TECHNOLOGY > > Resilience


« Back to News

2018-07-27

Maintaining GDPR Compliance

GDPR compliance efforts by many organisations are not just a work in progress, in many cases the work is just beginning.

2018-07-13

Breakthrough Technologies To Combat Insider Threats

Advances in technology have a positive outlook on keeping sensitive data safe. Here are five emerging tools for mitigating insider threats.

2018-07-05

Using AI To Reduce Business Risks

The constant evolution of malware, ransomware and other threats makes detection with conventional cybersecurity protocols increasingly difficult.

2018-07-05

MSAB Joins CASE Initiative On Digital Forensics

MSAB has joined other industry leaders to work collaboratively on the Cyber-Investigation Analysis Standard Expression (CASE) initiative.

2018-07-04

How Cloud Computing Changes Data Governance Strategies

Whether on-premises, private, hybrid or multi-cloud, organisations getting the benefit of the cloud require an alternative data governance approach.

2018-07-02

Get Started with Predictive Analytics

Many businesses don't fully understand the holistic view predictive analytics can bring to their organisation. They need to try harder.

2018-06-28

How to Measure Cybersecurity Success

When performance is measured, performance improves. When performance is measured and reported, the rate of improvement accelerates.

2018-06-27

A Guide To Addressing Corporate IoT Security

What can enterprises do to strengthen the security of their IoT environments? Here are some suggested best practices from industry experts.

2018-06-22

Its About Training, Stupid.

Both private & public sectors In S. Africa need to train their employees, the weak point in any organisation's defences, to counter cyber threats.

2018-06-20

How To Use AI & Predictive Analytics

Anticipate and prevent storage infrastructure problems by combining flash storage with cutting-edge predictive technology.

2018-06-18

How Computer Data Helped Investigate Quebec Shooter

The criminal proceedings against Quebec's mosque shooter provided insight on police use of computers to extract information about a suspect.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Logicalis

Logicalis

Logicalis are a leading provider of global IT solutions and managed services.

US Cyber Command (USCYBERCOM)

US Cyber Command (USCYBERCOM)

USCYBERCOM conducts activities to ensure US/Allied freedom of action in cyberspace and deny the same to our adversaries.

CERT-IS

CERT-IS

CERT-IS is the national Computer Emergency Response Team for Iceland.

Security Brokers

Security Brokers

Security Brokers focus services and solutions with a focus on strategic ICT Security and Cyber Defense issues.

IdenTrust

IdenTrust

IdenTrust enables organizations to effectively manage the risks associated with identity authentication.

ObjectSecurity

ObjectSecurity

ObjectSecurity is a leader in authorization policy automation. With OpenPMF, you can manage application security policies for access control and auditing.

Circadence

Circadence

Circadence offer the only fully immersive, AI-powered, patent-pending, proprietary cybersecurity training platform in the market today.

Blake, Cassels & Graydon (Blakes)

Blake, Cassels & Graydon (Blakes)

Blakes is one of Canada’s top business law firms serving national and international clients in specialist areas including cyber security.

VaultOne

VaultOne

VaultOne is a next-generation security solution that addresses security issues from different domains (Password Manager, Secure Access, PAM, Identity Management) as a single, integrated solution.

Blue Hexagon

Blue Hexagon

Blue Hexagon is a deep learning innovator focused on protecting organizations from cyberthreats.

TestArmy

TestArmy

TestArmy CyberForces provide you with a broad spectrum of cybersecurity services to test every aspect of your IT infrastructure security and software development process.

Telindus

Telindus

Telindus is the strategic IT partner for the flexible organization of the future. We build optimal IT infrastructure with four components: networking, cloud, cybersecurity and data & AI.

Gogolook

Gogolook

Gogolook is a leading TrustTech company. With "Build for Trust" as its core value, it aims to create an AI- and data-driven global anti-fraud network as well as Risk Management as a Service.

CyAmast

CyAmast

CyAmast is an IoT Network security and analytics company that is changing the way enterprise and governments detect and protect networks from the pervasive threat of cyber attacks.

Focus Group

Focus Group

Focus Group are one of the UK’s leading independent providers of essential business technology. Here to take care of all your telecoms, IT and connectivity services.