TECHNOLOGY > > Resilience


« Back to News

2023-06-13

Two Thirds Of Organizations Suffer Breaches Due To WFH

Document Security: Remote workplaces offer unique challenges to data security and the security risks are too costly to ignore. By Kyle Mitchell

2023-06-12

To Succeed With Zero Trust, First Define Success

When well-executed, Zero Trust strengthens an organization’s security posture, reducing the blast radius of inevitable breaches. By John Linford

2023-06-12

XDR vs. SIEM: Do You Need One or Both?

The complexity & volume of security data present challenges for traditional SIEM solutions, leading to the emergence of new offerings like XDR.

2023-06-07

A New Approach To Cyber Security Helps Resist Extortion

Nearly 80% of organisations hit by ransomware are capable of recovering their critical data & systems, without paying a ransom.

2023-06-05

Take Practical Measures To Avoid An Attack

The Common Threat: Failing to implement basic cyber security measures and not training your people presents an open door to hackers.

2023-06-01

Cyber Security In An Ever-Growing Digital World 

Digital Transformation: As more data-driven infrastructure technologies are introduced, the risk of cyberattacks increases. By Carl Shallow

2023-05-30

Always-On Protection Using Immutable Storage

Immutability In Action: In the ever-changing world of data security compliance, Immutable Storage offers an ever-reliable solution. By Richard Massey.

2023-05-25

The Security Risks Of ChatGPT

How Businesses Can Safeguard Their Data: With ChatGPT, criminals can quickly develop malware that wreaks havoc on companies. By Richard Massey

2023-05-23

Julius Caesar Used Encryption. Shouldn’t You?

For data security needs and for achieving regulatory compliance, encryption should be the baseline for any data security strategy. By Colin Tankard

2023-05-22

Web Application Security Testing: A Complete Guide

Web application security testing plays a vital role in protecting sensitive data from potential threats like SQL injection and cross-site scripting.

2023-05-19

How Unsupported Technologies Threaten Business Security

Obsolete software cannot be updated or patched and hackers know that unsupported applications are their opportunity. By Steve Whiter

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Splunk

Splunk

Splunk provide real-time Security Information & Event Management solutions for Enterprise Networks, Cloud and small-scale IT environments

Security Industry Association (SIA)

Security Industry Association (SIA)

The SIA's mission is to be a catalyst for success​ within the global security industry through information, insight and influence.

Telspace Systems

Telspace Systems

Telspace Systems provides penetration testing, vulnerability assessment and training services.

Simeio Solutions

Simeio Solutions

Simeio is a complete Identity and Access Management (IAM) solution provider that engages securely with anyone, anywhere, anytime.

CybernetIQ

CybernetIQ

CLAW by CybernetIQ is the industry's most advanced SOAR platform helping unify all cybersecurity tools under one umbrella and providing organizations faster, better and more accurate cybersecurity.

Portuguese Institute for Accreditation (IPAC)

Portuguese Institute for Accreditation (IPAC)

IPAC is the national accreditation body for Portugal. The directory of members provides details of organisations offering certification services for ISO 27001.

National Cybersecurity Preparedness Consortium (NCPC)

National Cybersecurity Preparedness Consortium (NCPC)

The mission of the NCPC is to provide research-based, cybersecurity-related training, exercises and technical assistance to local jurisdictions, counties, states and the private sector.

eSec Forte Technologies

eSec Forte Technologies

eSec Forte Technologies is a CMMI Level-3 ISO 9001-2008, 27001-2013 certified global consulting and implementation company focused on Information Security and Cyber Security.

Hex-Rays

Hex-Rays

Founded in 2005, privately held, Belgium based, Hex-Rays SA focuses on the development of fast, stable, and robust binary analysis tools for the IT security market.

Udacity

Udacity

Udacity's mission is to train the world’s workforce in the careers of the future. Our programs range from beginner to expert levels and deliver the hands-on skills for real-world expertise.

Clarabot Nano

Clarabot Nano

Nano is the secure file sharing tool to improve content search, data access and collaboration between multiple parties.

Vaultree

Vaultree

We believe in an encrypted tomorrow. Vaultree technology enables a foundational change in how we communicate with each other: Safely!

Proximus Ada

Proximus Ada

Proximus Ada is the first Belgian center of excellence combining artificial intelligence and cybersecurity.

ThreatFabric

ThreatFabric

ThreatFabric integrates industry-leading threat intel, behavioral analytics, advanced device fingerprinting and over 10.000 adaptive fraud indicators.

Mindcore Technologies

Mindcore Technologies

Mindcore provide cyber security services, managed IT services and IT consulting services to businesses in NJ, FL, and throughout the United States.

OpenZiti

OpenZiti

OpenZiti is the world’s most used and widely integrated open source secure networking platform. OpenZiti provides both zero trust security and overlay networking as pure open source software.