TECHNOLOGY > > Resilience


« Back to News

2025-07-04

Cyber Resilience Must Start With Visibility

New Rules, New Risks: If organisations don’t have a live picture of their digital environment, then they are already vulnerable.  By Dan Jones

2025-07-02

Why DevOps Security Must Be On Every Leader's Agenda

Embracing Secure DevOps: By embedding security into DevOps processes, organisations can reduce risk, maintain compliance & build digital services.

2025-07-01

Securing Cyber-Physical Systems

A Control Engineering Perspective: Breaches in connected devices or automated decision-making can have risky consequences. Q&A with Dr. Francesca Boem

2025-06-30

Supercharge AI: GPU Power Meets Cyber Resilience

The future of AI infrastructure lies in high-throughput, low-latency storage systems built around object storage paradigms. By Paul Speciale

2025-06-30

Cybersecurity Threats In The Automotive Industry

Data breaches, ransomware & emerging vulnerabilities expose the need for stronger defences, as vehicles become more digitally integrated.

2025-06-30

The UK’s Software Security Code Of Practice Is More Than Just A Guidance

Organisations risk legal action within 12 months if they don't act now to strengthen their systems and prevent attacks. By Andreas Vermeulen

2025-06-27

Cybersecurity: The New Catalyst For SMB Growth 

Threats can become opportunities as cyber strategies shift from defensive necessity to a business catalyst, propelling growth. By Adriaan Bekker

2025-06-24

How Retailers Can Combat The Rising Cyberthreat

Retail Under Siege: Industry experts give their valuable insights on resilience & recovery in the wake of the recent attacks on high-profile brands.

2025-06-24

The Corporate Risk Of Deepfake Deception

When Seeing Isn't Believing: Businesses face a sharp learning curve – one that spans technology, training & organizational culture. By Neil Weller

2025-06-20

The UK’s Defence Shift & The Urgency Of Sovereign Digital Infrastructure

Rethinking The Stack: Resilience today is not just about redundancy. It is about ownership of code, protocols, and platforms. By Matthew Hodgson

2025-06-23

The Future Of Digital Leadership Starts With The Website

Downgrading website strategy misses a critical opportunity to unite technology governance with business outcomes. By Doug Cunningham

CyberSecurity Jobsite
Check Point

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

TorGuard

TorGuard

TorGuard is a Virtual Private Network services provider offering secure encrypted access to the internet.

Magix Security

Magix Security

Magix Security assesses the cyber threat, gives you visibility of how vulnerable your business is to attack, and provides cybercrime detection and prevention services.

Vehere

Vehere

Vehere specialises in mission critical signals aquisition and analytics platform and cyber defence systems.

National Cybersecurity Society (NCSS) - USA

National Cybersecurity Society (NCSS) - USA

The National Cybersecurity Society is a non-profit organization focused on providing cybersecurity education, awareness and advocacy to small businesses.

Angoka

Angoka

Angoka provide hardware-based solutions for managing the cybersecurity risks inherent in machine-to-machine communication networks.

MetaCert

MetaCert

MetaCert’s Zero Trust browser software reduces the risk of organizations being compromised with a phishing-led cyberattack by more than 98%.

The ATOM Group

The ATOM Group

ATOM builds and secures technology for regulated industries. We design and build for a future we can all trust.

Stripe OLT

Stripe OLT

At Stripe OLT, we provide complete business technology solutions - Our team has an unrivalled reputation as a Microsoft Gold Partner, specialising in secure, cloud-first technology.

Network Perception

Network Perception

Network Perception proactively and continuously assures the security of critical OT assets with intuitive network segmentation verification and visualization.

Babble

Babble

Babble is a Unified Comms, Contact Centre and Cyber Solutions provider. We believe in making next-generation technology simple to use, deploy and manage.

Appknox

Appknox

Appknox is the world’s most powerful plug-and-play security platform that helps developers, security researchers, and enterprises to build a safe and secure mobile ecosystem.

BSS

BSS

BSS is a solutions and services business based in the UK with a focus on Cyber Security, Data, Financial Crime, Internal Audit, Change, Risk and Resilience.

Gomboc.ai

Gomboc.ai

Gomboc solve cloud infrastructure security policy deviations by providing tailored remediations to the IaC (Infrastructure as Code).

Lansafe

Lansafe

Lansafe stands as a leading managed service provider in the UK, seamlessly integrating IT, Telecoms, Security, Electrical and Cyber Security solutions.

Tychon

Tychon

Tychon develops advanced enterprise endpoint management technology that enables commercial and government organizations to bridge the gap between security and IT operations.

Roundsec

Roundsec

Roundsec provide information security services including risk assessment and pentesting of sites and apps.