TECHNOLOGY > > Resilience


« Back to News

2022-06-29

Cyber Security Tools For Your Small Business

Hackers love targeting small businesses and investing in cyber security tools can reduce your business' vulnerability and save valuable resources. 

2022-07-14

Cyber Security Training For Employees & Employers

Go Cyber: A different training approach that has a lasting, very positive impact and can significantly improve your organisation’s cyber security.

2022-06-27

Ransom: Prepare For The Worst

No sector is safe from ransomware and attacks are getting more sophisticated. How can you protect your business? By Simon Eyre

2022-06-17

Cloud Computing & Security: What Enterprises Should Know

What are the things that enterprises need to know regarding the maintenance of data in the cloud - is it really safe & secure? By Nicholas Parker

2022-06-09

Data Breaches & Identity Theft: Is Your Online Classroom Secure?

Bugs, Viruses & Identity: Three common security problems in the online classroom and the remedial measures to deal with them. By Diane Wong

2022-06-08

Small Business Still Not Ready For Cyber Attacks

Despite repeated warnings, it looks like US small businesses are failing to take any new steps to reduce their risk from the threat of cyber attacks.

2022-06-22

Email Security Threat Report

Threat intelligence firm Armorblox has produced detailed research which examines the changing threat landscape for business email users.

2022-06-15

Critical Business Systems Left Unmonitored & Insecure

Risky Business: Over 40% of companies don't include their core IT infrastructure systems in their routine cyber security monitoring activities.

2022-06-14

Ransomware’s Serious Effects On Cyber Security

Ransomware has rapidly evolved from a criminal 'malware incident' to a national security threat, in some cases successfully extorting $millions. 

2022-06-13

Ransomware - Get A Step Ahead

A Global Threat: No government, large, medium or small business, or any other organisation is immune to a ransomware attack.

2022-05-31

No future For IoT Security Without Secure Access Service Edge (SASE)

Iot Security: SASE introduces a new architecture where networking & security functions are bundled in a cloud-delivered service. By Martin Giess

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

Advanced Software Products Group (ASPG)

Advanced Software Products Group (ASPG)

ASPG offers a wide range of innovative mainframe software solutions for Data Security, Access Management, System Management and CICS productivity.

Y-PARC

Y-PARC

Y-PARC is a center of excellence for cybersecurity, precision industries and medtech, fostering innovation and development and support for startups.

Verificient Technologies

Verificient Technologies

Verificient Technologies specializes in biometrics, computer vision, and machine learning to deliver world-class solutions in continuous identity verification and remote monitoring.

Robert Walters

Robert Walters

Robert Walters is one of the world's leading global specialist professional recruitment and recruitment process outsourcing consultancies.

GAVS Technologies

GAVS Technologies

GAVS is a global IT services provider with focus on AI-led Managed Services and Digital Transformation.

R3I Ventures - House of DeepTech

R3I Ventures - House of DeepTech

The House of DeepTech is an incubator for deeptech entrepreneurs that are transforming global industries. Areas of interest include cybersecurity.

ENSCO

ENSCO

The ENSCO group of companies provides engineering, science and advanced technology solutions that guarantee mission success, safety and security to governments and private industries worldwide.

SynSaber

SynSaber

SynSaber is a data collection, detection, and visibility solution that forms the foundation of industrial cybersecurity.

SafeStack Academy

SafeStack Academy

SafeStack Academy is an online cyber security and privacy education platform. Our content is designed by experts to suit small businesses, growing companies, and development teams.

SignalFire

SignalFire

SignalFire invest across both enterprise and consumer sectors at the seed and early growth stages.

UK Cyber Cluster Collaboration (UKC3)

UK Cyber Cluster Collaboration (UKC3)

UKC3 has been launched to support Cyber Clusters and encourage greater collaboration across regions and nations of the UK.

Sekoia.io

Sekoia.io

Sekoia.io is a European cybersecurity company whose mission is to develop the best protection capabilities against cyber-attacks.

TAFEcyber

TAFEcyber

TAFEcyber is an Australian based consortium focusing on the skilling of the fast-growing cyber security workforce through education and training.

SequelNet

SequelNet

SequelNet is an emerging MSP, providing 360° business IT solutions and consulting services.

Btech

Btech

Btech is the market leader in providing affordable managed IT security services for credit unions.

Surf Security

Surf Security

SURF Security has transformed the browser into your strongest security asset while providing complete end-user privacy – all with full compliance.