TECHNOLOGY > > Resilience


« Back to News

2017-02-08

Auditors Need To Know About Cyber Security

Information Security: Auditors have an obligation to educate themselves about cyber security technology if they are to do their job properly.

2017-02-06

Business Can Minimise Cybersecurity Risks And Drive Profit

CIOs are under pressure to deliver on the promise of digital technologies to transform customer-facing services & internal processes.

2017-02-03

Ransomware- Practical Advice To Protect & Recover Using Free Tools

There are concrete strategies & commercial tools available to use to protect yourself against ransomware attacks. By Dinesh Kumar Aggarwal

2017-01-06

Digital Forensics, Incident Response & Attribution

The cost of not taking cyber security seriously today is just like the cost of not having your business properly insured.

2016-11-16

Cant Be Bothered: Non-Security Policy Used By 90% Of Workers

Most workers put convenience ahead of security policies, with 90% of them admitting to ignoring them when they feel they need to.

2016-11-11

A Career In Cyber Security Governance?

Cyber security governance jobs are growing faster than IT and there just aren't enough skilled professionals to fill the available jobs.

2016-11-10

Education Is The Key To Minimise Cyber Risk For Business

Cyber criminals are constantly coming up with new ways to steal information; sometimes sophisticated, sometimes not, but all can be effective.

2016-10-29

DDoS: Deceptive Denial Attacks

Increasingly sophisticated techniques deployed by attackers using DDOS methods are making the reported size of such attacks redundant.

2016-10-19

Dealing With Insider Data Theft

To learn that your company's confidential data was stolen, not by a hacker, but by an employee, is a nightmare scenario nobody wants to face.

2016-10-18

The Science of Threat Intelligence

Threat intelligence is a new technique that helps security organisations recognise attack indicators and target their response fast & accurately.

2016-09-30

‘USB Killer’ Destroys Electronic Devices

A small USB device that can destroy any electronic device into which it is plugged.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Security Stronghold

Security Stronghold

Security Stronghold is focused on protecting computers from malicious programs like viruses, Trojans, spyware, adware, trackware, keyloggers and other kinds of online threats.

Foregenix

Foregenix

Foregenix are global specialists in Digital Forensics and information security including Penetration testing and Website Security.

ThreatHunter.ai

ThreatHunter.ai

ThreatHunter.ai (formerly Milton Security) is a business that tracks down and mitigates attacks in real time using our ARGOS Platform and our Elite Threat Hunters.

Technology Industries of Finland (TIF)

Technology Industries of Finland (TIF)

Technology Industries of Finland (TIF) is a business and labour market lobbying organization that promotes the competitiveness and business conditions of Finland’s most crucial export industry.

itWatch

itWatch

itWatch is focused on data loss prevention (DLP), endpoint security, mobile security, encryption, and cost reducing solutions for IT operations.

Junglemap

Junglemap

Junglemap provide nanolearning training courses on ransomware, information security and GDPR.

RazorSecure

RazorSecure

RazorSecure offers products and services to enhance railway cyber security, by protecting and monitoring networks and key systems.

IntaPeople

IntaPeople

IntaPeople are IT and engineering recruitment specialists. We have specialist teams for job sectors including Cybersecurity, IT infrastructure and DevOps.

YouWipe

YouWipe

Scandinavian Data Erasure Leader YouWipe is the number one choice of European Ministries, European Central Banks, Swiss Pharmaceuticals and Major Electronics Retail Chains.

SecureStrux

SecureStrux

SecureStrux are a cybersecurity consulting firm providing specialized services in the areas of compliance, vulnerability assessment, computer network defense, and cybersecurity strategies.

Private Machines

Private Machines

Private Machines develops unique patent-pending technology protects cloud and data center workloads.

DataFleets

DataFleets

DataFleets is a privacy-preserving data engine that unifies distributed data for rapid access, agile analytics, and automated compliance.

AirEye

AirEye

AirEye is a leader in Network Airspace Protection (NAP). Block attacks against your corporate network launched from wireless devices in your corporate network airspace.

Spike Reply

Spike Reply

Spike Reply is the company within the Reply Group focusing on cybersecurity and personal data protection.

Telenor Cyberdefence

Telenor Cyberdefence

Telenor Cyberdefence is a newly established (2024) cloud-born Managed Security Service Provider focused on the Nordic markets.

New Relic

New Relic

After inventing application performance monitoring (APM), New Relic stands at the forefront of observability with the most advanced platform for eliminating digital interruptions.