TECHNOLOGY > > Resilience


« Back to News

2024-05-31

Telecoms - Beware Of The DDoS Threat Actor

Combatting the wave of DDoS attacks against the telecommunications industry is critical to protecting global connectivity. By Richard Hummel

2024-05-24

New Guidance For Business Email Compromise

Britain's NCSC has issued new BEC guidance, including practical steps to reduce the chances your organization suffering from these attacks.

2024-05-21

MOD Data Breach Shows Supply Chain Security Continues To Be A Top Priority

The most critical data assets need the highest level of protection. That means prioritizing data based on the potential impact if it is compromised. 

2024-05-21

Cloud Threats Require New Advanced Defenses

Surge In Cloud Security Incidents: Although cloud attacks are increasing very few organisations are able to mitigate risks easily and quickly.

2024-05-20

Focus On Black Basta Ransomware

US cyber defence agencies have issued a joint advisory intended to help organizations mitigate the impact of prolific & costly 'Black Basta' malware.

2024-05-16

A Way To Build A Comprehensive Backup Strategy 

Jira Backup Best Practices: Organizations that implement these practices improve task accessibility & guarantee quick recovery with a few clicks.

2024-05-15

XZ Utils: A Fable on Proactive Risk Management

The recent attack on the XZ compression tool shows how important it is for companies to manage risks in their open-source software. By Ilkka Turunen

2024-05-15

The Ransomware Arms Race

How Can Organisations Stay Ahead?: Seven cybersecurity experts give their insights into how organisations can tackle this relentless threat. 

2024-05-10

Mobile Gambling - Sportsbooks Face Growing Fraud

Risk & Return: Mobile betting App users face a growing threat from fraud and their operators should take steps to protect them. By Elie Shuggi

2024-05-10

Is A Passwordless Future A More Secure Future?

A Serious Threat: The impact of poor password hygiene can damage a company's reputation beyond repair. By Muhammad Yahaya Patel

2024-05-09

Using AI To Defend Against AI-Enhanced BEC Scams

AI Face-off: By deploying AI for mapping email usage & behavioural patterns, organisations can identify which emails are suspicious. By Jack Garnsey

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Fredda Stanza

Fredda Stanza

Fredda Stanza specialize in Information Security and Forensics Consulting.

CyTech Services

CyTech Services

CyTech provides Forensics Incident Response, Cyber Security and Training services.

Bsquare

Bsquare

Bsquare DataV software and engineering services help enterprises implement business-focused Internet of Things systems.

Research Institute in Science of Cyber Security (RISCS)

Research Institute in Science of Cyber Security (RISCS)

RISCS is focused on giving organisations more evidence, to allow them to make better decisions, aiding to the development of cybersecurity as a science.

Rockwell Automation

Rockwell Automation

Rockwell Automation offer industrial security solutions to protect the integrity and availability of your complex automation solutions.

Illumio

Illumio

Illumio delivers adaptive security for every computing environment, protecting the 80% of data center and cloud traffic missed by the perimeter.

Ericsson

Ericsson

Ericsson is a leading provider of telecommunications services and network infrastructure solutions including all aspects of network security.

One Identity

One Identity

One Identity delivers identity governance, access management, and privileged account management solutions that facilitate and secure your digital transformation.

HCL Technologies

HCL Technologies

HCL offer an integrated portfolio of products, solutions and services built around Digital, IoT, Cloud, Automation, Cybersecurity, Analytics, Infrastructure Management and Engineering Services.

Huntress Labs

Huntress Labs

Huntress provides managed threat detection and response services to uncover and address malicious footholds that slip past your preventive defenses.

Adzuna

Adzuna

Adzuna is a search engine for job ads used by over 10 million visitors per month that aims to list every job everywhere, including thousands of vacancies in Cybersecurity.

Allied Telesis

Allied Telesis

Allied Telesis delivers the secure, flexible, and agile solutions needed to meet the expectations of any industry’s critical mission.

Raman Power Technologies

Raman Power Technologies

Raman Power Technologies focus on bringing value and solving business challenges through the delivery of modern IT services and solutions including cybersecurity.

Zenity

Zenity

Zenity is the first and only security governance platform for low-code/no-code applications.

Cyber Security Global

Cyber Security Global

Cyber Security Global is a leader in electronic security, consultancy, technology, cybersecurity solutions, training, and specialized products.

Genix Cyber

Genix Cyber

Genix Cyber provides world-class cybersecurity services that protect systems, cloud applications, infrastructure, critical data, and networks from evolving cyber threats.