TECHNOLOGY > > Resilience


« Back to News

2023-02-16

Businesses Need To Prioritise Cybersecurity In 2023

Turning employees from the weakest links in your cybersecurity strategy to the strongest will help keep criminals out & data safe. By AJ Thompson

2023-02-13

Rising Cybercrime Means SMEs Should Seek Cyber Insurance

Having insurance can help protect a company’s reputation and brand plus provide the expertise to manage cyber incidents. By Simon West

2023-02-08

Creating Order Out Of WAF Management Chaos

Web Application Firewall Management: How WAF rules are run & processed can provide security without sacrificing performance. By Paul McNamara

2023-02-08

SMBs Are Taking Cybersecurity More Seriously

A new report finds that Small & Medium Businesses are actively investing in cyber protection - but there is room for improvement. By Chris Mckie

2023-02-06

Operational Resilience: More Than Disaster Recovery 

At a business level, disaster recovery is just one aspect of a larger discipline: operational resilience. By Sean Deuby & Simon Hodgkinson

2023-01-28

How Can SASE Boost Information Security?

Secure Access Service Edge: SASE can provide a comprehensive level of protection against cyber threats & simplify security management.

2023-01-27

Bridging The Detection & Response Gap

Failure To Adapt: As cyber attackers move faster, here are five ways organisations can stay ahead of them. By Matt Lawrence & Dan Green

2023-01-25

Preventing Ransomware Attacks Begins With You

Don't Forget To Protect Your Data: What business owners need to know about identifying attacks and keeping their employees safe.

2023-01-20

Perfectly Coded APIs Can Be Susceptible To Attack

A False Sense Of Security: Even if an API is perfectly coded, inventoried & tested, it can still be probed and compromised. By Andy Mills

2023-01-19

Building An Identity-First Security Strategy

Going Beyond The NIS2 Directive: Effectively protecting identities, both human and machine, is a top priority for enterprises. By Tim Callan

2023-01-17

Three Steps To Protect Your Organisation From Wiper Malware

How to Avoid A Wipeout: No matter what cybercriminals may do, a robust backup and recovery plan will keep your data secure. By Florian Malecki

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Cyber Technology Institute - De Montfort University

Cyber Technology Institute - De Montfort University

The Cyber Technology Institute provides training and high quality research and consultancy services in the fields of cyber security, software engineering and digital forensics.

CNCERT/CC

CNCERT/CC

CNCERT is the national Computer Network Emergency Response Technical Team / Coordination Center of China.

Anomali

Anomali

Anomali delivers intelligence-driven cybersecurity solutions to enhance threat visibility, automate threat processing and detection, and accelerate threat investigation, response, and remediation.

AVG Technologies

AVG Technologies

AVG is focused on providing home and business computer users with the most comprehensive and proactive protection against computer security threats.

itWatch

itWatch

itWatch is focused on data loss prevention (DLP), endpoint security, mobile security, encryption, and cost reducing solutions for IT operations.

Digital Arts

Digital Arts

Digital Arts provides internet security software and appliance products for companies and individuals.

BELAC

BELAC

BELAC is the national accreditation body for Belgium.

X4 Technology

X4 Technology

X4 Technology is a leader in finding the very best technology talent for some of the world’s most innovative start-ups and globally recognised brands.

CryptoCurrency Certification Consortium (C4)

CryptoCurrency Certification Consortium (C4)

The CryptoCurrency Certification Consortium is a non-profit organization that provides certifications to professionals who perform cryptocurrency-related services.

IT Search

IT Search

IT Search is a specialist IT recruitment company focusing on Cyber Security, IT Infrastructure, Software, Data, Digital Transformation and C Suite leadership positions.

Prosperoware

Prosperoware

Prosperoware develop software for cybersecurity, privacy, and regulatory compliance for content systems, and financial matter management.

Enginsight

Enginsight

Enginsight provides a comprehensive solution for monitoring and securing your servers and clients.

Infinipoint

Infinipoint

Infinipoint pioneers the first Device-Identity-as-a-Service (DIaaS) solution, addressing Zero Trust device access and enabling enterprises of all sizes to automate cyber hygiene.

ID R&D

ID R&D

ID R&D is an award-winning provider of AI-based facial liveness, document liveness, and voice biometrics.

BreakPoint Labs

BreakPoint Labs

BreakPoint Labs is dedicated to providing the methods and means for sustainable, measurable, and effective cybersecurity operations.

Ventum Consulting

Ventum Consulting

Ventum Consulting stands for digitalization, networking and agilization. We take this up on the strategic, professional and technical side and support our customers in the digital transformation.