TECHNOLOGY > > Resilience


« Back to News

2022-05-26

Intelligent Solutions: How Innovation Is Helping To Suppress Cyber Attacks

Powerful innovations in Quantum, AI, Biometrics and Password Management are helping defend against cyber threats. By Chester Avey

2022-05-25

Satellite Systems Security Needs To Be Reinforced Against Cyber Attack

Cyberspace is the 'soft underbelly' of satellite communications systems and the real vulnerabilities exist on the ground rather than in space.

2022-05-19

Never Trust Anything Again - The Zero Trust World

Organisations must abandon the ‘trust everything, but verify’ approach. Never trust. Always verify. Continuously monitor. By Colin Tankard

2022-05-23

Why Data Storage Is the Number One Cyber Recovery Strategy

Avert the worst consequences of cyber crime: Create multiple backups of your files, keeping your business safe from major data disasters.

2022-05-17

British Cyber Security At Risk From Russia

Britain's security Minister and his spy agency chiefs agree that the cyber war in Ukraine is spreading and a nationwide response is needed.

2022-05-17

The Big Cyber Security Threats That You Can Prepare For

No organisation is safe online. There are a wide range of risks and the best defence is awareness of the major types of threat and proper training.

2022-05-13

Some Apps Come Loaded With Malware

App stores share a common threat profile. Apps loaded with malware present the most immediate risk to millions of unsuspecting users.

2022-05-09

India Issues A Directive For Reporting Cyber Incidents

The Indian government has issued a directive requiring organisations to report cyber security incidents to CERT-IN within six hours of their discovery.

2022-05-06

Cybersecurity Lessons From Ancient History

Nothing New: Ransomware operates in the same way as the Trojan Horse and history can teach us a lot about cyber security today. By Phil Ashley

2022-05-05

Are Your Employees The Weakest Link Against Cyber Crime?

The vast majority of cyber attacks involve employee error. A well-trained workforce is the greatest defence you can have. By Steve Whiter

2022-05-05

Find Your Security Vulnerability Before Hackers Do

Where is your network the most vulnerable? Here is a three point plan to fix the problem now, before hackers exploit it. By Keith Bromley

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

QATestLab

QATestLab

QATestLab is a leading International software testing company offering a full range of software testing services including security testing.

Westermo Network Technologies

Westermo Network Technologies

Westermo designs and manufactures robust, resilient and secure data communications products for mission-critical industrial systems.

Equilibrium Security Services

Equilibrium Security Services

Equilibrium Security Services is a specialist cyber security company providing a full spectrum of IT security solutions from consultancy to design & implementation and managed security services.

Garrison Technology

Garrison Technology

Garrison SAVI® is a unique technology for secure remote browsing that can dramatically change the risk profile for enterprise cyber security.

AVL Mobile Security

AVL Mobile Security

AVL Mobile Security is a market-leading mobile security company for anti-virus and threat intelligence in the mobile Internet.

Scientific Cyber Security Association (SCSA)

Scientific Cyber Security Association (SCSA)

The main goal of Scientific Cyber Security Association is the development of scientific and practical directions of cyber security.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

OpenZeppelin

OpenZeppelin

OpenZeppelin builds developer tools and performs security audits for distributed systems that power multimillion-dollar economies.

AngelList

AngelList

AngelList champion startups and the people who empower them. Search tech & startup jobs, find new tech products, and invest in startups.

Crosspoint Capital Partners

Crosspoint Capital Partners

Crosspoint Capital Partners is a private equity investment firm focused on the cybersecurity and privacy sectors.

Cyberi

Cyberi

Cyberi provide specialist technical consultancy and cyber advisory services, from penetration testing and assurance to incident management and response, and technical security research.

Private Client Cyber Security (PCCS)

Private Client Cyber Security (PCCS)

PCCS provides enterprise-grade cybersecurity consulting and services to professional practices, executives, athletes, and high net worth families.

Ekco

Ekco

Ekco is one of Europe’s leading managed cloud providers. With a network of infrastructure and security specialists across Europe, we’ve perfected our approach to supporting digital transformation.

GTT Communications

GTT Communications

GTT are a global network provider that serves thousands of multinational and national enterprise, government and carrier customers with a portfolio of advanced connectivity and security services.

Chugach Government Solutions (CGS)

Chugach Government Solutions (CGS)

CGS performs work for the Federal Government across 4 unique core lines of business, including: Facilities Management and Maintenance, Construction, Technical IT and Cyber Services, and Educational Se

Prikus Tech

Prikus Tech

Prikus is a full-fledged Cyber Security Company helping organizations worldwide to manage cyber risks. We offer Risk & Compliance Services, Security Testing & Managed Security Services.