in using the best AI tools, processes & training to ensure they don’t fall victim to AI-powered criminals. By John Mutuski

2024-04-10

Mitigating The Growing Insider Risk

User Activity Monitoring & Behavioral Analytics: Helping organizations meet the goal of being more informed and more secure. By Mike Crouse

2024-04-10

Make Sure Your Disaster Recovery Plan Works When You Need It Most

Disaster Recovery Testing: Conduct detailed tests to verify your plan’s functionality and readiness for any type of crisis. By Nazy Fouladirad

2024-04-09

The Importance Of Formal Verification Networks For Secure Software

The challenge of eliminating widespread software vulnerabilities is an urgent problem. New approaches are needed to mitigate risk. By Fabien Chouteau

2024-04-09

Spanish Healthcare Service Works On Resilience

Healthcare Is A Prime Target: In response to growing cyber threats to medical organisations, Spain’s health sector is taking decisive action.

2024-04-02

What Will The NIS2 Directive Mean For Smaller Organisations?

Raising The Security Bar: NIS2 expands the scope of entities covered and EU states must adopt the legislation by October. By Bernard Montel

2024-04-02

Prioritising Prevention Is Better Than Paying Ransom

Wake Up: By working together and staying vigilant, we can protect ourselves from the damaging effects of ransomware. By Brandon Rochat

2024-03-27

Why Are Enterprises Slow To Adopt Observability?

Increasing complexity means the demands on IT departments to keep their systems functioning correctly gets tougher every day. By Rob Johnson

2024-03-27

The Need For Cyber Security Education & Preparedness In The Moving Industry

Secure your business with vital cyber security education and preparedness in the moving industry. Ensure data safety and build customer trust.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Bob's Business

Bob's Business

Bob's Business adopts a fresh approach to information security awareness and compliance training, delivering key information through the use of short animated movies.

BruCERT

BruCERT

BruCERT is the referral agency for dealing with computer-related and internet-related security incidents in Brunei Darussalam.

ZeroFox

ZeroFox

ZeroFox safeguards modern organizations from dynamic security risks across social, mobile, surface, deep and dark web, email and collaboration platforms.

SKKU Security Lab (seclab)

SKKU Security Lab (seclab)

SKKU Security Lab supports research and education in information security engineering. The lab is a part of the College of Software, Sungkyunkwan University.

Chainalysis

Chainalysis

Chainalysis provides blockchain analysis software to prevent, detect and investigate cryptocurrency money laundering, fraud and compliance violations.

Scientific Cyber Security Association (SCSA)

Scientific Cyber Security Association (SCSA)

The main goal of Scientific Cyber Security Association is the development of scientific and practical directions of cyber security.

A-LIGN

A-LIGN

A-LIGN is a technology-enabled security and compliance partner trusted by more than 2,500 global organizations to mitigate cybersecurity risks.

Google for Startups

Google for Startups

Google for Startups is Google’s initiative to help startups thrive across every corner of the world.

Nokia

Nokia

Nokia is a proven leader in fixed, mobile and IoT security offering capabilities that range from systems design to integration and support.

CyberPion

CyberPion

Cyberpion’s groundbreaking platform enables security teams to identify and neutralize threats stemming from vulnerabilities within online assets throughout an enterprise’s ecosystem.

State Service of Special Communications & Information Protection of Ukraine (SSSCIP)

State Service of Special Communications & Information Protection of Ukraine (SSSCIP)

State Service of Special Communications and Information Protection is the technical security and intelligence service of Ukraine, under the control of the President of Ukraine.

CleanCloud by SEK

CleanCloud by SEK

CleanCloud by SEK is a CSPM product focused on public cloud data protection and security regulations, with over 400 compliance checks for the market's leading frameworks and regulations.

InferSight

InferSight

InferSight can help you design an architecture that takes into account security, performance, availability, functionality, resiliency and future capacity to avoid technological lock in and limitations

Toka Group

Toka Group

Toka empowers government agencies with critical and previously out-of-reach digital forensics, force protection and Intelligence capabilities, tackling the fields' most pressing challenges.

Moonlock

Moonlock

Cybersecurity tech for humans. At Moonlock, we make software that seamlessly protects you and has your back as you live your life.

FusionAuth

FusionAuth

FusionAuth is the customer authentication and authorization platform that makes developers' lives awesome.