TECHNOLOGY > > Resilience


« Back to News

2019-06-06

Two Years After WannaCry Severe Risks Remain

A single vulnerable and an internet-exposed system was enough to wreak havoc, yet with over a million devices still unpatched, the risks remain.

2019-05-01

Authenticating Digital Evidence

With a huge growth of digital media, the question of what types of evidence available to the police that are also admissible in court is complex.

2019-04-30

Social Media Crime Is A Threat To Business

Employees are devoting more than three hours per week to sites proven to be hotbeds of malware and that is affecting the businesses they work for.

2019-04-02

How Can Boardrooms Effectively Manage Cyber Risk?

For too long, cyber security standards and best-practice have been targeting technical and operational levels, too complex for boards to grasp.

2019-03-28

Over 90% Of Security Pros Fear Insider Threats

The vast majority of IT and security professionals surveyed said they feel vulnerable to insider threats, either malicious or accidental.

2019-03-23

Bank of England Testing Banks' Cyber Resilience

Britain's banks will have to show they could recover from a cyber-attack within hours to avoid customer payments being delayed.

2019-03-19

Cybercrime Misconceptions Put Consumers At Risk

A third of British people surveyed incorrectly believe that public Wi-Fi has to, by law, have effective security. It gets worse.

2019-03-12

Your Employees Are The Major Risk To Cyber Security

Employees are still the weak link in cybersecurity. A third of workers in Ireland used own email for work, and 24% shared files with friends.

2019-02-20

Take An Analytical Approach To Cybersecurity Training

There are many solutions designed to protect businesses from just about any security threat, yet an enterprise's biggest weakness is its people.

2019-02-28

AI Driven Cybersecurity Gives Companies A Fighting-Chance

It’s becoming clear that using artificial intelligence and machine learning is the safest way to lock down data and protect the enterprise.

2019-02-26

DARPA To Test Infrastructure Resilience

Cyber-attacks pose a challenge for US infrastructure security and DARPA have set up a joint exercise to test resistance to multiple threats.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Exploit Database (EDB)

Exploit Database (EDB)

The Exploit Database is a CVE compliant archive of public exploits and corresponding vulnerable software, developed for use by penetration testers and vulnerability researchers.

Resource Centre for Cyber Forensics (RCCF)

Resource Centre for Cyber Forensics (RCCF)

RCCF is a pioneering institute, pursuing research activities in the area of Cyber Forensics.

Rhebo

Rhebo

Rhebo Industrial Protector monitors and ensures the continuous, correct, and predictable operation of real-time Industrial Control Systems to prevent outages and reduce downtimes.

SOCOTEC Certification International

SOCOTEC Certification International

SOCOTEC Certification International has been providing management systems assessment and accredited ISO certification services to organisations around the world since 1995.

Exponential-e

Exponential-e

Exponential-e provide Cloud and Unified Communications services and world-class Managed IT Services including Cybersecurity.

Fortress Information Security

Fortress Information Security

Fortress Information Security is one of the largest cyber security providers of supply chain risk management and vulnerability risk management in the US.

Qualcomm Technologies

Qualcomm Technologies

Qualcomm invents breakthrough technologies that transform how the world connects, computes and communicates.

CyberNet Albania

CyberNet Albania

Cybernet Albania has been providing IT support and services to small businesses since 2016. We strive to eliminate your IT issues before they cause downtime and impact your operations.

Infinidat

Infinidat

Infinidat delivers enterprise-proven solutions for data storage, data protection, business continuity, and sovereign cloud storage.

Retruster

Retruster

Protect your users against phishing emails, ransomware & fraud with the most advanced, user-friendly, non-intrusive solution available.

FortiGuard Labs

FortiGuard Labs

FortiGuard Labs is the threat intelligence and research organization at Fortinet. Its mission is to provide Fortinet customers with the industry’s best threat intelligence.

6WIND

6WIND

6WIND deliver virtualized, cloud-native, distributed high performance & secure networking software solutions to support new applications such as 5G, IoT, SD-WAN.

CYGNVS

CYGNVS

CYGNVS is a guided cyber crisis response platform providing anytime, anyplace access. A SaaS platform for cyber crisis management – a safe way to connect and control your response.

CyberSecAsia

CyberSecAsia

CyberSecAsia series conference is the one and only decision-makers gathering for CISO and info security experts in Asia.

Staley Technologies

Staley Technologies

Staley Technologies is a US nationwide structured cabling, technology integrator, and Managed IT & Cyber Security provider.

Amplifier Security

Amplifier Security

Amplifier Security are on a mission to empower security teams to modernize their practice by connecting the dots between their security stack and their people.