TECHNOLOGY > > Resilience


« Back to News

2021-05-08

Writing An Effective Cybersecurity Policy: 5 Essential Steps

How to compile an effective operational cybersecurity policy that will make life easier in the event of a security breach. By Jessica Fender

2021-05-11

Cyber Security Shared Skills Group Created

Members will gain from actionable intelligence and tactics to improve their defensive strategies for a more resilient cyber security infrastructure.

2021-05-06

Key Trends In Cyber Security

Along with the change in many people's work environment in 2020, there are several rising trends companies need to be aware of in 2021.

2021-05-06

Securing Smart Devices

Data centers may be safe from outside intrusion, but IoT devices are often at risk of being exploited by those looking for an easier way into systems.

2021-05-06

Top Five Most Common Gaps In Businesses’ Cyber Security

Embedding cyber security into your operations takes everyone in the organisation to understand and accept their responsibility. By Victor Lough

2021-05-05

Your Organisation Needs A Cyber Audit

Cyber threats evolve at breakneck speed and it’s important to continually ensure that your cyber security measures are effective and up to date.

2021-05-05

The Cyber Security Paradigm Is Changing

Traditional cyber security, with hard external boundaries, is being undermined by pressure for more operational flexibility and developments in IT.

2021-05-04

Managing Cyber Security As Office Work Resumes

Cyber security and compliance teams must begin the return-to-office planning process so that when employees arrive, everyone is prepared.

2021-05-04

World Password Day - 6th May

World Password Day exists to spread the awareness that taking care of your passwords is vital to protecting yourself against identity theft.

2021-04-30

Is Ethical Hacking A Business Necessity In 2021?

Businesses want to improve their cybersecurity - training, stronger systems & software. But how about using ethical hackers? By Chester Avey

2021-04-28

Better Cyber Security For Smart Devices

Secure by Design: The British government is working to ensure consumer "smart" devices are more secure, with security built in from the start.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Gigamon

Gigamon

Gigamon provides intelligent Traffic Visability solutions that provide unmatched visbility into physical & birtual networks without affecting the performance or stability of production environments.

Tinfoil Security

Tinfoil Security

Tinfoil is a simple, developer friendly service that lets you scan your website for vulnerabilities and fix them quickly and easily.

Industrial Cyber-Physical Systems Center (iCyPhy)

Industrial Cyber-Physical Systems Center (iCyPhy)

The goal of iCyPhy is to conduct pre-competitive research on architectures and design, modeling, and analysis techniques for cyber-physical systems.

Scanmeter

Scanmeter

Scanmeter helps identifying vulnerabilities in software and systems before they can be exploited by an attacker.

Maven Technologies

Maven Technologies

Maven Technologies specialize in secure data destruction, electronics recycling, asset management, and highly detailed reporting.

SyferLock Technology Corp.

SyferLock Technology Corp.

SyferLock is an innovative provider of next-generation authentication and security solutions.

SHe CISO Exec

SHe CISO Exec

SHe CISO Exec is a sustainable global training and mentoring platform in information security and leadership.

Evanssion

Evanssion

Evanssion is a value added distributor specialized in Cloud Native & Cyber Security across Middle East & Africa.

FCI

FCI

FCI is a NIST-Based Managed Security Service Provider (MSSP) offering Cybersecurity Compliance Enablement Technologies & Services to Financial Services organizations.

ORS Consulting

ORS Consulting

ORS Consulting is a specialist provider of risk management advisory services supporting asset-intensive industries such as chemicals, energy, power and utilities, defence and maritime.

Moro Hub

Moro Hub

Moro Hub, a subsidiary of Digital DEWA, is a UAE-based digital data hub focused on digital transformation and operational services.

Oort

Oort

Oort is an identity threat detection and response platform for enterprise security. The Oort platform is API-driven, cloud-native and agentless for rapid time to value and high scalability.

ZoobeTek

ZoobeTek

ZoobeTek are a company focused on preventing leaks related to the security of business information3.

Deloitte Denmark

Deloitte Denmark

Swift incident management, worldwide support, and advanced defense strategies ensure comprehensive recovery and enterprise security with our IR service.

Orca Fraud

Orca Fraud

Orca is an AI-driven fraud orchestration platform. We empower fraud fighters to outpace fraud using our custom ML models.

Clumio

Clumio

Clumio provides autonomous backup and recovery for critical cloud data.