TECHNOLOGY > > Resilience


« Back to News

2024-04-25

Creating Successful Cybersecurity Solutions

From Bolt-On To Built-In: Not all cyber security resilience products are equal. What issues should software designers be focusing on? By Vincent Lomba

2024-04-24

Defending Your Supply Chain From Cyber Threats

Securing The Links: The implementation of best practices for supply chain security is a critical step in mitigating cyber risks. By Spencer Starkey

2024-04-22

The Benefits of Sharing Threat Intelligence

Companies must get a step ahead of malicious actors and using effective threat intelligence software can give proactive protection.

2024-04-22

The Evolving Cybersecurity Vulnerability Landscape

Only by continually updating their security posture can businesses ensure they are well-equipped to handle dynamic cyber threats. By Douglas McKee

2024-04-18

Overcoming Security Alert Fatigue

Overload: The relentless barrage of security alerts inundating SOC teams constitutes a real threat to enterprise security. By Brandon Rochat

2024-04-18

Problems With Underperforming Cyber Security Service Providers 

The Risks Of Reliance On Service Providers: It is increasingly hard for companies to disconnect from the digitised supply chain ecosystem.

2024-04-19

Large Language Models Are An Inflection Point For Cyber Security

The LLM Step Change: A technology event comparable to the invention of the Internet, driving a $multi‐billion race to dominate this market.

2024-04-11

The AI Future: Three Tips For SMBs

SMBs must get proficient in using the best AI tools, processes & training to ensure they don’t fall victim to AI-powered criminals. By John Mutuski

2024-04-10

Mitigating The Growing Insider Risk

User Activity Monitoring & Behavioral Analytics: Helping organizations meet the goal of being more informed and more secure. By Mike Crouse

2024-04-10

Make Sure Your Disaster Recovery Plan Works When You Need It Most

Disaster Recovery Testing: Conduct detailed tests to verify your plan’s functionality and readiness for any type of crisis. By Nazy Fouladirad

2024-04-09

The Importance Of Formal Verification Networks For Secure Software

The challenge of eliminating widespread software vulnerabilities is an urgent problem. New approaches are needed to mitigate risk. By Fabien Chouteau

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

RISA

RISA

RISA solutions help to secure networks, improve overall network security, and achieve government regulatory compliance.

Optiv

Optiv

Optiv is a market-leading provider of end-to-end cyber security solutions. We help clients plan, build and run successful cyber security programs that achieve business objectives.

Dermalog Identification Systems

Dermalog Identification Systems

Dermalog Identification Systems is a pioneer in biometry and the largest German manufacturer of biometric devices and systems.

NFIR

NFIR

NFIR is a specialist in the field of cyber security incident response and digital forensics.

Smart Protection

Smart Protection

Smart Protection are experts in brand and trademark protection - we fight against counterfeits and unauthorized usages of brands with machine learning technology.

689cloud

689cloud

689Cloud is a cloud content collaboration platform that allows users to protect, track, and control files AFTER they have been shared.

Pentesec

Pentesec

Pentesec is a security specialist offering professional services, managed security services and expertise within an extensive range of security technologies.

Conversant Group

Conversant Group

Conversant Group is an IT infrastructure and security consulting company, providing technical, organizational, procedural, and process consulting internationally.

e5 Lab

e5 Lab

e5 Lab seeks to develop solutions to challenges faced by the shipping industry including digital transformation, autonomous technologies and big data in order to promote safe and efficient operations.

Panther Labs

Panther Labs

Panther’s mission is to make security monitoring fast, flexible and scalable for all security teams.

Marcum Technology

Marcum Technology

Marcum Technology consultants are focused on helping you reach your company’s full potential by exploring creative ways to integrate tomorrow’s technology into your business today.

AdronH

AdronH

AdronH is a company of Cyber Security consultants. We support companies and public institutions with their digital transformation to new and secure business platforms.

Amazon Web Services (AWS)

Amazon Web Services (AWS)

Amazon Web Services is the world’s most comprehensive and broadly adopted cloud platform, offering fully featured services from data centers globally.

National Cybersecurity Alliance

National Cybersecurity Alliance

The National Cybersecurity Alliance is a non-profit organization on a mission to create a more secure, interconnected world.

Digital.ai

Digital.ai

Digital.ai empowers organizations to scale software development teams, continuously deliver software with greater quality and security.

ESProfiler

ESProfiler

Enterprise Security Profiler. Empowering CISOs with clarity & confidence in their security programme by visualising capabilities, usage and spend against their key threat priorities.