TECHNOLOGY > > Resilience


« Back to News

2019-08-19

Transforming A Business The Data Driven Way

Reading List: A manual for newly-appointed data leaders in companies that are planning to start on a journey of data transformation.

2019-08-12

Bank Creates Its Own AI To Identify & Disintegrate Malware

JPMorgan Chase is integrating Artificial Intelligence into its internal security systems to thwart malware infections within its own networks.

2019-08-08

Five New Security Trends Relevant To Your Business

Companies should be on the lookout for emerging technologies and processes that can protect their data from increasingly sophisticated threats.

2019-07-26

Business Is Starting To Believe That AI Is The Best Defence

Two thirds of organisations acknowledge that they will not be able to respond to the next generation wave of critical threats without AI.

2019-07-25

Most Organisations Lack Cyber Resilience

Forget About Protection: Most organisations lack even a clear idea of what their most critical information assets are or where they're located.

2019-07-24

Business Leaders Are Ignoring Cyber Risks

Cyber-attacks have cost British medium sized businesses with income between £15m and £1bn at least £30bn in the past year.

2019-07-19

SMEs Run Outdated & Vulnerable Operating Systems

Security weaknesses in SMEs include antiquated Microsoft operating systems, encryption defects, poor patching and outdated email servers.

2019-06-28

SMEs Need A Disaster Recovery Plan

For Small and Medium sized businesses the cost of not updating Disaster Recovery systems can far exceed the price of staying on top of the risks.

2019-06-06

Two Years After WannaCry Severe Risks Remain

A single vulnerable and an internet-exposed system was enough to wreak havoc, yet with over a million devices still unpatched, the risks remain.

2019-05-01

Authenticating Digital Evidence

With a huge growth of digital media, the question of what types of evidence available to the police that are also admissible in court is complex.

2019-04-30

Social Media Crime Is A Threat To Business

Employees are devoting more than three hours per week to sites proven to be hotbeds of malware and that is affecting the businesses they work for.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

CERT-SE

CERT-SE

CERT-SE is the national and governmental Computer Security Incident Response Team of Sweden.

MD5

MD5

MD5 is a leading UK provider of Digital Forensic & eDiscovery services to large multi-national corporate businesses, Law Enforcement & Government Agencies, high profile legal firms.

Bolton Labs

Bolton Labs

Bolton Labs is a leading provider cybersecurity services, tools, and analysis for MSPs and organizations who want to scale their security offerings.

ODSC

ODSC

ODSC is a security systems integrator that provides services and expertise in identity management and access.

Cyber Security Jobs

Cyber Security Jobs

Cyber Security Jobs was formed to help job seekers find jobs and recruiters fill cyber security job vacancies.

Xperien

Xperien

Xperien is a leading South African Information Technology Asset Disposition (ITAD) company.

Method Cyber Security

Method Cyber Security

Method offers a Cyber Security Risk Management training course for those responsible for the security of industrial automation, control and safety systems.

7layers

7layers

7layers has established itself as one of the world’s leading test house groups for mobile devices and the growing number of wireless devices, modules and chipsets.

XioGuard

XioGuard

XioGuard is a managed security service for 360-degree cybersecurity coverage, protecting the entire attack surface, increasing performance, reducing cost, and simplifying operations.

Tide Foundation

Tide Foundation

Tide's breakthrough multi-party-cryptography enables TRUE-zero-trust technology that unlocks cyber-herd immunity.

TWC IT Solutions

TWC IT Solutions

Since 2011, TWC IT Solutions has offered managed IT Support, Cybersecurity, Disaster Recovery, Contact Centre and Business Connectivity services to clients across 24 countries globally.

PCS Security (PCSS)

PCS Security (PCSS)

PCS Security provides secure, reliable and state-of-the-art security solutions to help our customers address their security concerns.

Cloudflare

Cloudflare

Cloudflare is a global network designed to make everything you connect to the Internet secure, private, fast, and reliable.

Eventus Security

Eventus Security

Eventus, are a team of highly skilled professionals who are committed to deliver excellence in next generation cyber security services and customized solutions for your enterprise.

Mercury Systems

Mercury Systems

Mercury Systems is the leader in making trusted, secure mission-critical technologies profoundly more accessible to aerospace and defense.

Yondu

Yondu

Yondu empowers businesses across various industries through a wide array of innovative technology solutions to help them scale in the new digital economy.