TECHNOLOGY > > Resilience


« Back to News

2021-09-21

Zero Trust Architecture - No Longer A ‘Nice to Have’

A Zero Trust mindset is now an operational necessity & there are some essential components organisations must adopt. By Paul German

2021-09-15

British Organisations Are Unready For Remote Work

Risky Business: Research shows that half of British companies lack the basic cyber security skills and employers need to take urgent action. 

2021-09-14

National Cybersecurity Failings: How Businesses Can Improve Their Security

Despite the UK scoring highly for cybersecurity in the past, in the latest index the country ranks as 8th worst across Europe. By Hayley Kershaw

2021-09-14

Secure Network Access For The Modern Distributed Workforce

When a company’s digital assets have to travel long distances over the Internet to share between remote workers, you can trust nothing and no one.

2021-09-13

Mēris Botnet Goes Global

The Mēris botnet is comprised of around 250K malware-infected devices and lies behind a damaging wave of large scale DDoS attacks.

2021-09-10

Privacy Concerns In CRM: 3 Key Ways To Avoid Security Risks

CRM software contains valuable data on customer behavior and buying patterns, usually considered to be jackpots by hackers. By Myrah Abrar

2021-09-07

Zero Trust - The New Standard Of Security

Perimeter-based defences, such as firewalls or signature-based antivirus software are no longer sufficient to protect networks. By Charles Griffiths

2021-10-05

Securing Hybrid Workplaces From Attack

If organisations are going to use hybrid work models successfully over the long term, then they will need to further invest in their security strategy. 

2021-09-01

Malware Attacks Target Linux-based Operating Systems

Linux operating systems are being targeted, with nearly 13m detections in 2021 H1, mostly in outdated systems running unpatched software.

2021-08-30

Urgent Action By Microsoft To Protect Cloud Users

A massive flaw discovered in the main databases stored in the MS Azure cloud platform means that all users need to change their digital access keys.

2021-08-31

US Tech Giants To Spend Billions On National Cyber Security

Apple, Amazon, Google, IBM and Microsoft have promised to invest billions of dollars to strengthen cyber security and train skilled workers.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Australian Information Security Association (AISA)

Australian Information Security Association (AISA)

AISA champions the development of a robust information security sector by building professional capacity and advancing the cyber security of the public, business and governments in Australia.

International Security Management Association (ISMA)

International Security Management Association (ISMA)

ISMA is an international security association of senior security executives from major business organizations located worldwide.

Consult Hyperion

Consult Hyperion

Consult Hyperion is an independent strategic and technical consultancy specialising in digital identity and secure electronic transactions.

NetMonastery DNIF

NetMonastery DNIF

NetMonastery is a network security company which assists enterprises in securing their network and applications by detecting threats in real time.

Perception Point

Perception Point

Perception Point is a Prevention-as-a-Service company, built to enable digital transformation. Our platform offers 360-degree protection against any type of content-based attack.

ERNW

ERNW

ERNW is an independent IT Security service provider with a focus on consulting and testing in all areas of IT security.

Cyber Discovery

Cyber Discovery

Cyber Discovery, the UK Government's Cyber Schools Programme, is a learning programme designed to give young people the opportunity to learn the skills needed to enter the cyber security profession.

GreyCortex

GreyCortex

GreyCortex uses advanced artificial intelligence, machine learning, and data mining methods to help organizations make their IT operations secure and reliable.

Greenwave Systems

Greenwave Systems

Greenwave's AXON Platform enables IoT and M2M network service providers to address security, interoperability, flexibility and scalability from a single IoT platform.

Penacity

Penacity

Penacity, LLC provides strategic consulting technology services and Information Security Services to commercial and government organizations.

aDolus Technology

aDolus Technology

aDolus delivers a robust solution for safeguarding against counterfeit or malicious software and firmware in mission-critical systems.

Vigilant Technology Solutions

Vigilant Technology Solutions

Vigilant is a global cyber security technology company offering solutions to manage entire IT & cyber security lifecycles.

Yoti

Yoti

Yoti offer a suite of business solutions that span identity verification, age estimation, e-signing and AI anti-spoofing technologies.

RiskOptics

RiskOptics

RiskOptics (formerly Reciprocity) equips organizations with one of the most intuitive and powerful information security and cyber risk management solutions in the market.

DigitalWell

DigitalWell

DigitalWell provide fully managed IT and communications solutions for a truly innovative end-to-end experience - for your customers and teams.

Dope Security

Dope Security

Dope Security is a fly-direct Secure Web Gateway that eliminates the data center stopover architecture required by legacy providers, instead performing security directly on the endpoint.