TECHNOLOGY > > Resilience


« Back to News

2021-08-04

New Tools Optimise Use Of Existing Data

Advances in cloud-based analytic tools are providing cost-effective operational improvements to ageing IT systems across many sectors.

2021-07-28

Ransomware Often Begins With Phishing

Phishing is the delivery mechanism of choice for ransomware and these are critical problems every organisation must address in order to keep secure.

2021-07-27

Security Orchestration Can Help Business SOAR

Companies should adopt a unified cyber strategy across architecture, M&A and regulatory compliance, to reduce their risks. By Colin Tankard

2021-07-26

The Semiconductor Shortage Is Causing Cyber Security Problems

The global shortage of semiconductors increases the risk of the use of counterfeit parts with serious implications for data loss and IP theft.

2021-07-19

Autonomous Ships And Cyber Security

Maritime Autonomy: Unmanned surface ships are becoming more independent and capable of accomplishing sophisticated missions.

2021-07-17

For Sale - Dark Web Exploits

Older exploits are cheaper and remain useful to cyber criminals for longer. Its just as important to update and patch for these as for Zero-Days.

2021-07-16

How B2B Companies Can Use Cyber Security For Data Protection

For optimum data protection, actionable intelligence needs to be followed up with robust cyber security solutions. By Lidia Hovhan

2021-07-14

Over 40% Of UK Organisations Reported To ICO Since GDPR

A survey suggests a lack of cyber resilience, with IT leaders having difficulty locating & securing data and in understanding their GDPR data obligations.

2021-07-14

British Police Double Down On CyberAlarm

A free police-led monitoring tool helps business users understand malicious online activity and improve their security and cyber resilience.

2021-07-12

The Post-Covid Cyber Security Challenge

The post-pandemic recovery presents the opportunity for organisations to rebuild a 'new normal' with much better resilience as the goal.

2021-07-12

Seven Steps To Create An Effective Disaster Recovery Plan

All organisations need an effective Cyber Disaster Plan in place to reduce the chances of a data loss from a cyber attack or ransomware demand.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

LogRhythm

LogRhythm

LogRhythm's security platform unifies SIEM, log management, network and endpoint monitoring, user behaviour analytics, security automation and advanced security analytics.

SSH Communications Security

SSH Communications Security

SSH Communications Security is a leading provider of enterprise cybersecurity solutions for controlling trusted access to information systems and data.

Cura Software Solutions

Cura Software Solutions

Cura Software Solutions (formerly Cura Technologies) is a market-leader in Governance, Risk and Compliance (GRC) enterprise applications.

Gatewatcher

Gatewatcher

Gatewatcher is a digital breach detection platform targeting crafted attacks and protecting organizations against advanced cyber threats.

Datacom Systems

Datacom Systems

Datacom Systems is a leading manufacturer of network visibility solutions.

Onspring

Onspring

Onspring is the cloud-based platform of choice for governance, risk and compliance (GRC) teams and business operations experts across multiple industries.

CynergisTek

CynergisTek

CynergisTek is a top-ranked cybersecurity and information management consulting firm dedicated to serving the healthcare industry.

Cyphercor

Cyphercor

Cyphercor is a leading smartphone and desktop-based two-factor authentication (2FA) provider.

Allthenticate

Allthenticate

Allthenticate Single Device Authentication (SDA), enables seamless authentication in both the physical and digital words while unifying management in one easy-to-use interface.

WheelHouse IT

WheelHouse IT

WheelHouse IT secures, manages, and advances businesses with innovative, cost-effective IT solutions.

Block Harbor Cybersecurity

Block Harbor Cybersecurity

Block Harbor has worked closely with automakers, suppliers, and regulators since 2014 on vehicle cybersecurity.

DigitalPlatforms

DigitalPlatforms

DigitalPlatforms SpA is an Italian group with the mission of providing end-to-end solutions and Internet of Things and Cyber technologies to companies that manage critical infrastructures.

Moonsense

Moonsense

Moonsense is on a mission to level the playing field in the fight against online fraud.

Techtron Business IT Services

Techtron Business IT Services

TECHTRON has been providing business IT services since 2004. Our focus is on SMBs and we are good at it. Our customers trust us, they love our high levels of service, and they love what we stand for.

DataGuard

DataGuard

DataGuard is a security and compliance software company trusted by organisations across the globe.

Twine Security

Twine Security

Twine is pioneering the creation of AI digital cybersecurity employees to help improve efficiency for cybersecurity teams.