TECHNOLOGY > > Resilience


« Back to News

2024-08-07

Is Your Business Ready For The Inevitable Cyberattack?

Not If, But When: Investment in robust data protection measures is minimal compared to the potential cost of data loss. By Ishwar Fernandes

2024-02-24

Defending Against These Common Types Of Cyber Attack [extract]

Cyber crime will cost the global economy approximately $10.5 trillion annually by 2025. What, then, are the most common types of cyber attack?

2024-08-06

Building Resilience In A Changing Cyber Threat Landscape

Minimising Attacks: Businesses need to arm themselves with AI-enabled defences that are stronger than AI-enabled threats. By Duncan Bradley

2024-08-05

The Paris Olympics: More Than Just Gold Medals Are At Stake

Liberty, Equality, Security: The Games are a major target for cyber criminals, who see an opportunity to cause major disruption. By Steve Bradford

2024-07-30

The AI Threat: How Can Businesses Protect Themselves?

AI offers exponential opportunities for growth, but organisations equally face increasing risks that should not be ignored. By Sam Peters

2024-07-30

Overcoming Obstacles To Zero Trust Adoption

Breaking Barriers: The case for adoption is compelling. So, what is holding organisations back from embracing Zero Trust? By Samantha Mabey

2024-07-26

How Small Businesses Can Develop Cyber Resilience

To stay competitive, small businesses need to strengthen cyber resilience, secure their customer data & protect their IT systems. By Jochen Haller

2024-07-25

Improving Cyber Resilience Of Frontline Armed Forces In Europe

Exercise Baltic Mule: Making sure that the NATO allies are better equipped to protect current and future military activity from cyber threats.

2024-07-23

The CrowdStrike Incident Means Companies Must Review Their Cloud Strategies

For CISOs, this event is a sharp reminder of the fundamental risks associated with over-reliance on a single supplier, especially in the cloud.

2024-07-19

Gaps Identified In Threat Intelligence Sharing & Collaboration

Effective information sharing is vital in the fight against cyber crime, but combining insights across teams & security platforms is hard work.

2024-07-22

New British Government Will Legislate On Cyber Security

Protecting Public Services from Cyber Attacks: The Cyber Security & Resilience Bill will expand existing regulation to ensure best practices.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Wilson Sonsini Goodrich & Rosati (WSGR)

Wilson Sonsini Goodrich & Rosati (WSGR)

WSGR is the premier provider of legal services to technology, life sciences, and growth enterprises worldwide. Practice areas include cybersecurity and data protection.

Jscrambler

Jscrambler

Jscrambler addresses all your JavaScript and Web application protection needs.

Pindrop Security

Pindrop Security

Pindrop solutions are leading the way to the future of voice by establishing the standard for security, identity, and trust for every voice interaction.

SailPoint

SailPoint

SailPoint provides identity governance solutions with on-premises and cloud-based identity management software for the most complex challenges.

Ziroh Labs

Ziroh Labs

Ziroh Labs leverages advanced cryptography to keep your highly sensitive, private data safe throughout the lifecycle of data.

Eclypsium

Eclypsium

Eclypsium protects organizations from the foundation of their computing infrastructure upward, controlling the risk and stopping threats inside firmware of laptops, servers, and networks.

Pinpoint Search Group

Pinpoint Search Group

Pinpoint Search Group's recruiters specialize in Information Management, Cyber Security, Cloud and Robotic Process Automation (RPA).

Kontron

Kontron

Kontron offers a combined portfolio of secure hardware, middleware and services for Internet of Things (IoT) and Industry 4.0 applications.

Silent Quadrant

Silent Quadrant

Silent Quadrant delivers incomparable cybersecurity consulting, digital transformation, and risk management within our purpose-driven clients - empowering them to be the most resilient entities.

Tailscale

Tailscale

Tailscale is a VPN service that makes the devices and applications you own accessible anywhere in the world, securely and effortlessly.

Contextal

Contextal

Contextal develops cutting-edge open-source cybersecurity solutions, designed to connect the dots and detect complex threats, which slip through the existing protections.

Armata Cyber Security

Armata Cyber Security

Armata exists to bring Cyber Security to all people – from home users and SMBs to large enterprises. We believe all users have the right to an affordable yet effective Cyber Security solution.

Myrror Security

Myrror Security

Myrror Security is a software supply chain security solution that aids lean security teams in safeguarding their software against breaches.

ELK Analytics

ELK Analytics

ELK Analytics is a specialized Managed Security Services Provider (MSSP) that focuses on endpoint security and monitoring & alerting for any type of structured or unstructured data.

AuthenticID

AuthenticID

Our mission at AuthenticID is to combat fraud worldwide and help businesses protect their enterprise and valuable data assets.

Silicon Valley Cybersecurity Institute (SVCSI)

Silicon Valley Cybersecurity Institute (SVCSI)

SVCSI aims to investigate, develop, and promote technical excellence and the best security practices for dependable and secure systems and applications.