TECHNOLOGY > > Resilience


« Back to News

2015-12-01

The Road to Measuring and Interpreting Big Data

Think tank Demos and market research firm Ipos MORI are taking a close look at social media using big data analytic methods.

2015-11-16

UK Banks Face Cyber Security Stress Test - Operation Resilient Shield

UK financial institutions' CIO's will feel the heat as the Bank of England rolls out it's new war-game to test the cyber-resilience of the financial sector.

2015-11-12

How are Businesses Responding to Cyber Risks?

As cyber-risks become increasingly prominent concerns in boardrooms business leaders are increasingly rethinking cybersecurity practices.

2015-11-02

Cyber Attack Recovery Times Cause Big Concerns

When it comes to limiting damage and preventing data breaches, time is the biggest challenge for security and risk professionals.

2015-10-27

Who Is responsible For Security in the Cloud?

Ponemon Survey: Only one third of respondents are confident the Cloud meets their security objectives.

2015-10-26

African States Quick To Adopt Network Surveillance

Governments in Sudan, Nigeria, South Africa and Ethiopia deploy sophisticated network eavesdropping tools against their citizens.

2015-10-07

Six Emerging CyberSecurity Risks

NY Cyber Security Summit: A panel of experts recently discussed emerging cybersecurity risks. Here is what you need to know.

2015-10-05

Insiders Responsible for 43% of Data Breaches

Among companies experiencing data breaches, internal actors were responsible for 43% of data loss, half of which was intentional, half accidental.

2015-09-22

Why Aren’t Companies Using Military Security?

Why do defense companies have classified networks to prevent cyber attack, while companies handling our critical utilities don’t?

2015-09-14

Top Risk Management Concerns: Survey Results

Companies’ fears regarding cyber threats are significant, including hacking incidents, information theft. loss of network & website access.

2015-08-04

Identity Access Management: Lessons From JPMorgan’s Insider Breaches

Another JPMorgan Chase & Co. employee arrested on charges of stealing customer data & trying to sell it for thousands of dollars.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Asavie

Asavie

Asavie provide solutions for Enterprise Mobility Management and secure IoT Connectivity.

Cyfor

Cyfor

Cyfor provides digital forensics and eDiscovery in civil, criminal, intellectual property, litigation and dispute resolution investigations.

Wallix

Wallix

Wallix is a software company offering privileged access management solutions for enterprises, public organizations and cloud service providers

United Security Providers

United Security Providers

United Security Providers is a leading specialist in information security, protecting IT infrastructures and applications for companies with high demands on security.

Me Learning

Me Learning

Me Learning provides engaging, informative and clearly explained learning materials for complex and challenging professional environments in areas including GDPR and Information Governance.

Information System Security Directorate (ISSD) - Afghanistan

Information System Security Directorate (ISSD) - Afghanistan

Information System Security Directorate (ISSD) is the Directorate of MCIT responsible for the security of critical information infrastructures in Afghanistan.

Stage2Data

Stage2Data

Stage2Data is one of Canada’s most trusted cloud solution providers offering hosted Backup and Disaster Recovery Services.

Blueskytec (BST)

Blueskytec (BST)

Blueskytec has applied its experience of over three decades of working in the field of embedded systems and encryption to provide a scalable and appropriate technology for cyber-physical devices.

New Enterprise Associates (NEA)

New Enterprise Associates (NEA)

As one of the world’s largest and most active venture capital firms, NEA has developed deep domain expertise and insight into our industries of focus - technology and healthcare.

Internet 2.0

Internet 2.0

Internet 2.0 is a Cyber Security technology company with a core focus on developing affordable but sophisticated cyber security solutions.

Ironhack

Ironhack

Ironhack provide intensive training courses & bootcamps in Web Development, UX/UI Design, Data Analytics & Cybersecurity.

Persistent Systems

Persistent Systems

Persistent Systems are a trusted Digital Engineering and Enterprise Modernization partner, combining deep technical expertise and industry experience to help our clients.

Willyama Services

Willyama Services

Willyama Services is a certified Information Technology and Cybersecurity professional services business providing services to government and private sector clients.

LaScala

LaScala

LaScala is an IT Managed Services provider delivering technical, security, and compliance solutions with dedication, compassion, and agility.

Converged Communication Solutions

Converged Communication Solutions

Converged is an independent Internet Service Provider, telephony, IT support and security specialist.

Finlaw Associates

Finlaw Associates

Finlaw Associates is a trusted cybercrime law firm providing a wide range of taxation, legal, advisory and regulatory services to the financial, commercial and industrial communities.