BUSINESS > Services > Financial


« Back to News

2024-01-22

Hackers Attack Leading Investment Bank

Davos Blues: Bankers & regulators express concern over the growing wave of cyber attacks on financial services being reinforced with AI.

2023-12-19

How Financial Institutions Can Address Their Top Cybersecurity Challenges

The Focus For Cyber Criminals: There are countless factors that still make banks and financial institutions attractive targets. By Igor Baikalov

2023-12-18

Hackers Want Your Pension

Pension schemes are at risk of being targeted by cyber attacks because of the large amounts of personal data and assets they hold.

2023-12-11

The End Of Crypto Currency

Downward Velocity: The well-reported challenges of major crypto exchanges, FTX and Binance, are making the market’s future look difficult.

2023-12-01

Fake Login Pages To Steal Bank Data

Octo Malware: Customers of some of Australia’s major Banks are being caught out by a convincing campaign, designed to steal personal data.

2023-11-27

Creating A Top-Notch Financial App With Advanced Cybersecurity

The Ultimate Guide: What is the current role of cybersecurity in FinTech and what standards are better to opt for? By Serge Khmelovskyi

2023-11-24

HSBC Mobile Banking App Fails

Black Friday Blues: Millions of UK users of HSBC & First Direct mobile apps were unable to access banking services this morning as they went offline.

2023-11-20

Imminent New SEC Cyber Security Rules

Financial Services: Why imminent SEC cyber rule changes mean that cyber security leadership must come from the very top. By Miguel Clarke

2023-11-11

Attack On Chinese Bank Disrupts Financial Trading

The Ripple Effect: An attack on a major Chinese bank has resulted in disruption and completion failures in trades on US financial markets.

2023-10-05

Indian Police Crackdown On Social Media Financial Fraud

Victims were defrauded with the promise of huge returns on small investments, contacting them via the WhatsApp & Telegram instant messaging apps.

2023-08-14

DORA: Compliance With The EU Digital Resilience Act

The deadline for complying with the new DORA rules is approaching. What is it & what are the risks of non-compliance? By Christopher Gill

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Intrusion

Intrusion

Intrusion provides IT professionals with the most robust tool set available for performing in-depth research and analysis of network traffic.

Data61

Data61

Data61 is Australia’s leading digital research network offering the research capabilities, IP and collaboration programs to unleash the country’s digital & data-driven potential.

GreyCortex

GreyCortex

GreyCortex uses advanced artificial intelligence, machine learning, and data mining methods to help organizations make their IT operations secure and reliable.

Trinity Cyber

Trinity Cyber

Trinity Cyber’s patent-pending technology stops attacks before they reach internal networks,reducing risk and increasing cost to adversaries.

Ensurity Technologies

Ensurity Technologies

Ensurity is a deep-tech cybersecurity engineering company; designs and manufactures specialized secure hardware, software, and mobile application solutions.

UK Research & Innovation (UKRI)

UK Research & Innovation (UKRI)

UKRI works in partnership with universities, research organisations, businesses, charities, and government to create the best possible environment for research and innovation to flourish.

HackControl

HackControl

HackControl services include penetration tests, security audits, block chain audits and brand and anti-phishing protection.

BeyondTrust

BeyondTrust

BeyondTrust is a leader in Privileged Access Management, offering a seamless approach to preventing data breaches related to stolen credentials, misused privileges, and compromised remote access.

NeuVector

NeuVector

NeuVector, the leader in Full Lifecycle Container Security, delivers uncompromising end-to-end security from DevOps vulnerability protection to complete protection in production.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CYMAR

CYMAR

CYMAR The “CYBER” Smart Solution to offer sustainability and bring resilience to Global SMART Terminals and protect the supply chain of the World’s economy.

Focus Digitech

Focus Digitech

Focus Digitech helps you with your digital transformation journey with our main core offerings of Cloud, Cybersecurity, Analytics and DevOps.

Guardsman Cyber Intelligence (GCI)

Guardsman Cyber Intelligence (GCI)

GCI provides proven cyber intelligence solutions to protect your business against ever present physical and digital threats shadowing your online business.

Emerge Digital

Emerge Digital

Emerge Digital is a technology and digital innovation business and Managed Services Provider providing solutions to SMEs.

Flawnter

Flawnter

Flawnter is a security testing software that finds hidden security and quality flaws in your applications.

BreakPoint Labs

BreakPoint Labs

BreakPoint Labs is dedicated to providing the methods and means for sustainable, measurable, and effective cybersecurity operations.