BUSINESS > Services > Financial


« Back to News

2019-03-21

Qbot Banking Malware Can Infect Cybersecurity Firms

A new variant of a banking malware known as Qbot rapidly mutates to stay ahead of anti-virus systems, even infecting some technology vendors.

2019-03-20

Banks Attacks Up Sixfold Last Year

The UK’s Financial sector reported 145 attacks in 2018 which was a substantial increase from 2017 when the reported data breaches were just 25.

2019-02-26

Personal Cyber Insurance Market Could Be Worth $3B by 2025

Big insurance companies are creating personal cyber insurance products specifically designed to cover loss or liability in the event of a cyber-attack.

2019-02-13

Cyber Insurance Risks Are Moving Too Fast For Underwriters

With the growing number of inter-connected systems, devices and machines there is no business free from cybersecurity risk.

2019-02-12

Foreign Hackers Target Canadian Government & Banks

The experts at FireEye say that Canadian banks, mining companies and government institutions are being targeted for IP theft and malware infection.

2019-02-06

Metro Bank Hacked

Britain’s Metro Bank has suffered an attack by hackers using a sophisticated two-factor authentication bypass technique known as SS7.

2019-01-30

Financial Executives Are Out Of Touch With Cyber Threats

Executives in the financial services sector are complacent about the impact of new technology on the security and stability of their industry.

2019-01-29

Millions Of Secret Bank Records Leak Online

A server security lapse at a Texas data & analytics company for the financial industry has left information on 24 million documents exposed.

2019-01-23

What Financial Services Executives Need to Know About Data-Security

The financial services industry experiences 35% of data breaches, earning it the unflattering title of the most-breached sector. With good reason.

2019-01-08

Hackers Demand Ransom For Stolen 911 Documents

Secret information about the murderous 911 attacks has allegedly been stolen from the insurer and is being offered for sale to terrorist groups.

2018-12-31

Publishers Need Micro-Payments Now

Professional journalism is on a downward slope, driven by the growth of fake news, propaganda and personal blog opinion. What's to be done?

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Cyberlytic

Cyberlytic

Cyberlytic applies artificial intelligence to combat the most sophisticated of web application threats, addressing the growing problem of high volumes of threat data.

SharkGate

SharkGate

SharGate provide a cloud-based website security solution to protect websites from being hacked.

BeOne Development

BeOne Development

BeOne Development provide innovative training and learning solutions for information security and compliance.

ComTrue Technologies

ComTrue Technologies

ComTrue Technologies is a developer and provider of personal information protection and cyber security solutions and services.

Pipeline Security

Pipeline Security

Pipeline Security protects businesses with real-time threat data, threat detection & prevention, continuous cyber security monitoring and security analytics.

Lithuanian National Accreditation Bureau

Lithuanian National Accreditation Bureau

Lithuanian National Accreditation Bureau is the national accreditation body for Lithuania. The directory of members provides details of organisations offering certification services for ISO 27001.

Gradcracker

Gradcracker

Gradcracker is THE careers website for Science, Technology (including Cybersecurity), Engineering and Maths university students in the UK.

T-REX

T-REX

T-REX is a coworking space, technology incubator, and entrepreneur resource center for technology startups.

Cyber Command - Romania

Cyber Command - Romania

Cyber Command represents the military authority responsible for the development, protection and resilience of military IT networks and services that support the Romanian Force Structure.

Lucata

Lucata

Lucata solutions support groundbreaking graph analytics and improved machine learning for organizations in financial services, cybersecurity, healthcare, pharmaceuticals, telecommunications and more.

TPx Communications

TPx Communications

TPx is a leading managed services provider offering a full suite of managed IT, unified communications, network connectivity and security services.

PixelQA

PixelQA

Are you looking for a security testing company to cross-check whether your software or mobile app has a possible security threat or not?

Cyber & Data Protection

Cyber & Data Protection

Cyber & Data Protection Limited supports Charities, Educational Trusts and Private Schools, Hospitality and Legal organisations by keeping their data secure and usable.

Cyderes

Cyderes

Cyderes (Cyber Defense and Response) is a global, pure-play, full life-cycle cyber security services provider formed from the merger of Herjavec Group and Fishtech Group in 2022.

Alset Technologies

Alset Technologies

Alset Technologies provides DASH - a comprehensive solution to DISA STIG (Security Technical Implementation Guide) compliance.

appNovi

appNovi

appNovi inventories everything to map the attack surface, identify missing security agents, and prioritize vulnerabilities based on exposure.