BUSINESS > Services > Financial


« Back to News

2020-07-31

The Costs Of A Data Breach

The total cost of a data breach to a major business has reached a whopping $3.9m. It's not just money - reputation, credibility and trust are at stake.

2020-07-21

Malware Found In Chinese Banking Software

Discovered: Malware embedded in tax software that Chinese banks require corporations to install to conduct business operations in China.

2020-07-20

Google Doubles Down On India

A $10 billion investment focused on enabling affordable access to the Internet and to information for every Indian in their own language.

2020-07-16

High Profile Twitter Users Hacked

Twitter accounts of major companies and individuals attacked by hackers in one of the most widespread breaches the platform has ever seen.

2020-07-28

Machine Learning Transforms Threat Detection

Machine Learning can shift the advantage towards defenders by significantly improving cyber threat detection in real time.

2020-07-24

Russian Ransomware Group Hacked US News Company

The Russian based group Evil Corp, known for the Dridex banking trojan and other malware, was able to hack into dozens of US newspaper websites.

2020-07-17

Security Risks of Contactless Payment

Consumers are driving the push towards contactless payment, but like any technology, it comes with mobile security and data privacy risks.

2020-07-13

US Companies Hit With A New Ransomware Campaign

The hacking group known as Evil Corp. has attacked major US companies using a dangerous new strain of ransomware called WastedLocker.

2020-07-10

Cyber Security Essentials For StartUps

While it may not seem the most urgent priority for entrepreneurs, increasing the emphasis on cyber security will reward a growing business.

2020-06-27

Companies Are Coughing Up Ransom To Recover Their Data

One in six of those attacked with malware have surrendered by paying out the ransom following a data breach. One firm paid over £70million.

Perimeter 81

Directory of Suppliers

Perimeter 81

Perimeter 81

Perimeter 81 is a Zero Trust Network as a Service designed to simplify secure network, cloud and application access for the modern and distributed workforce.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Cylance Smart Antivirus

Cylance Smart Antivirus

An antivirus that works smarter, not harder, from BlackBerry. Lightweight, non-intrusive protection powered by artificial intelligence. BUY NOW - LIMITED DISCOUNT OFFER.

Tendo Solutions

Tendo Solutions

Tendo Solutions provides intelligence, security, forensics and risk solutions to clients across different sectors and jurisdictions.

Secure Identity Alliance (SIA)

Secure Identity Alliance (SIA)

The Secure Identity Alliance is dedicated to supporting sustainable worldwide economic growth and prosperity through the development of trusted digital identities and the adoption of secure eServices.

Cronus Cyber Technologies

Cronus Cyber Technologies

Cronus Cybot performs automatic penetration testing all year round, including continuous vulnerability assessment for full control of your network.

DXC Technology

DXC Technology

DXC Technology is one of the world’s leading independent, end-to- end IT solutions and services company.

Sponge

Sponge

Cybersecurity Sorted by Sponge is a seriously engaging training game to make your staff the first line of defence against cyber threats.

Panorays

Panorays

Panorays automates third-party security lifecycle management. It is a SaaS-based platform, with no installation needed.

Cyber Security for the Nordic Region (Nordic Cyber Series)

Cyber Security for the Nordic Region (Nordic Cyber Series)

10-11 March 2020, Copenhagen. Join 100+ Cyber Security Experts for Data Protection Talks, Best Practice Guides, Practical Insights, Cyber Resilience Tips & More.

Dhound

Dhound

Dhound is a cybersecurity company providing web application penetration testing.