TECHNOLOGY > > Resilience


« Back to News

2022-11-09

The Reality Check For Small & Medium Businesses

Ransomware: Few small & medium sized businesses realize they are just as much at risk as much larger enterprises. By Muhammad Yahya Patel

2022-11-22

Cyber Security In The Education Sector

What Teachers, Parents and Students Should Know About Cyber Security: Cyber security is crucial in any business setting, but especially in education.

2022-11-03

Is It Time To Consolidate Systems?

Too many businesses are managing multiple endpoints, incompatible dashboards & struggle to integrate systems with defences. By Colin Tankard

2022-11-03

The Do’s and Don’ts Of Security Risk Management

Risk management is not static and, done correctly, can bring about continuous improvement and business growth. By David Adams

2022-11-02

How Long Does It Take Before An Attack Is Detected?

Hackers can stay around in your network for a long time - organisations may not even know they have been attacked & robbed until it is far too late.

2022-11-02

Are Compromised Passwords Putting Your Company At Risk?

Compromised Passwords: To create a password policy fit for today’s threat landscape, you need to be looking at third-party alternatives.

2022-11-01

The Challenges Of Moving To Zero Trust

It's A Journey: Implementing a Zero Trust strategy must take account of both legacy technology and the timescale required. By Kevin Ware-Lane

2022-11-01

A Multi-layered Approach To Data Resilience

Going Beyond Backup & Recovery: Use automation, orchestration, multiple format copies & data snapshots to save critical data. By Florian Malecki

2022-11-01

Proactive Cyber Security Is A Must Have

When 'You're being offensive" is a compliment: Playing the enemy at their own game using offensive cyber security practices. By Pablo Zurro

2022-11-07

Artificial Intelligence & Its Impact On Cyber Security

Detecting the most dangerous attacks that can take down the network, versus intrusions which are problematic but won't take everything down.

2022-10-31

Make Sure Your MSP Isn’t Your Security Achilles’ Heel

Supply Chain Risks: Seven traits you need to identify to be sure your Managed Services Provider has a strong security stance. By Leyton Jefferies

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

HackerOne

HackerOne

HackerOne was started by hackers and security leaders who are driven by a passion to make the internet safer.

Seclore

Seclore

Seclore is the most advanced, secure, and automated Enterprise Digital Rights Management (EDRM) solution available.

VADO Security Technologies

VADO Security Technologies

VADO Security enables the safe transfer of data between low & high security networks.

GraVoc

GraVoc

GraVoc is a technology-consulting firm committed to solving business problems for customers through the development, implementation, & support of technology-based solutions.

Oak Ridge National Laboratory (ORNL)

Oak Ridge National Laboratory (ORNL)

ORNL conducts basic and applied research and development in key areas of science for energy, advanced materials, supercomputing and national security including cybersecurity.

Austrian Trust Circle

Austrian Trust Circle

Austrian Trust Circle is an initiative of CERT.at and the Austrian Federal Chancellery and consists of Security Information Exchanges in the areas of the strategic information infrastructure.

Yelbridges

Yelbridges

Yelbridges offer high quality IT security & risk management services to mitigate business risks.

Dice

Dice

Dice is a leading recruitment platform, helping technology professionals manage their careers and employers connect with highly skilled tech talent in specialist areas including cybersecurity.

Baker Donelson

Baker Donelson

Baker Donelson is a law firm with a team of more than 700 attorneys and advisors representing more than 30 practice areas including Data Protection, Privacy and Cybersecurity.

Cyber Gate Defense (CyberGate)

Cyber Gate Defense (CyberGate)

CyberGate is an Emirati establishment founded with an objective to provide cyber security services that would improve the overarching cyber security posture of the UAE.

Beetles Cyber Security

Beetles Cyber Security

Beetles is a crowdsourced penetration testing platform designed to build a trusted, hacker-centric approach to protectan organization’s digital attack surface.

V2X

V2X

V2X delivers IT support, networking, and cybersecurity solutions that ensure optimal mission support and performance.

Edge Security

Edge Security

Edge Security is an information security research and consulting firm of expert hackers.

Cyber Guards

Cyber Guards

Cyber Guards provide comprehensive, turn-key cyber security programs for small and mid-size business for about the cost of one full-time cybersecurity hire.

RIIG Technology

RIIG Technology

Our mission is to empower organizations with high-quality, verifiable data and advanced intelligence solutions, ensuring robust security and effective risk management.

Attaxion

Attaxion

Attaxion is an External Attack Surface Management (EASM) Platform. We offer attack surface management solutions with #1 asset coverage and laser-focused, actionable intelligence.