Let’s make businesses RESILIENT against CYBERSECURITY threats!
Jonas’ journey: growing with Resilient Security
Jonas’s story starts with curiosity, the same spark that drives many in cybersecurity...
Resilient TALKS – Episode 2: Why Identity Is the New Security Perimeter
In this new episode of Resilient TALKS we sit down with Vincent Appelmans and Michiel...
The state of Identity Governance 2025: key insights for modern organizations
Omada recently surveyed over 500 IT and business leaders to assess the state of IGA...
State of Cyber 2025 Antwerp
Are you an IT manager, security manager, or CISO looking to stay ahead in cybersecurity?...
Resilient TALKS – Episode 1: The Role of Identity in a Changing Threat Landscape
In this first edition of Resilient TALKS, we welcome Matt and Alexandra from Delinea, a...
From passion project to identity pro: Sebastian’s journey at Resilient
At Resilient, Sebastian plays a key role in the Identity Governance & Administration (IGA) Essentials...
Testimonial: BESIX strengthens its cybersecurity posture with Resilient PROTECT and Microsoft Security
To support their security journey, BESIX partnered with Resilient Security to strengthen its Microsoft security...
The power of AI and Machine Learning in Access Management
With AI and Machine Learning, security and Access Management can become smarter, faster, and more...
IAM done right: aligning Security, Compliance & Business Growth
At Resilient, we have identified four key pillars that drive successful IAM implementations...
Load More








