Download our latest white paper: Navigating agility in the software development lifecycle
Agile principles enable organisations to adapt swiftly to change.
However, taking an agile approach to delivering software is often not straightforward. Many organisations still struggle to align software development team objectives with the strategic goals of the business.
AI-Enabled Quality Assurance Assessment
AI-enabled quality assurance leverages AI to augment and automate various software development lifecycle (SDLC) processes, enhancing efficiency, accuracy and quality. By applying AI techniques to different stages of the SDLC, organisations can improve productivity, identify defects earlier and make data-driven decisions.
Download the datasheetAI-Generated Code – The Future of Efficiency or Risk?
Explore the key considerations when adopting AI-generated coding in your business.
Watch the recordingAnchor Hanover – Strategic Partnership
Anchor and Resillion’s relationship began through a one-off testing exercise, later inviting Resillion the opportunity to be the sole supplier of cyber services for the ensuing 12 months.
MoreBeyond The Hype: Navigating The Vulnerabilities Of AI-generated Code
As businesses increasingly integrate AI into their operations, they must grapple with a delicate balance – harnessing the transformative power of AI solutions while addressing the myriad of risks that come with it.
Download WhitepaperCPE Testing in Three Key Areas
CPE testing – otherwise known as Customer Premises Equipment testing – looks at telecommunications and IT equipment, verifying that all components of a networked system function together as they should. Read on to find out more about how Resillion has supported CPE testing in three different areas.
Read moreCyber Health Check
Cyber threats to businesses are increasing daily, leaving many without the resources to effectively manage the risks or even unclear on what they need to do. This is especially true for businesses that don’t possess either the knowledge or experience to tackle the problems today’s technology can bring.
Download the DatasheetCyber Incident Response
Has your organisation suffered a cyber incident or data breach? For many, the impact of a serious incident can have far reaching and long-lasting consequences on your operations and reputation. Take action as soon as, or even before, an incident occurs.
Download the DatasheetCyber Managed Services
The range of cyber attacks keeps growing and getting more complex. Consequently, the need for good cyber hygiene has never been more important. Although technology can be a critical defence tool, psychology and emotions are of equal importance.
Download the DatasheetCyber Risk Management
The growth in cloud services, the rise of remote work, and the increased reliance on third-party IT
service providers has meant more people, more devices, and more software on the average company’s infrastructure. As an IT system grows, so does its attack surface and its vulnerability.
Digital Forensics
Widespread use of technology increases your organisation’s risk of attack, creating new opportunities to exploit and disrupt your daily operations.
Download the DatasheetElevate your software quality with a QA Assessment
In the dynamic landscape of software development, there are constant challenges that disrupt efficiency and compromise quality. Chief among these hurdles is the struggle to maintain optimal code quality against the pressure of tight deadlines and changing requirements. This often increases the risk of bugs and makes maintenance more complex.
Download the DatasheetEmployee Data Theft
In our daily roles, many of us have access to a wide range of data, a large part classed as sensitive. This is any data that would pose a risk to the company if it was released to either a competitor, the general public, or got into the wrong hands from a data breach. This could be customer information, price lists, tender bid responses, IP, business information, classified
information, or Human Resource personal and confidential data.
Fast-tracking Clipper Logistics’ ISO 27001 implementation
Clipper and Resillion’s relationship is longstanding, beginning in 2017, as Clipper embarked on adopting a strategic approach to cyber security that aligned with their objectives for both risk management and business continuity.
MoreMatter Certification Datasheet
Matter is a protocol to connect compatible devices and systems with one another; with a new approach to create a rapid and transformative impact on the market. Resillion is authorised by the Connectivity Standards Alliance as a Certification Testing provided for Matter 1.0.
Download the DatasheetMatter Certification Guide
A Matter certification test/program runs on the provided by the CSA alliance, The test harness is build upon the separate conformance test specifications and checks for compliance to all separate supported clusters and features.
Matter Certification GuideMorton Fraser – ISO 27001 Implementation
Morton Fraser approached Resillion with the intention of devising a plan to review the existing security measures they had in place, amidst concerns of how the company would resist or mitigate the impact of a cyber-attack.
MoreNavigating agility in the software development lifecycle: an engineering approach
In order to keep costs under control, generate quick and consistent business value and achieve
competitive advantage, organisations that develop their software in-house need to consider quality, cost
and agility from an engineering perspective.
Part 2: Navigating agility in the software development lifecycle: an engineering approach
NHS NES – single supplier partnership
NES took the decision to publish a tender for a 3-year single supplier contract to support all the national health boards in Scotland with their penetration testing requirements to NCSC CHECK standards.
MoreQuality, cost and agility in the SDLC – a strategic perspective
Our expert Johan Gabriëls presents his research into this struggle in three specially written whitepapers which dive deeper into the challenges to adequate agility, with higher quality and risk adjusted cost.
Part 1: The Strategic Perspective: cost, risk and agile scaling.
Radio Equipment Directive
From 1st August 2024, all new and existing products placed on the EU market under the scope of the Radio Equipment Directive (RED) must comply with the new cyber security requirements. Ensure your products are compliant to place them on the EU-27 market today.
Download the DatasheetRed Team
Assess your resilience and ability to defend, detect and respond to cyber attacks in real-time with scenarios tailored to your organisational threat profile.
Download the DatasheetSecurity Assessment
The range of cyber attacks keeps growing and getting more complex. Consequently, the need for good cyber hygiene has never been more important. Although technology can be a critical defence tool, psychology and emotions are of equal importance.
Download the DatasheetWebinar: Baking in success
Choosing the right third parties for your Digital Transformation Programmes.
Watch the recordingWebinar: Better, Faster, Cheaper – why choose when you can have it all!
Debunking the myths around Test Automation and discussing how to supercharge your Digital Transformation Programme.
Watch the recordingWebinar: Digital launch hero or zero – Enabling QA to drive Digital Transformation
Find out how testing holds the key to ensuring your Digital Transformation’s success.
Watch the recordingPage 1 of 0