Download our latest white paper: Navigating agility in the software development lifecycle

Agile principles enable organisations to adapt swiftly to change.
However, taking an agile approach to delivering software is often not straightforward. Many organisations still struggle to align software development team objectives with the strategic goals of the business.

Discover more about it in our latest whitepaper.

AI-Enabled Quality Assurance Assessment

AI-enabled quality assurance leverages AI to augment and automate various software development lifecycle (SDLC) processes, enhancing efficiency, accuracy and quality. By applying AI techniques to different stages of the SDLC, organisations can improve productivity, identify defects earlier and make data-driven decisions.

Download the datasheet

AI-Generated Code – The Future of Efficiency or Risk?

Explore the key considerations when adopting AI-generated coding in your business.

Watch the recording

Anchor Hanover – Strategic Partnership

Anchor and Resillion’s relationship began through a one-off testing exercise, later inviting Resillion the opportunity to be the sole supplier of cyber services for the ensuing 12 months.

More

Beyond The Hype: Navigating The Vulnerabilities Of AI-generated Code

As businesses increasingly integrate AI into their operations, they must grapple with a delicate balance – harnessing the transformative power of AI solutions while addressing the myriad of risks that come with it.

Download Whitepaper

CPE Testing in Three Key Areas

CPE testing – otherwise known as Customer Premises Equipment testing – looks at telecommunications and IT equipment, verifying that all components of a networked system function together as they should. Read on to find out more about how Resillion has supported CPE testing in three different areas.

Read more

Cyber Health Check

Cyber threats to businesses are increasing daily, leaving many without the resources to effectively manage the risks or even unclear on what they need to do. This is especially true for businesses that don’t possess either the knowledge or experience to tackle the problems today’s technology can bring.

Download the Datasheet

Cyber Incident Response

Has your organisation suffered a cyber incident or data breach? For many, the impact of a serious incident can have far reaching and long-lasting consequences on your operations and reputation. Take action as soon as, or even before, an incident occurs.

Download the Datasheet

Cyber Managed Services

The range of cyber attacks keeps growing and getting more complex. Consequently, the need for good cyber hygiene has never been more important. Although technology can be a critical defence tool, psychology and emotions are of equal importance.

Download the Datasheet

Cyber Risk Management

The growth in cloud services, the rise of remote work, and the increased reliance on third-party IT
service providers has meant more people, more devices, and more software on the average company’s infrastructure. As an IT system grows, so does its attack surface and its vulnerability.

Download the Datasheet

Digital Forensics

Widespread use of technology increases your organisation’s risk of attack, creating new opportunities to exploit and disrupt your daily operations.

Download the Datasheet

Elevate your software quality with a QA Assessment

In the dynamic landscape of software development, there are constant challenges that disrupt efficiency and compromise quality. Chief among these hurdles is the struggle to maintain optimal code quality against the pressure of tight deadlines and changing requirements. This often increases the risk of bugs and makes maintenance more complex.

Download the Datasheet

Employee Data Theft

In our daily roles, many of us have access to a wide range of data, a large part classed as sensitive. This is any data that would pose a risk to the company if it was released to either a competitor, the general public, or got into the wrong hands from a data breach. This could be customer information, price lists, tender bid responses, IP, business information, classified
information, or Human Resource personal and confidential data.

Download the Datasheet

Fast-tracking Clipper Logistics’ ISO 27001 implementation

Clipper and Resillion’s relationship is longstanding, beginning in 2017, as Clipper embarked on adopting a strategic approach to cyber security that aligned with their objectives for both risk management and business continuity.

More

Matter Certification Datasheet

Matter is a protocol to connect compatible devices and systems with one another; with a new approach to create a rapid and transformative impact on the market. Resillion is authorised by the Connectivity Standards Alliance as a Certification Testing provided for Matter 1.0.

Download the Datasheet

Matter Certification Guide

A Matter certification test/program runs on the provided by the CSA alliance, The test harness is build upon the separate conformance test specifications and checks for compliance to all separate supported clusters and features. 

Matter Certification Guide

Morton Fraser – ISO 27001 Implementation

Morton Fraser approached Resillion with the intention of devising a plan to review the existing security measures they had in place, amidst concerns of how the company would resist or mitigate the impact of a cyber-attack.

More

Navigating agility in the software development lifecycle: an engineering approach

In order to keep costs under control, generate quick and consistent business value and achieve
competitive advantage, organisations that develop their software in-house need to consider quality, cost
and agility from an engineering perspective.
Part 2: Navigating agility in the software development lifecycle: an engineering approach

Download the white paper

NHS NES – single supplier partnership

NES took the decision to publish a tender for a 3-year single supplier contract to support all the national health boards in Scotland with their penetration testing requirements to NCSC CHECK standards.

More

Quality, cost and agility in the SDLC – a strategic perspective

Our expert Johan Gabriëls presents his research into this struggle in three specially written whitepapers which dive deeper into the challenges to adequate agility, with higher quality and risk adjusted cost.
Part 1: The Strategic Perspective: cost, risk and agile scaling.

More

Radio Equipment Directive

From 1st August 2024, all new and existing products placed on the EU market under the scope of the Radio Equipment Directive (RED) must comply with the new cyber security requirements. Ensure your products are compliant to place them on the EU-27 market today.

Download the Datasheet

Red Team

Assess your resilience and ability to defend, detect and respond to cyber attacks in real-time with scenarios tailored to your organisational threat profile.

Download the Datasheet

Security Assessment

The range of cyber attacks keeps growing and getting more complex. Consequently, the need for good cyber hygiene has never been more important. Although technology can be a critical defence tool, psychology and emotions are of equal importance.

Download the Datasheet

Webinar: Baking in success

Choosing the right third parties for your Digital Transformation Programmes.

Watch the recording

Webinar: Better, Faster, Cheaper – why choose when you can have it all!

Debunking the myths around Test Automation and discussing how to supercharge your Digital Transformation Programme.

Watch the recording

Webinar: Digital launch hero or zero – Enabling QA to drive Digital Transformation

Find out how testing holds the key to ensuring your Digital Transformation’s success.

Watch the recording

Page 1 of 0

Telenet
Becker Harman
Bosch
Swissbit

Latest News

Find out what's going on at Resillion

Read more

Events

Come see us at upcoming events.

Find out more

Get in touch with our experts

By continuing, you accept our Privacy Policy








    Get in touch with our experts

    Our Accreditations and Certifications

    Crest Accreditation Resillion
    Check Penetration Testing
    RvA L690 Accreditation
    ISO 27001
    ISO 9001 Resillion
    CCV Cyber Pentest
    Cyber Essentials
    CE+assessor

    Contact Us