TECHNOLOGY > > Resilience


« Back to News

2022-12-27

Preventing Insider Threats In Kubernetes Clusters

Secure Your Kubernetes Clusters From Inside Threats. The basics of insider threats and how to prevent it in Kubernetes. By Gilad David Mayaan

2022-12-22

Britain’s Free Cyber Security Service

Email Security Check: A new service to help organisations identify vulnerabilities that can let hackers spoof emails or create email privacy breaches.

2022-12-21

Reduce Vulnerabilities & Defend Your Brand Against DDoS Attacks

As network architecture evolves, so do DDoS attacks, exposing networks to vulnerabilities in critical applications & processes. By Paul McNamara

2022-12-27

Deploying NDR To Transform Threat Detection

Network Detection & Response (NDR) is a powerful solution to help cybersecurity teams detect more and respond faster to threats. By Kev Eley

2022-12-19

Ways Governments Can Better Protect Public Data

For hackers, local and national governments are seen as easy targets - they must dedicate themselves to improving cyber security. By Florian Malecki

2022-12-19

Under A Watchful Eye - Unified Observability

Tracking Vulnerabilities: A proper overview of the entire tech stack is vital to anticipate and to protect against security issues. By Matt Tuson

2022-12-13

Misconfigured Cloud Applications Are Putting Your Data At Risk

Shared Responsibility: When it comes to cloud applications, there’s no such thing as “security that is 100% handled by the vendor.” By Manuel Sanchez

2022-12-12

The Role Of Policies In Driving ‘Secured Productivity’

Delivering A Strong Security & Privacy Policy: Effective information security & data protection policy is a basic business need. By Scott Richardson

2022-12-07

Resilience Is Essential To Protecting Critical Infrastructure

Risks Of Blackout: Geopolitical tensions are placing pressure on Britain's energy supply, requiring a robust defence to cyber threats By Simon West

2022-12-09

Proactive Security Tips For Your Business After A Security Breach

Has your business fallen victim to a security breach? Consider the benefits of these security tips, tools & technologies to refortify your security.

2022-12-07

What Should CISO’s Look Out For In 2023?

Stand By For Turbulence: Four key emerging trends that were observed this year and are expected to grow throughout 2023. By Jonathan Lee 

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Chertoff Group

Chertoff Group

The Chertoff Group provide security advice and risk management services covering cyber security, insider threat, physical security and asset protection.

LogRhythm

LogRhythm

LogRhythm's security platform unifies SIEM, log management, network and endpoint monitoring, user behaviour analytics, security automation and advanced security analytics.

Foundation for Strategic Research (FRS)

Foundation for Strategic Research (FRS)

The Foundation for Strategic Research is France's main independent think tank on strategic, defense and security issues. Cyber security is covered as part of the study areas.

Seclore

Seclore

Seclore is the most advanced, secure, and automated Enterprise Digital Rights Management (EDRM) solution available.

NNIT

NNIT

NNIT​ is one of Denmark’s leading consultancies in IT development, implementation and operations, including cyber security.

AFNOR Group

AFNOR Group

AFNOR Group designs and deploys solutions based on voluntary standards around the world and provides services including training, professional and technical information, assessment and certification.

ACET Solutions

ACET Solutions

ACET Solutions delivers a wide range of Automation, Cyber Security and Enterprise IT/OT Integration Solutions to industrial clients.

GoSecure

GoSecure

GoSecure Managed Detection and Response helps all organizations reduce dwell time by preventing breaches before they happen.

Quantum Xchange

Quantum Xchange

As the provider of unbreakable quantum-safe encryption, Quantum Xchange gives commercial enterprises and government agencies the ultimate defense to keep high-value data safe.

Extreme Engineering Solutions (X-ES)

Extreme Engineering Solutions (X-ES)

Extreme Engineering Solutions is a leader in the design, manufacture, testing, and support of hardware and software solutions for the embedded computing market.

Automation Workz

Automation Workz

Automation Workz has been ranked as a top 10 Cybersecurity Bootcamp in the US by Career Karma.

SOOS

SOOS

SOOS is the easy-to-integrate software security solution for your whole team. Build, catch, and fix vulnerabilities with SOOS Software Composition Analysis.

Techsolidity

Techsolidity

Techsolidity is an emerging e-learning platform that offers a wide range of upskilling programs worldwide in areas including cybersecurity.

Guardey

Guardey

Guardey protects thousands of SME's environments. Whether your team works at the office, at home, at the customer or remotely. We protect your business. We do this in an accessible and affordable way.

ASPIA InfoTech

ASPIA InfoTech

ASPIA Infotech is a leading Information and cybersecurity organization focused on innovative approaches to avert targeted attacks.

Prefactor

Prefactor

Prefactor was built because the problem of authenticating and authorizing users continues to be a battle engineers face globally.