TECHNOLOGY > > Resilience


« Back to News

2022-11-01

A Multi-layered Approach To Data Resilience

Going Beyond Backup & Recovery: Use automation, orchestration, multiple format copies & data snapshots to save critical data. By Florian Malecki

2022-11-01

Proactive Cyber Security Is A Must Have

When 'You're being offensive" is a compliment: Playing the enemy at their own game using offensive cyber security practices. By Pablo Zurro

2022-11-07

Artificial Intelligence & Its Impact On Cyber Security

Detecting the most dangerous attacks that can take down the network, versus intrusions which are problematic but won't take everything down.

2022-10-31

Make Sure Your MSP Isn’t Your Security Achilles’ Heel

Supply Chain Risks: Seven traits you need to identify to be sure your Managed Services Provider has a strong security stance. By Leyton Jefferies

2022-10-26

The Five Stages Of A Cyber Attack

Attack Paths Matter: Escalating access privileges from Ordinary User to Admin can give attackers almost unlimited power. By Bryan Patton

2022-10-21

Under Pressure - Can CISOs Avoid Burnout?

CISOs are concerned about ransomware attacks evolving beyond their team’s knowledge, skills & capabilities. By Mark Guntrip

2022-10-18

Network Security Recommendations Tailored To Your Business

Byos Network Security Maturity Assessment: A free tool that enables companies to rapidly evaluate the strength of their cyber security strategy.   

2022-10-19

Making Cyber Attack Detection Easier With Artificial Intelligence

New AI software tools enable collection of electricity usage data from network devices to detect fluctuations and swiftly identify and stop attacks.

2022-10-14

Legacy Technology is Undermining How Business Responds To Ransomware

Obsolete: Half of UK organisations surveyed depend on outdated, legacy backup and recovery infrastructure to manage & protect their data.

2022-10-14

Microsoft Teams Is Vulnerable To GIFShell Attacks

GIFShell: A new attack technique allows threat actors to exploit Microsoft Teams for phishing attacks and remote data theft using image files.

2022-10-18

Security Patching As A Service

Aunalytics launches its Security Patching Platform, Co-managed Patching As A Service to complement their Advanced Security solution suite.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

AvePoint

AvePoint

AvePoint is an established leader in enterprise-class data management, governance, and compliance software solutions.

TestFort

TestFort

TestFort QA Lab is a specialized software testing company offering independent quality assurance and software testing services.

Orange Cyberdefense

Orange Cyberdefense

Orange Cyberdefense is the expert cybersecurity business unit of the Orange Group, providing managed security, managed threat detection & response services to organizations around the globe.

CRYPTTECH

CRYPTTECH

CRYPTTECH specializes in Information Security and Intelligence, Risk Evaluation and Vulnerability Recognition against Cyber-Attacks and APTs.

Garland Technology

Garland Technology

Garland Technology specializes in network access points (TAPs) for 100% visibility allowing you to see every bit, byte, and packet flowing through your network.

Axonius

Axonius

Axonius is the only solution that offers a unified view of all assets and their coverage, empowering customers to take action to enforce their organization’s security policies.

CryptoCurrency Certification Consortium (C4)

CryptoCurrency Certification Consortium (C4)

The CryptoCurrency Certification Consortium is a non-profit organization that provides certifications to professionals who perform cryptocurrency-related services.

Suridata

Suridata

Suridata’s SaaS Security platform enables organizations to secure the use of SaaS applications.

PhishFirewall

PhishFirewall

PhishFirewall is an advanced AI-driven CyberSecurity Awareness Education, Threat Emulation, and Human Security Analytics Platform.

META-Cyber

META-Cyber

META-cyber was founded by engineers with experience in process and control-protection to provide cyber security for industrial infrastructure.

AnyTech365

AnyTech365

AnyTech365 is a leading European IT Security and Support company helping end users and small businesses have a worry-free experience with all things tech.

StarLink

StarLink

StarLink is an acclaimed Value-Added Distributor across the Middle East, Turkey and Africa regions with on-the-ground presence in 20 countries including UK and USA.

ASMGi

ASMGi

ASMGi is a managed services, security and GRC solutions, and software development provider.

Fulcrum Technology Solutions

Fulcrum Technology Solutions

The Fulcrum team of technologists are recognized experts in the fields of IT Infrastructure Technology, Security, Service Management and Support.

ETI-NET

ETI-NET

ETI-NET is the worldwide leader in managing critical data for industries that never stop.

GetReal Security

GetReal Security

GetReal Security is the world’s leading authority on malicious digital content and deepfake protection.