TECHNOLOGY > > Resilience


« Back to News

2023-11-08

Time To Get Serious About Defence

Once sensitive data has been stolen its confidentiality is lost forever - that’s why a proactive approach is so important. By Gavin Millard

2023-11-07

Five Critical Security Measures To Enforce API Security 

Application Programming Interfaces are popular targets for attack - proper attention to security & governance can reduce your risk. By Marco Palladino 

2023-11-01

The Criminal Use Of AI Is Increasing 

A Whole New Level Of Threat: The dynamic nature of AI-driven attacks can render established static & legacy defense techniques ineffective. 

2023-10-31

Defenders Of The Cybersecurity Command Centre  

The SecOps Team: Serving as the frontline by protecting the digital fortress from the myriad of tools available to threat actors. By Fabien Rech

2023-10-30

Senior Managers Need Higher Cyber Security Awareness Than Other Employees

Walking The Walk: Cyber risk awareness among top-level management teams is increasing, as they focus more on cyber security.

2023-10-30

Cyber Risk & Ransomware In 2023

Not If But When: Every 11 seconds a business falls victim to a ransomware attack and it's vital to stay ahead of the evolving threat. By Rob Smith

2023-10-30

The Security Measures Professionals Use To Prevent Being Attacked

Expert Advice: Understanding the consequences of an online action will lead users to understand their risks and take the right precautions. 

2023-10-26

How Businesses Can Avoid Firewall Vulnerabilities

Managed Firewall Services: Without help, thinly spread cybersecurity teams risk failing to protect valuable company data. By Erik Nordquist

2023-10-25

How Cybercriminals Could Be Infiltrating Your Supply Chain

Island Hopping: Infiltrating a single, weaker target to exploit existing credentials and gain access into larger enterprises. By Stuart Hodkinson

2023-10-23

ZTNA Is The Foundation Of Great VDI Deployments

Virtual DeskTop Infrastructure: Ensuring security in hosted desktop architectures can be a challenge. Zero Trust is the solution. By Karen Gondoly

2023-10-20

Four Key Cybersecurity Trends For Industrial Companies

Unlocking Cybersecurity: Manufacturing, energy, transport & utility firms offer hackers many entry points to find vulnerabilities. By Edgardo Moreno

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

Vertical Structure

Vertical Structure

Vertical Structure services include Security & Penetration Testing, Information Assurance, Bespoke Training Programs and Secure Hosting.

Quotium

Quotium

Quotium provides automated testing technologies to make business software applications secure and robust.

KLC Consulting

KLC Consulting

KLC Consulting offers information assurance / Security, IT Audit, and Information Technology products and services to government and Fortune 1000 companies.

Fingerprint Cards

Fingerprint Cards

Fingerprint Cards develops and produces biometric components and technologies that verify a person’s identity through the analysis and matching of an individual’s unique fingerprint.

ETSI

ETSI

ETSI is a European Standards Organization dealing with telecommunications, broadcasting and other electronic communications networks and services including cybersecurity.

The Security Company (TSC)

The Security Company (TSC)

The Security Company is a leading provider of creative employee security awareness programmes.

Cytellix

Cytellix

Cytellix is an industry-standards-based, managed cybersecurity service provider, specializing in proactive behavioral analytics and situational awareness of an organization’s cyber posture.

Cyber Security Partners (CSP)

Cyber Security Partners (CSP)

Cyber Security Partners specialise in the provision of Cyber Security Consultancy, Data Protection and Certification and Compliance services.

Strike Security

Strike Security

Strike Security offers a continuous penetration testing platform that combines automation with ethical hackers.

ThrottleNet

ThrottleNet

ThrottleNet provides world-class managed IT services and cybersecurity to organizations in St. Louis and throughout Missouri.

ArmorPoint

ArmorPoint

ArmorPoint redefines the traditional approach to cybersecurity by combining network operations, security operations, and SIEM technology in one platform.

Sayers

Sayers

Sayers is best known for its ability to solve business challenges with IT solutions. Our areas of expertise include cloud, storage, virtualization, security, mobility and networking.

Trovent Security

Trovent Security

Trovent was founded with a clear goal: to support medium-sized companies in significantly increasing their IT security level.

Bestman Solutions

Bestman Solutions

As a specialist cyber security practice, we believe that people are an organisation’s most valuable asset. Success depends on hiring the right people, and this is where we come in.

Algoritha

Algoritha

Algoritha is a pioneering entity in the realm of security and forensic services.

Sola Security

Sola Security

Sola Security is a cyber security startup company currently in Stealth mode.