TECHNOLOGY > > Resilience


« Back to News

2025-04-11

Do You Need Security That Starts With “Prove It”?

Deciding Between A Software-Defined Perimeter And A VPN: Both aim to secure remote access, by quite different routes. By Don Boxley

2025-04-11

Neurodiversity - The Untapped Talent Pool Solving Cybersecurity's Skills Gap 

Neurodiverse Talent: Embracing neurodiversity represents both an ethical imperative and a strategic opportunity. By Glen Williams

2025-04-07

Britain Is Unprepared To Defend Itself From Nation-State Hackers

The rising sophistication of cyber attacks and state-backed incidents has exposed many vulnerabilities within UK public sector organisations.

2025-04-08

Rethinking Cyber Defence For Tomorrow's Threats

Restricting access through identity management & authorisation can help organisations face cybersecurity challenges. By Spencer Young

2025-04-04

Vishing - The Voice Scam You Need To Know About

Dramatic Escalation In Vishing Attacks: Fighting cybercrime isn’t just about having the right tech - it’s also about being aware and cautious.

2025-04-07

DDoS Trends & Predictions For 2025

The aim is to paralyze the target’s operations - which is why DDoS protection measures are critical to an organization's cybersecurity strategy.

2025-04-07

The Security Risks Behind Shadow ML Adoption 

Defending AI: As AI models become more advanced and widely deployed, security concerns continue to mount. By Shachar Menashe

2025-04-04

Beyond MFA: A Multi-Layered Cybersecurity Strategy Is Essential

MFA Is Not Enough: Businesses must adopt a comprehensive and holistic security framework to safeguard their digital assets. By Jon Jarvis

2025-03-31

Rethinking The Role Of Penetration Testing

Security Check Box Or Key Intelligence Tool? Too many companies treat penetration testing as a static, once-a-year assessment By Rajeev Gupta

2025-03-27

Essential Strategies To Prevent Ransomware Attacks

Nurturing A Culture Of Protection: Banning ransom pay-outs addresses the symptoms, but we need to tackle the cause. By Robert Phan

2025-03-25

Combatting Rising AI Attacks With AI-Powered Defences 

User & Entity Behaviour Analytics: An effective approach to detect unknown threats by focusing on behavioural anomalies. By Kev Eley

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Bloombase

Bloombase

Bloombase is the leading innovator in Next-Generation Data Security solutions for Global 2000-scale organizations

Beyond Security

Beyond Security

Beyond Security is a leader in automated vulnerability assessment and compliance solutions - enabling customers to accurately assess and manage security weaknesses in their networks and applications.

Digital Defense Inc (DDI)

Digital Defense Inc (DDI)

DDI offers vulnerability scanning, penetration testing, web application testing, social engineering and additional security assessments.

Praetorian

Praetorian

Praetorian is an offensive cybersecurity company whose mission is to prevent breaches before they occur.

Military Cyber Professionals Association (MCPA)

Military Cyber Professionals Association (MCPA)

MCPA are a team of Soldiers, Sailors, Airmen, Marines, Veterans and others interested in the development of the American military cyber profession.

Ponemon Institute

Ponemon Institute

Ponemon Institute conducts independent research on data protection and emerging information technologies.

Optra Security

Optra Security

Optra Security specializes in information security with a focus on Application Security.

Blockchain Reactor

Blockchain Reactor

Blockchain Reactor is a blockchain consultancy and implementation company providing cutting-edge blockchain solutions for start-ups and enterprises.

Munich Re

Munich Re

Munich Re is a leading global provider of reinsurance, primary insurance and insurance-related risk solutions including Cyber.

Focal Point

Focal Point

We aspire to be the focal point for Medium and Small size companies providing 24/7 cyber security advice, services and solutions.

Phakamo Tech

Phakamo Tech

Phakamo Tech offers a full set of governance, risk, compliance, cybersecurity and Microsoft Cloud services that include consulting, planning, implementation and cyber incident response.

Aiden Technologies

Aiden Technologies

Aiden simplifies your IT process, giving you peace of mind and security by ensuring your computers get exactly the software they need and nothing else.

Control D

Control D

Control D is a modern and customizable DNS service that blocks threats, unwanted content and ads - on all devices.

CyberMontana

CyberMontana

CyberMontana is a statewide initiative providing cybersecurity awareness, training, and workforce development for businesses and residents of Montana.

Vonahi Security

Vonahi Security

Vonahi Security is a cybersecurity SaaS company that pioneered automated network penetration testing.

Deimos

Deimos

Deimos is a technology, cloud, hybrid and multi-cloud focused, professional services company. Our expertise and focus is on cloud native Developer and Security Operations.