Let’s make businesses RESILIENT against CYBERSECURITY threats!

Jonas’ journey: growing with Resilient Security

Jonas’s story starts with curiosity, the same spark that drives many in cybersecurity...

Resilient TALKS – Episode 2: Why Identity Is the New Security Perimeter

In this new episode of Resilient TALKS we sit down with Vincent Appelmans and Michiel...

The state of Identity Governance 2025: key insights for modern organizations

Omada recently surveyed over 500 IT and business leaders to assess the state of IGA...

State of Cyber 2025 Antwerp

Are you an IT manager, security manager, or CISO looking to stay ahead in cybersecurity?...

Resilient TALKS – Episode 1: The Role of Identity in a Changing Threat Landscape

In this first edition of Resilient TALKS, we welcome Matt and Alexandra from Delinea, a...

From passion project to identity pro: Sebastian’s journey at Resilient

At Resilient, Sebastian plays a key role in the Identity Governance & Administration (IGA) Essentials...

Testimonial: BESIX strengthens its cybersecurity posture with Resilient PROTECT and Microsoft Security

To support their security journey, BESIX partnered with Resilient Security to strengthen its Microsoft security...

The power of AI and Machine Learning in Access Management

With AI and Machine Learning, security and Access Management can become smarter, faster, and more...

IAM done right: aligning Security, Compliance & Business Growth

At Resilient, we have identified four key pillars that drive successful IAM implementations...
Load More