TECHNOLOGY > > Resilience


« Back to News

2020-01-17

The Scope Of A Cyber Security Audit

A false sense of security is prevalent across many organisations and is one of the major reasons why cyber criminals continue to be so successful.

2020-01-17

Artificial Intelligence Is Transforming Cyber Security

AI applications can enable organisations to detect, prevent or react to emerging cyber threats more promptly and more effectively than ever before.

2020-01-13

WEBINAR: How to improve security visibility and detection-response operations in AWS

Thursday, January 30 2020 | 11:00AM PT (2:00PM ET) How to reduce noise from security alerts & prioritize incidents more effectively.

2019-12-18

Insiders Are Cyber Criminals Favourite Connection

Many companies fail to consider their people to be just as important as the software & systems they use to protect themselves against cyber threats.

2019-12-16

Cybercrime’s Deadly Impact On Business

A single successful attack can seriously damage your business, cost big money, burden your customers and affect your business's reputation.

2019-12-10

Can Small Business Beat Cyber Attacks?

A good cybersecurity strategy is essential for any business, no matter its size, but with the severe skills shortage, what’s a small business to do?

2019-12-06

Creating A Cyber Incident Response Policy

Incident response is an organised approach to addressing and managing the aftermath of a security breach or cyberattack. You might need it.

2019-11-15

A Cyber Security Audit

Corporate security teams continue to fall behind in responding to alerts. Now is the time to secure your organisation with a Cyber Security Audit.

2019-11-11

Cyber Crime Is An Increasing Risk For Charities

Cyber crime is a greater risk to the charity sector than other sectors and smaller organisations are particularly vulnerable.

2019-11-01

Cyber Security Training That Employees Don’t Hate

Most employees hate taking cyber security awareness training but it doesn’t have to be that way. There are several ways to help them love it.

2019-11-01

Cyber Training For Every US Federal Employee

One US politician wants every federal employee to know how to securely interact with technology, including Internet-connected devices.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Chertoff Group

Chertoff Group

The Chertoff Group provide security advice and risk management services covering cyber security, insider threat, physical security and asset protection.

S2 Grupo

S2 Grupo

S2 Grupo is the benchmark company in Europe and Latin America, for Cyber Intelligence and mission critical systems operations.

SAASPASS

SAASPASS

SAASPASS is a full-stack identity and access management solution, a single product which allows you to manage all your digital and physical access needs securely and conveniently.

Sensible Vision

Sensible Vision

SensibleVision helps organizations transparently protect data and prevent costly security breaches by constantly verifying the identities of people who use computers or mobile devices.

Reposify

Reposify

Reposify’s cybersecurity solution identifies, manages and defends companies’ global digital footprints.

Templar Executives

Templar Executives

Templar Executives is a leading, expert and dynamic Cyber Security company trusted by Governments and multi-national organisations to deliver business transformation.

GuardSI

GuardSI

GuardSI was created to protect companies from growing threats to security such as fraud, hacking, internal theft, accidents and human mistakes that can directly affect the business.

Prolimax

Prolimax

Prolimax deliver innovative solutions to IT Manufacturers, Distributors, Resellers and End-users including Data Erasure and secure IT Asset Disposition (ITAD)

BAI Security

BAI Security

BAI Security is a Nationally Recognized Leader in IT Security. Keeping your data safe and your business compliant is our singular focus.

Crown Sterling

Crown Sterling

Crown Sterling delivers next generation software-based, AI-driven cryptography in the form of random number generators and encryption products.

Britive

Britive

The Britive Platform is a cloud-native security solution built for the most demanding cloud-forward enterprises.

Match Systems

Match Systems

Match Systems provides blockchain investigations, KYC, KYT, AML, Due Diligence and compliance services.

Cyera

Cyera

Cyera is the data security company that gives businesses context and control over their most valuable asset: data.

Dataminr

Dataminr

Dataminr Pulse helps organizations strengthen business resilience with AI-powered, real-time risk and event discovery—and the integrated tools to manage responses.

Ceeyu

Ceeyu

Ceeyu is an all-in-one cybersecurity ratings and third party risk management platform.

Sublime Security

Sublime Security

Sublime is an adaptive email security platform that combines best-in-class effectiveness with unprecedented visibility and control.