TECHNOLOGY > > Resilience


« Back to News

2016-03-02

Big Data & Predictive Analytics Can Identify Cyber Risks

Using predictive indicators to detect the unknown risk is incredibly challenging but, properly used, big data can solve big business problems.

2016-02-24

Cyber Risk Insurance Is A Patchwork

Use of cyber-specific wording and products may be an effective way of filling gaps of cover which exist in conventional lines of insurance.

2016-02-26

Cybersecurity To Go On The Offensive

Organizations with a sophisticated approach to cybersecurity are no longer satisfied with locking the doors after the robbery has been committed.

2016-02-10

How to Recover From The Hack Nightmare

It’s more than just the PR department’s “problem.” IT executives need to be involved in managing the fallout and crafting responses.

2016-02-02

90% of Data Breaches Are Avoidable

Nine of every ten data breaches in 2015 could have been “easily prevented,” according to a study by The Online Trust Association.

2016-02-01

Lloyd’s Insurer Says Cyber Risks Are Too Big to Cover

The head of the largest of Lloyd’s of London insurers says the potential liabilities from risks of cyber attack are too large to cover.

2016-01-25

World Economic Forum Says Cyber-attack Is A Top Risk To Business.

In 140 economies cyber-attacks rank in the top ten threats in 2016.

2016-01-13

Predictive Analytics Tools Confront Insider Threats

Advanced data analytic technology can give analysts an advantage in finding insider threats.

2015-12-24

The Secure Perimeter Cybersecurity Model Is Broken

The system is broken. It isn’t keeping us, companies, or our government safe. Worse yet, no one seems to know how to fix it.

2015-12-22

Understanding the Threat Intelligence Lifecycle

The Two Step Program: What is Threat Intelligence and why does in matter?

2015-12-18

Third of UK Finance Logins Risk Client Data

Many industry personnel are not assigned unique login and password details, resulting in the risk of customer's personal and financial data.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Sonatype

Sonatype

Sonatype protects the world's enterprise software from security, compliance, licensing risks, while reducing application development and deployment time.

TNO Cyber Security Lab

TNO Cyber Security Lab

TNO Cyber Security Lab is a dedicated facility for innovative and experimental research with the goal of a safe and resilient cyberspace.

KoolSpan

KoolSpan

KoolSpan’s security and privacy solutions address the growing threat of loss or theft of intellectual property, information, and proprietary assets.

NTNU Center for Cyber & Information Security (NTNU CCIS)

NTNU Center for Cyber & Information Security (NTNU CCIS)

NTNU CCIS is a national centre for research, education, testing, training and competence development within the area of cyber and information security.

Cisco Talos

Cisco Talos

Talos is an industry-leading threat intelligence solution that protects your organization’s people, data and infrastructure from active adversaries.

CyberVista

CyberVista

CyberVista is a cybersecurity training education and workforce development company. Our mission is to eliminate the skills gap by creating job ready professionals.

DG Technology

DG Technology

DG Technology is a customer-centric technology expert and business consultant that delivers services and products to minimize your information security, compliance, and business risks.

Cellopoint

Cellopoint

Cellopoint is a leading manufacturer of information security and email lifecycle management (ELM) products.

Information Systems Security Partners (ISSP)

Information Systems Security Partners (ISSP)

ISSP is a specialized system integrator focused on the information security needs of its corporate clients and providing best in class products and services for securing organizational information.

Kapalya

Kapalya

Kapalya empowers businesses and their employees to securely store sensitive files at-rest and in-transit across multiple platforms through a user-friendly desktop and mobile application.

Cyberport

Cyberport

Cyberport is focused on facilitating the growth of major technology trends such as FinTech and cybersecurity as well as the emerging technologies of AI, big data and blockchain.

Converge Technology Solutions

Converge Technology Solutions

Converge Technology Solutions Corp. is a North American IT solution provider delivering advanced analytics, cloud, cybersecurity, and managed services solutions.

NWN Corp

NWN Corp

NWN Corporation is a leading Cloud Communications Service Provider (CCSP) focused on transforming the customer and workspace experience for commercial, enterprise and public sector organizations.

Cheops Technology

Cheops Technology

Cheops is a specialist in IT Business Technology Services. We help SMEs and large companies build, optimize and manage their IT so they can focus on their core business.

NetApp

NetApp

The NetApp portfolio includes intelligent cloud services, data services, and storage infrastructure that helps organizations manage applications and data everywhere across hybrid cloud environments.

Sentryc

Sentryc

Sentryc provides automated monitoring of brands on online marketplaces and social media making online brand protection processes faster, more clearly structured and more efficient.