TECHNOLOGY > > Resilience


« Back to News

2024-06-25

How To Effectively Detect & Prevent SAP Threats

Porous Entry Points: SAP systems contain IT-enabled or overlooked vulnerabilities which leave them open to exploitation. By Christoph Nagy

2024-06-24

Five Reasons Your Organization Needs API Security Testing

API security testing is a key component in safeguarding digital assets, ensuring the integrity & confidentiality of data transmitted across systems.

2024-06-19

Combatting Zero-Day Exploits In Financial Services

Best Practices For Finance Institutions: Zero-day attacks disrupt critical systems, causing downtime & big operational challenges. By Dominik Birgelen

2024-06-18

Top Ten IoT Security Challenges & Solutions

The interconnected nature of IoT devices amplifies the importance of maintaining strong security practices across all levels of the network.

2024-06-11

Is Encryption Falling Out Of Favour?

An alarming number of organisations have gone backwards in protecting vital information, heightening the risk of data exposure. By Jon Fielding

2024-06-11

Business Email Compromise Warning Signs

Don't Fall For The Trap: Understanding common social engineering tactics and the threat groups behind them. By John McLoughlin

2024-06-07

Securing The Supply Chain

You're Only As Strong As Your Weakest Link: Resisting threats in your supply chain is a crucial part of protecting your business. By Tom Major

2024-06-06

The Cybersecurity Risks Of Generative AI

GenAI security risks are revealing themselves as multi-faceted threats that stem from how different users interact with the tools. By Jaimen Hoopes

2024-06-04

You’ve Got Mail

Why Secure & Responsible Email Is Key to Safeguarding Our Data: The consequences of misusing it can be severe. By Anita Mavridis

2024-06-04

Identities Are The Highest Priority Risk Area

Focus On Identity Management: Senior security leaders’ support for Zero Trust is increasing, but skills and budgets aren’t keeping pace.

2024-06-03

Increasing Software Cyber Resilience

A new ‘Code of Practice for Software Vendors’ will ensure that security is fundamental to developing and distributing products and services. 

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Centripetal Networks

Centripetal Networks

Centripetal Networks was founded with one vision - to protect networks from advanced threats by simplifying intelligence-driven security.

SEC Consult

SEC Consult

SEC Consult is a leading European consultancy for application security services and information security.

Horangi

Horangi

Horangi provides security products and services that enable the rapid delivery of Incident Response and threat detection for our customers who lack the scale, expertise, or time to do it themselves.

CSO GmbH

CSO GmbH

CSO GmbH provide specialist consultancy services in the area of IT security.

AlertEnterprise

AlertEnterprise

AlertEnterprise uniquely eliminates silos and uncovers blended threats across IT Security, Physical Access Controls and Industrial Control Systems.

Take Five

Take Five

Take Five is a national campaign offering straight-forward, impartial advice that helps prevent email, phone-based and online fraud – particularly where criminals impersonate trusted organisations.

Ribbon Communications

Ribbon Communications

Ribbon Communications delivers global communications software and network solutions to service providers, enterprises, and critical infrastructure sectors.

Havoc Shield

Havoc Shield

Havoc Shield is an all-in-one information security platform that includes everything a growing team needs to secure their remote workforce.

Quantum Star Technologies

Quantum Star Technologies

Quantum Star Technologies has developed Starpoint to be a next-next-generation solution to cyber security threats. Our mission is to secure the online world through our patented technology.

Menaya

Menaya

Menaya provide Ethical Hackers for leading companies while also providing cyber security solutions to help major infrastructures protect against cyber crime.

Mitigo Group

Mitigo Group

Mitigo offers a well considered and effective approach to keeping businesses completely secure from any digital attacks.

Forward Global

Forward Global

Forward Global designs and delivers services and technologies to manage digital, economic, and information risks.

Liberty Technology

Liberty Technology

Liberty Technology has a host of highly trained, certified experts who assist our clients with immediate remote support as well as on-site service.

AKIPS

AKIPS

AKIPS develops the world's most scalable network and infrastructure monitoring software, delivered as a turn-key software appliance.

CyFox

CyFox

CYFOX is at the forefront of cybersecurity innovation, specializing in providing cutting-edge AI-driven solutions tailored for any businesses.

Corporater

Corporater

Corporater provides organizations with integrated solutions for managing governance, performance, risk, and compliance built on a single platform.