TECHNOLOGY > > Resilience


« Back to News

2025-03-05

Getting Ready To Stop Ransomware Attacks

Look For Warning Signs: Ransomware attacks are a process that gradually invade defensive systems in stages and need to be adequately prepared for.

2025-02-24

Cyber Doomsday Warnings Do More Harm Than Good

The constant escalation of doomsday language is a distraction from more urgent and practical cybersecurity priorities. By Joyce Hakmeh

2025-02-25

Preparing For A Cyber Crisis

How can business leaders best prepare for a cyber crisis, and what does effective management look like when an attack occurs? By Dan Potter

2025-02-23

Ransomware Trends & Top Six Predictions For 2025

Key Trends: Ransomware threats are expected to escalate in 2025, with cybercriminals adopting more sophisticated tactics to maximize their impact.

2025-02-19

The Difference Between Perception & Reality In Email Security

Mind The Gap: Outbound email security doesn’t get much attention beyond compliance, but it is the silent security killer. By Rick Goud

2025-02-14

Britain Fast-Tracks Military Recruitment For Cyber Defence

Less Rifle Drill, More Keyboard Drill: New cyber service personnel will have reduced basic training before three months of special cyber training.

2025-02-17

Business Interruption Is The #1 Cyber Risk

Cyber security risk, including ransomware, data breaches and IT disruptions, remain the top business concern worldwide over the past year.

2025-02-11

AI-Based Phishing Attacks Demand A Multi-Pronged Response

New Techniques Demand A Zero Trust Mindset: A new strategy for combating AI-powered phishing attacks is needed. By Oliver Paterson

2025-02-07

Combating Cyber Threats In The Age Of AI 

AI-powered tools are driving the many ways that cybercriminals deceive businesses into exposing their most sensitive information. By Phil Calvin

2025-02-07

Managing Dark Web Exposure In 2025

Navigating The Shadowy Frontiers: The dark web’s trade in stolen data presents several big challenges for organisations. By Vishaal Hariprasad

2025-02-06

File Transfers Can Be The Weakest Link

File transfers need to be easy, quick and most of all, safe. But that requires more than just a traditional email gateway solution. By Richard Bourne

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

DataGuidance

DataGuidance

DataGuidance is a platform used by privacy professionals to monitor regulatory developments, mitigate risk and achieve global compliance.

CERT Polska

CERT Polska

CERT Polska is the first Polish computer emergency response team and operates within the structures of NASK (Research and Academic Computer Network) research institute.

Digital Infrastructure Association (DINL)

Digital Infrastructure Association (DINL)

DINL is the leading representative for companies and organisations which are active within the Dutch digital infrastructure sector.

Logz.io

Logz.io

Logz.io is an AI-powered log analysis platform that offers the open source ELK Stack as a enterprise-grade cloud service with machine learning technology.

Core Security

Core Security

Core Security provides threat-aware identity, access, authentication and vulnerability management solutions.

CyberPrism

CyberPrism

CyberPrism provides SaaS solutions using proprietary technology, underpinned by industry-leading technical practitioners to protect OT within Government, Maritime and Industrial markets.

Cyber Discovery

Cyber Discovery

Cyber Discovery, the UK Government's Cyber Schools Programme, is a learning programme designed to give young people the opportunity to learn the skills needed to enter the cyber security profession.

MaskTech

MaskTech

MaskTech supplies highest security embedded chipsets, operating systems and related middleware for electronic identification cards, travel documents and authentication solutions.

Cyber Academy

Cyber Academy

Cyber Academy is one of the first institutions in the SE Europe region that provides a hands-on program in cyber security, blockchain and AI.

APERIO

APERIO

APERIO, the global leader in industrial data integrity, helps its customers drive profitability and sustainability while mitigating risk in their industrial operations.

Gigacycle

Gigacycle

Gigacycle is one of the leading IT disposal and recycling providers in the UK. We specialise in IT asset disposal (ITAD) and data destruction.

Sky Republic

Sky Republic

Sky Republic offers a Smart Contract Platform to integrate and synchronize business networks beyond EDI and API.

Startups.be

Startups.be

Startups.be helps tech entrepreneurs to be successful by providing quality access to service providers, business partners, customers and investors.

TAC Security (TAC Infosec)

TAC Security (TAC Infosec)

TAC Security (aka TAC Infosec) is a leading and trusted cyber security consulting partner that specializes in securing the IT infrastructure and assets of enterprises.

ThreatX

ThreatX

ThreatX provides complete web application & API protection to address expanding app footprints and complex attacks.

AirEye

AirEye

AirEye is a leader in Network Airspace Protection (NAP). Block attacks against your corporate network launched from wireless devices in your corporate network airspace.