TECHNOLOGY > > Resilience


« Back to News

2022-11-25

Five Ways Executives Can Optimize Cyber Security Spending

The Right Tools & People: Just pouring money into cyber security does not automatically result in increased preparedness. By Lee Rossey

2022-11-25

Navigating The Evolving Threat Landscape

Top Two Priorities: Organizations must adopt a culture of becoming operationally resilient to survive the evolving threat landscape. By Tom Goodwin

2022-11-25

Shifting Left In Enterprise Cloud Security

Speed Versus Safety: Companies need to invest in preventative measures to safeguard their cloud estates against cyber attacks. By Stuart Green

2022-11-23

Simplicity In Complexity: The Key to Successful Threat Exposure Management

Continuous Threat Exposure Management: CTEM is the key that unlocks the convoluted situation of threat handling, bringing order to chaos.

2022-11-23

How to Combat Common Information & Collaboration Security Threats

Cyber Security Enables Business: Every single business is a target and attacks are only going to become more subtle & more frequent. By Onur Özen

2022-11-26

Outsourcing IT Systems & Data Management Can Be A False Economy

Risky Business: In the connected world organisations increasingly rely on outside providers to fulfill their cyber and IT supply chain needs.

2022-12-06

Smartphones Are More Vulnerable Than You Think

Ghost Touch: Most mobile phone users of all ages have a smartphone, although few are aware quite how vulnerable these devices are to attacks.

2022-11-21

Four Reasons You Need RASP Security For Web Applications

Runtime Application Self Protection: RASP is a very flexible and adaptable security solution to protect a diverse range of business applications.

2022-11-21

Shopping Safely Online During Black Friday

Free CISO Toolkit: Guidance on safe online shopping to help CISOs defend employee desktops, laptops, mobile devices & corporate networks.

2022-11-21

Detected - A Hard Matching Vulnerability Which Enables Azure AD Account Takeover

SyncJacking: Attackers can abuse hard matching synchronisation in Azure AD Connect to take over any synchronized account.

2022-11-16

Cybersecurity Awareness: Simple Actions To Dial Up Digital Defences

Cyber Criminals Are Awake 24/7: Hackers never sleep and neither should our defences - vigilance & education are critical in the office and at home.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Infosecurity Europe

Infosecurity Europe

Infosecurity Europe is Europe’s number one information security conference and exhibition.

HPE Aruba Networking

HPE Aruba Networking

HPE Aruba Networking, a Hewlett Packard Enterprise company, is a leading provider of next-generation network access solutions for the mobile enterprise.

KoolSpan

KoolSpan

KoolSpan’s security and privacy solutions address the growing threat of loss or theft of intellectual property, information, and proprietary assets.

Partnership for Conflict, Crime and Security Research (PaCCS)

Partnership for Conflict, Crime and Security Research (PaCCS)

PaCCS delivers high quality and cutting edge research to improve our understanding of current and future global security challenges in areas including cybersecurity.

Ascend Technologies

Ascend Technologies

Ascend Technologies offers a full suite of managed IT services including: Cloud & Infrastructure Management, Cybersecurity Management, Service Desk Management, Application Management , Data Management

NuCrypt

NuCrypt

NuCrypt is developing technology that is applicable to ultrahigh security data encryption as well as key distribution.

SyferLock Technology Corp.

SyferLock Technology Corp.

SyferLock is an innovative provider of next-generation authentication and security solutions.

LANCOM Systems

LANCOM Systems

LANCOM Systems is the leading European manufacturer of secure, reliable and future-proof networking (WAN, LAN, WLAN) and firewall solutions for the public and private sectors.

Node4

Node4

Node4 provide advanced, cloud-led digital transformation solutions, delivered with technical expertise, innovation and exceptional service to drive your business forwards.

Bright Pixel Capital

Bright Pixel Capital

Bright Pixel Capital is a venture capital company with a focus on Cybersecurity, Retail Technologies, Digital Infrastructure and Emerging Technologies.

Campus cyber

Campus cyber

A project initiated by the President of the Republic, the Cyber Campus is the totem site of cybersecurity that brings together the main national and international players in the field.

Silent Push

Silent Push

Silent Push maps all internet-facing infrastructure with searchable, advanced attributes, generating early indicators of potential threats that are tailored to your environment.

ThreatER

ThreatER

ThreateER (formerly ThreatBlockr / Bandura Cyber) is a cybersecurity platform that provides active network defense by automating the discovery, enforcement, and analysis of cyber threats at scale.

Judy Security

Judy Security

Judy (formerly AaDya Security) provides smart, simple, effective, all-in-one cybersecurity for SMBs. Get the 24/7 protection and support you deserve, at a price you can afford.

Fescaro

Fescaro

FESCARO is a trusted cybersecurity partner for global automakers and their partners, helping them transition to software-defined vehicles (SDVs) with tailored automotive software solutions.

Sprocket Security

Sprocket Security

Sprocket Security protects your business by monitoring the cybersecurity landscape and performing continuous penetration testing services.

Incode

Incode

Incode is the leading provider of world-class identity solutions that is reinventing the way humans authenticate and verify their identities online.