TECHNOLOGY > > Resilience


« Back to News

2024-06-04

The Devastating Effects Of A Man-in-the-Middle Attack

Man-in-the-middle attacks are effective & worrisome because in many cases, the victim will have no clue that their communication has been compromised.

2024-05-31

Telecoms - Beware Of The DDoS Threat Actor

Combatting the wave of DDoS attacks against the telecommunications industry is critical to protecting global connectivity. By Richard Hummel

2024-05-24

New Guidance For Business Email Compromise

Britain's NCSC has issued new BEC guidance, including practical steps to reduce the chances your organization suffering from these attacks.

2024-05-21

MOD Data Breach Shows Supply Chain Security Continues To Be A Top Priority

The most critical data assets need the highest level of protection. That means prioritizing data based on the potential impact if it is compromised. 

2024-05-21

Cloud Threats Require New Advanced Defenses

Surge In Cloud Security Incidents: Although cloud attacks are increasing very few organisations are able to mitigate risks easily and quickly.

2024-05-20

Focus On Black Basta Ransomware

US cyber defence agencies have issued a joint advisory intended to help organizations mitigate the impact of prolific & costly 'Black Basta' malware.

2024-05-16

A Way To Build A Comprehensive Backup Strategy 

Jira Backup Best Practices: Organizations that implement these practices improve task accessibility & guarantee quick recovery with a few clicks.

2024-05-15

XZ Utils: A Fable on Proactive Risk Management

The recent attack on the XZ compression tool shows how important it is for companies to manage risks in their open-source software. By Ilkka Turunen

2024-05-15

The Ransomware Arms Race

How Can Organisations Stay Ahead?: Seven cybersecurity experts give their insights into how organisations can tackle this relentless threat. 

2024-05-10

Mobile Gambling - Sportsbooks Face Growing Fraud

Risk & Return: Mobile betting App users face a growing threat from fraud and their operators should take steps to protect them. By Elie Shuggi

2024-05-10

Is A Passwordless Future A More Secure Future?

A Serious Threat: The impact of poor password hygiene can damage a company's reputation beyond repair. By Muhammad Yahaya Patel

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Panzura

Panzura

Panzura optimizes enterprise data storage management and distribution in the cloud, making cloud storage simple and secure.

Guardsquare

Guardsquare

GuardSquare is the global reference in mobile application protection. We develop premium software for the protection of mobile applications against reverse engineering and hacking.

CERT NZ

CERT NZ

CERT NZ supports businesses, organisations and individuals affected by cyber security incidents, and provide trusted and authoritative information and advice.

Cyberarch Consulting

Cyberarch Consulting

Cyberarch is a security-focused consulting firm. We provide services specializing in information security, digital forensics, penetration testing and cyber security training.

Axiomtek

Axiomtek

Axiomtek is a leading design and manufacturing company in the industrial computer and embedded field.

DivvyCloud

DivvyCloud

DivvyCloud protects your cloud and container environments from misconfigurations, policy violations, threats, and IAM challenges.

astarios

astarios

astarios provide near-shore software development services including secure software development (DevSecOps), quality assurance and testing.

Stratia Cyber

Stratia Cyber

Stratia Cyber is an independent, technology agnostic company providing high quality, pragmatic cyber security consultancy and expertise.

Sentrium Security

Sentrium Security

Sentrium is committed to helping organisations protect their technology, information and people. Our range of bespoke services provide solutions to tackle a broad range of cyber security challenges.

Cheops Technology

Cheops Technology

Cheops is a specialist in IT Business Technology Services. We help SMEs and large companies build, optimize and manage their IT so they can focus on their core business.

Airgap Networks

Airgap Networks

Airgap is fixing the fundamental flaw of excessive trust. We help enterprises modernize their network for a simple and secure infrastructure.

ViewQwest

ViewQwest

ViewQwest is a regional telecommunications & information technology services company. We specialize in providing Connectivity, Managed Network, Managed SD-WAN, and Managed Security solutions.

TuxCare

TuxCare

TuxCare make Linux more secure. We take care of Linux so that organizations can use Linux to support environments that require high levels of Cybersecurity, stability, and availability.

Crispmind

Crispmind

Crispmind creates innovative solutions to some of today’s most challenging technology problems.

Cybervergent

Cybervergent

Cybervergent (formerly Infoprive) are a leading cybersecurity technology company in Africa. We provide cybersecurity guidance and solutions that help protect your business.

Opkalla

Opkalla

We started Opkalla because we believe IT professionals deserve better. We help our clients navigate the confusion in the marketplace and choose the solution that is right for your business.