BUSINESS > Services > Financial


« Back to News

2024-10-24

The Financial Impact Of Cybercrime

A CFO's Nightmare: Many organizations continue to underestimate the financial consequences of a breach. By John Mc Loughlin

2024-10-23

Private Equity Firms Should Make Cybersecurity Diligence A Priority

PE firms hold a wealth of sensitive information and cybersecurity is as important as “Quality of Earnings” for new acquisitions. By Chris Snyder

2024-10-14

A Landmark Ransom Attack On Healthcare

$2.3 Billion In Costs: What one of the worst attacks to ever hit the US healthcare industry can teach us about cybersecurity in 2024. By Claud Bilbao

2024-10-04

Cyber Insurance: What Businesses Need To Know

A Crucial Safety Net Gets More Expensive: As ransomware incidents have surged, so too have the premiums for cyber insurance. By Greg Day

2024-10-11

Surge In DDoS Attacks On Financial Services

Network Layers 3 & 4: Financial services continues to be the most frequently targeted industry with DDoS attacks for the second year running.

2024-08-19

Cyber Insurance: The Cost Of Doing Business

Ransom Attacks & Extortion Demands Are Soaring: The question for any company is what would you pay and what does it cost to defend yourself?

2024-01-22

Open Banking, Security, APIs & Mobile Apps [extract]

Open banking aims to improve transparency and drive the development of better financial products & services. But are users' sensitive data secure?

2024-07-20

MediSecure Hack - Half The Australian Population Affected

Around 13 million Australians have had their personal prescriptions and other healthcare data exposed in a hack that took place 3 months ago.

2024-07-12

Ransomware Attack Hits Global Card Processing Company

TPS Worldwide, a Pakistani card processing company that provides services to numerous financial institutions, is facing a massive ransom attack.

2024-07-02

Australian Banks Suffering Intense Cyber Attacks

Australia's big four banks are undergoing constant cyber attacks as criminals deploy new purpose-built malware targeting mobile phone users.

2024-06-26

LockBit Claims It Hacked The US Federal Reserve

LockBit claims to have stolen 33 terabytes of confidential data from the US Federal Reserve, but security researchers are expressing doubt.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Japan Network Security Association (JNSA)

Japan Network Security Association (JNSA)

JNSA's goal is to promote standardization related to network security and to contribute to greater technological standards in the field.

Industrial Cyber-Physical Systems Center (iCyPhy)

Industrial Cyber-Physical Systems Center (iCyPhy)

The goal of iCyPhy is to conduct pre-competitive research on architectures and design, modeling, and analysis techniques for cyber-physical systems.

Cyber Affairs

Cyber Affairs

Cyber Affairs is the first Italian press agency entirely dedicated to cyber security.

Span

Span

Span designs, develops and maintains information systems based on advanced technological solutions of global IT leaders.

Havelsan

Havelsan

HAVELSAN is a leading technology company in Turkey developing indigenous systems for domestic and foreign military, public and private sector clients.

MedCrypt

MedCrypt

MedCrypt are a team of medical device experts focused on bringing modern cybersecurity features to the next generation of healthcare technology.

Veriff

Veriff

Veriff provides highly-automated identity-verification services that prevent fraud like nothing else on the market.

Cyber Lockout

Cyber Lockout

Comprehensive ransomware insurance and preventative cybersecurity technology solution, working together to help protect businesses 24/7/365.

Kontex

Kontex

Kontex is a Cyber Security consultancy creating resilient solutions. From Strategy, Advisory and Implementation to Management and everything in between.

KT Secure

KT Secure

KTSecure’s mission is to provide proven and productive cyber security solutions and managed services, backed by our highly qualified and passionate team of experts.

IPKeys Technologies

IPKeys Technologies

IPKeys delivers innovative cybersecurity and technology solutions focused on helping the federal government reduce risk and protect the US from cyberattacks.

ThreatDefence

ThreatDefence

ThreatDefence provides innovative SIEM, SOC-as-a-Service, and proactive cyber defence solutions to MSP’s and Enterprises.

Eventus Security

Eventus Security

Eventus, are a team of highly skilled professionals who are committed to deliver excellence in next generation cyber security services and customized solutions for your enterprise.

DIGISOC

DIGISOC

DIGISOC, a leader in Latin America in Cybersecurity solutions, combines machine learning with human intelligence to be effective in detecting cyber threats.

Halo Security

Halo Security

Halo Security is a fast, easy, and scalable external attack surface management platform that gives security leaders deep visibility into their internet-facing assets.

Breeze Security

Breeze Security

The Breeze Platform acts as a defense coordinator, unifying security across identities, endpoints, cloud, and data to expose real attack paths, orchestrate remediation, and detect threats.