TECHNOLOGY > > Resilience


« Back to News

2024-10-28

Zero Trust Architecture: The Key To Securing Hybrid Environments 

Securing hybrid environments, which blend on-premise, public cloud and private cloud resources, presents a complex challenge. By Asher Benbenisty

2024-10-24

The Financial Impact Of Cybercrime

A CFO's Nightmare: Many organizations continue to underestimate the financial consequences of a breach. By John Mc Loughlin

2024-10-22

How Can Cloud Risk Management Elevate Your Cybersecurity Posture?

With cloud computing, cybercrime has become more sophisticated, with unique risks like misconfigurations & insider threats. By Narendra Sahoo

2024-10-21

The UK Needs To Reevaluate Its Cybersecurity Strategy

It is time for the Labour Government to introduce the measures required to safeguard businesses, consumers and their data. By Paul Holland

2024-10-14

CISOs Guide To Compliance & Cyber Hygiene 

Back To Basics: The key concern is to make sure the organisation has the right mechanisms to mitigate risks. By Michael Covington

2024-10-14

A Landmark Ransom Attack On Healthcare

$2.3 Billion In Costs: What one of the worst attacks to ever hit the US healthcare industry can teach us about cybersecurity in 2024. By Claud Bilbao

2024-09-26

A Critical Flaw Exposing Google Cloud Servers

CloudImposer: The flaw could potentially expose millions of servers operating on Google Cloud Platform to Remote Code Execution attacks. 

2024-10-04

Cyber Insurance: What Businesses Need To Know

A Crucial Safety Net Gets More Expensive: As ransomware incidents have surged, so too have the premiums for cyber insurance. By Greg Day

2024-10-08

AI Is No Substitute For Cyber Experts

AI is not a replacement for human expertise, but a powerful tool that complements and enhances the capabilities of cyber security professionals.

2024-10-07

Data Centres Are Just As Important As The Power Grid & Healthcare

The recent global IT outage caused by CrowdStrike has shown why keeping Data Centres secure and safe is critical to the UK.

2024-10-04

Protecting Company Data From The Risks Of Remote Working

Nine Key Cyber Security Measures: A recent Forbes Advisor survey showed that, of 1,100 respondents, 63% of worked remotely all or some of the time.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

FlashRouters

FlashRouters

FlashRouters offers DD-WRT compatible router models with improved performance, privacy/security options, and advanced functionality.

International Accreditation Forum (IAF)

International Accreditation Forum (IAF)

The IAF is the world association of Conformity Assessment Accreditation Bodies. Its primary function is to develop a single worldwide programme of conformity assessment.

LinkUp

LinkUp

LinkUp is a leading data-driven job search company. Every day we index millions of job openings directly from employer websites.

Red Snapper Recruitment

Red Snapper Recruitment

Red Snapper Recruitment is a market leading staffing services provider to the law enforcement, cyber security, offender supervision and regulatory services markets.

ArmorText

ArmorText

ArmorText offers a seamless channel for communication and collaboration for organizations concerned with keeping communication data private and secure.

DarkLight

DarkLight

DarkLight is a cybersecurity platform that mimics human thinking at scale to build resiliency to Advanced Persistent Threats.

Jerusalem Venture Partners (JVP)

Jerusalem Venture Partners (JVP)

JVP’s Center of Excellence in Be’er Sheva aims to identify, nurture and build the next wave of cyber security and big data companies to emerge out of Israel.

Informatics International

Informatics International

Informatics is a leading ICT provider in Sri Lanka, providing cutting-edge software & infrastructure solutions and services including cyber security.

AdaCore

AdaCore

AdaCore is focused on helping developers build safe, secure and reliable software.

Zigrin Security

Zigrin Security

Zigrin Security offer comprehensive, hands-on security testing of internal networks, applications, cloud-based solutions, e-commerce applications and mobile devices.

Eleos Labs

Eleos Labs

Eleos Labs' suite of security tools prevent Web3 cyber attacks, reduce economic risks, and protect digital assets.

Threat Con

Threat Con

Threat Con is a one of its kind event in Nepal, a series of annual international security conventions similar to the famous Black Hat and DEF CON conferences.

Moonlock

Moonlock

Cybersecurity tech for humans. At Moonlock, we make software that seamlessly protects you and has your back as you live your life.

EPIQ Infotech

EPIQ Infotech

EPIQ Infotech is a trusted consulting and implementation partner for Oracle JD Edwards and Amazon Web Services (AWS).

Iolo

Iolo

Iolo develops patented technology and award-winning software that repairs, optimizes, and protects computers, to maximize system speed and performance while keeping them safe.

Cyderes

Cyderes

Cyderes (Cyber Defense and Response) is a global, pure-play, full life-cycle cyber security services provider formed from the merger of Herjavec Group and Fishtech Group in 2022.

Vana Solutions

Vana Solutions

Vana Solutions is an Information Technology Services company. We help commercial & federal organizations select, adapt, and integrate the right technology solution so you can move faster.