TECHNOLOGY > > Resilience


« Back to News

2024-03-27

Why Are Enterprises Slow To Adopt Observability?

Increasing complexity means the demands on IT departments to keep their systems functioning correctly gets tougher every day. By Rob Johnson

2024-03-27

The Need For Cyber Security Education & Preparedness In The Moving Industry

Secure your business with vital cyber security education and preparedness in the moving industry. Ensure data safety and build customer trust.

2024-03-07

A Deep Dive Into Deepfakes & The Threat To Digital Identity Verification

Understanding the complexities of deepfake mechanics and their effects will help minimize the risks & boost the security of identity verification.

2024-03-05

Identifying OSS Security Risks To Safeguard Software Supply Chains

Securing Code: Safeguarding the software supply chain is a shared responsibility for developers, administrators & organisations. By Ax Sharma

2024-03-22

HackerOne Leads AI-Driven Innovation

HackerOne has announced innovations that integrate the company’s hacker powered intelligence with the transformative power of AI.

2024-03-19

Cyber Security Governance Is A Leadership Responsibility

The Role of The Board: As cyber threats evolve, business leaders must remain vigilant in cyber security governance says Britain's NCSC.

2024-02-28

Harnessing Predictive Analytics In Cybersecurity

Proactive Cybersecurity: Harnessing the power of predictive analytics in cybersecurity is not an opportunity. It's an imperative. By Alexander Norell

2024-03-13

Threat Intelligence Exposes The Extent of Cyber Attacks

Businesses Must Continually Adapt their Security Strategies: Expert threat intelligence from MSPs can help detect & remediate attacks quickly.

2024-03-01

Surge in “Hunter-Killer” Malware

Discovered: A threefold increase in the types of destructive malware designed to actively target defensive systems & capable of disabling them.

2024-02-22

A Goal Without A Plan Is Just A Wish

Incident Response: If your goal is a robust information security programme then you must have an Incident Response plan. By Chris Denbigh-White

2024-02-21

Managed Security Services In The Age of Advanced Threat Intelligence 

The goal of threat intelligence is to ensure organisations have the right tools to make better, faster & decisions based on timely, actionable data.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Logically Secure

Logically Secure

Logically Secure provide penetration testing and security assessment services.

DFLabs

DFLabs

DFlabs is a pioneer in Security Automation & Orchestration technology, leveraging your existing security products to dramatically reduce the response and remediation gap.

Veriato

Veriato

Veriato develops intelligent solutions that provide companies with visibility into the human behaviors and activities occurring within their network, making them more secure and productive.

Myra Security

Myra Security

The fully automated Myra DDoS Protection reliably protects web applications, websites, DNS servers, and IT infrastructures.

Redshift Consulting

Redshift Consulting

Redshift is an information management and information security consulting company offering a full range of services from infrastructure design to security assessments and network monitoring.

Axence

Axence

Axence provides professional solutions for the comprehensive management of IT infrastructure for companies and institutions all over the world.

The Security Company (TSC)

The Security Company (TSC)

The Security Company is a leading provider of creative employee security awareness programmes.

Onward Security

Onward Security

Onward Security provides security solutions including network & application assessment, product security testing and security consulting services.

Cyberport

Cyberport

Cyberport is focused on facilitating the growth of major technology trends such as FinTech and cybersecurity as well as the emerging technologies of AI, big data and blockchain.

Privacyware

Privacyware

Privacyware's ThreatSentry combines a state-of-the-art Web Application Firewall and port-level firewall with advanced behavioral filtering to block unwanted IIS traffic and web application threats.

LeadingIT

LeadingIT

Leading IT provides IT support, cloud computing, email support, cybersecurity, networking and firewall services to Chicagoland businesses.

Nassec

Nassec

Nassec is a Cyber Security firm dedicated to providing the best vulnerability management solutions. We offer tailor-made cyber security solutions based upon your requirements and nature of business.

MDSec

MDSec

MDSec is a consultancy with a passion for information security. Our consultants specialise in application, mobile and hardware security and targeted red team attacks.

Tetrate.io

Tetrate.io

Tetrate Service Bridge provides enterprises with a consistent, unified way to connect and secure services across an entire mesh-managed environment.

PagerDuty

PagerDuty

PagerDuty is the central nervous system for a company’s digital operations. We identify issues in real-time and bring together the right people to respond to problems faster.

Approov

Approov

Approov provides a comprehensive runtime security solution for mobile apps and their APIs, unified across iOS and Android.