TECHNOLOGY > > Resilience


« Back to News

2022-01-12

Azure Active Directory Recycle Bin Won’t Save Your Critical Data

Failing to monitor activity across all Active Directory environments without an effective backup strategy can lead to disaster.  By Greg Jones

2022-01-10

Cyber Security Threats In 2022

Ransomware & Remote Working: The key issue for business cyber security is to make  the transition from reactive to proactive behaviour. 

2022-01-10

Avoid Being A Victim Of Cyber Crime – Get Audited

A cyber security audit is a systematic evaluation of a company's information security by measuring how well it conforms to established criteria. 

2022-01-09

The Complexities Of Operational Technology Make It Vulnerabe

Industrial organisations need to adapt quickly to the expansion of cyber security threats to protect complex Operational Technology systems.

2022-01-05

Pegasus Spyware & Not-For-Profit Cyber Security - What Are The Risks?

It's never been more important for charities to prioritise their cyber security, especially for those involved in humanitarian efforts. By Kitty Bates.

2022-01-04

The Cyber Security Risks Of Outsourcing

Out Of Control: IT outsourcing is a major contributor to cyber security risk exposure and the consequences of a breach can be very damaging.

2021-12-29

Most British Workers Are Unaware Of Cyber Threats

Don't Know, Don't Care: Only a quarter of UK employees are aware of cyber risks, although more than half have been affected by an attack.

2021-12-20

Protecting Your E-Commerce Business Against Ransomware Attacks

Online sales are soaring and businesses are building their digital presence, but they must ensure their cyber security keeps pace. By Neville Louzado

2021-12-20

Education Should Focus On Cyber Security

The rapid adoption of technology & new industrial partners leaves education providers more exposed to cyber security threats ever before.

2021-12-17

Are Remote Contractors A Cyber Security Risk?

It is vital for businesses to integrate remote contractors and ensure they understand how to keep their employer secure. By Chester Avey

2021-12-16

Toolbox For Outlook Password Is Unrivaled

Losing data without backups can be a real disaster. Fortunately, there are powerful tools you can use to save contacts, messages & attachments.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ComSec LLC

ComSec LLC

ComSec perform threat assessments to identify vulnerabilities and help protect businesses against corporate espionage via electronic eavesdropping.

DKCERT

DKCERT

DKCERT (Danish Computer Security Incident Response Team) handles security incidents on forskningsnettet, the National Research and Education Network (NREN) in Denmark.

Electus Recruitment Solutions

Electus Recruitment Solutions

Electus is a leading recruitment specialist in the Engineering, Technology & Digital and Cyber & Security sectors.

Quick Heal Technologies

Quick Heal Technologies

Quick Heal Technologies is a leading IT security solutions provider focused on endpoint and network security solutions.

Carson & SAINT

Carson & SAINT

Carson & SAINT is an award-winning consulting firm with deep experience in cybersecurity technology, software, and management consulting.

AVeS Cyber Security

AVeS Cyber Security

AVeS combines expert knowledge and services with leading technology products to provide comprehensive Information Security and Advanced IT Infrastructure solutions.

Grupo CFI

Grupo CFI

Grupo CFI is the largest Spanish network of data protection and cybersecurity professionals.

Redborder

Redborder

Redborder is an Open Source network visibility, data analytics, and cybersecurity Big Data solution that is scalable up to the needs of enterprise networks and service providers.

Kingsley Napley

Kingsley Napley

Cyber crime is an area of growing legal complexity. Our team of cyber crime lawyers have vast experience of the law in this area.

Uleska

Uleska

Uleska is a scalable platform that provides automated and continuous software security testing whilst translating cyber risk.

Ensconce Data Technology (EDT)

Ensconce Data Technology (EDT)

EDT’s focus is on providing solutions to properly sanitize Solid State Drives (SSD) and Magnetic Drives (HDD) before they are disposed or redeployed.

SterlingRisk Programs

SterlingRisk Programs

SterlingRisk’s Cyber practice brings experience working with a wide array of clients across a broad spectrum of industries.

National Cyber Security Center (NCSC) - Vietnam

National Cyber Security Center (NCSC) - Vietnam

National Cyber Security Center of Vietnam has a central monitoring function and is a technical focal point for monitoring and supporting information security for people, businesses and systems.

DoControl

DoControl

DoControl gives organizations the automated, self-service tools they need for SaaS applications data access monitoring, orchestration, and remediation.

tru.ID

tru.ID

We’re tru.ID, and we're reimagining mobile authentication, one API at a time.

OryxLabs

OryxLabs

OryxLabs provide advanced enterprise digital risk protection solutions. Learn more about how 24x7 continuous assessment, monitoring, and improvement can secure your network.

Cloudsmith

Cloudsmith

Cloudsmith is the only cloud-native, global, universal artifact management platform for securely developing and distributing software.

Dark Entry

Dark Entry

Dark Entry provide solutions to safeguard businesses, leveraging advanced technologies and intelligence-driven approaches to detect and mitigate risks associated with compromised data.