BUSINESS > Services > Financial


« Back to News

2017-05-17

Systemic Cyber Attacks Most Likely In Finance & Energy Industries

Experts at insurance giant AIG have identified the industry sectors at highest risk to systemic threats.

2017-05-17

Bank Data Breaches Are Up And It's An Inside Job

Bank breaches are not always due to legacy operating systems or their inability to cope with new forms of cyber attacks. There is human error.

2017-05-10

The Cybersecurity Threats That Keep Banks Alert

People in charge of vast volumes of valuable financial data are under increasing pressure to keep customer data safe from hackers & fraudsters.

2017-05-10

Thieves Drain Protected Bank Accounts

A known security hole in the networking protocol used by mobile phone providers enabled a string of attacks that emptied bank customer accounts.

2017-05-03

Cyber Should Be Standalone Insurance

Treating cyber risk as a standalone insurance risk promises to unlock the potential for meaningful coverage for both insurers & buyers.

2017-04-24

Targeted Ransomware Attacks Are Focusing On Business

Cyber criminals are increasingly turning their attention from attacks against private users to targeted ransomware attacks against businesses.

2017-04-24

Cybercrime Cost The Global Economy $450Billion In 2016

Hiscox Insurance chief says there is an epidemic of cybercrime costing billions. Yet, 53% of US, UK and German businesses are unprepared.

2017-04-14

Insurers Get Much More Cautious About Cyber Risk

Major US insurer Anthem wants reviews of PC usage by customers seeking damages as it may be solely their client’s fault.

2017-04-07

More Details Of Crippling Attack On UK Bank Emerge

Lloyds Bank call in the cybersecurity experts to investigate the attack which stopped a substantial number of customers using their online accounts.

2017-04-04

Why SMEs Need Cyber Insurance

Cybercrime targeting small and medium-sized businesses costs the UK an estimated £5.26bn a year. They need cyber insurance.

2017-04-04

Cybersecurity Breaches Cost UK Businesses Close To £30bn Last Year

More than half of British businesses fell victim to some form of cybercrime in 2016 at a cost of £29.1 billion.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

rPeople Staffing

rPeople Staffing

rPeople provides direct placement in all areas of your organization, including and specializing in Technical and Executive hiring.

edgescan

edgescan

edgescan is a cloud-based continuous vulnerability management and penetration testing solution.

OSSEC

OSSEC

OSSEC is a scalable, multi-platform, open source Host-based Intrusion Detection System (HIDS).

Trinexia

Trinexia

Trinexia (formerly Credence Security) is a specialty Value-added Distributor of Cyber Security, Digital Forensics, Security Awareness, Data Security & Governance solutions.

SecureKey Technologies

SecureKey Technologies

SecureKey is a leading identity and authentication provider that simplifies consumer access to online services and applications.

Protectimus

Protectimus

Affordable two factor authentication (2FA) provider. Protect your data from theft with multi factor authentication service from Protectimus.

Center for Long-Term Cybersecurity (CLTC)

Center for Long-Term Cybersecurity (CLTC)

The Center for Long-Term Cybersecurity is developing and shaping cybersecurity research and practice based on a long-term vision of the internet and its future.

Sothis

Sothis

Sothis is an information technology services company offering a range of solutions including cybersecurity, managed security services, information governance and compliance.

Bessemer Venture Partners (BVP)

Bessemer Venture Partners (BVP)

Bessemer Venture Partners was born from innovations that literally forged modern building and manufacturing. Today, our team of investors works with people who want to create revolutions of their own.

AUREA Technology

AUREA Technology

The photon counter SPD_OEM_NIR from AUREA Technology is designed for quantum key distribution at telecom wavelengths.

Acceptto

Acceptto

Acceptto offers the first unified and continuous authentication identity access platform with No-Password.

Blue Lance

Blue Lance

Blue Lance is a global provider of cybersecurity governance solutions. Our software solutions automatically collect and store the information necessary for investigations, audit and compliance.

DataDog

DataDog

DataDog provides Cloud-native Security Monitoring. Real-time threat detection across your applications, network, and infrastructure.

Gulf Business Machines (GBM)

Gulf Business Machines (GBM)

GBM is a leading end-to-end digital solutions provider, offering the broadest portfolio, including industry-leading digital infrastructure, digital business solutions, security and services.

Telindus

Telindus

Telindus is the strategic IT partner for the flexible organization of the future. We build optimal IT infrastructure with four components: networking, cloud, cybersecurity and data & AI.

Trustack

Trustack

Trustack services cover connectivity, infrastructure services, security, unified comms, agile working and more. Our team of consultants deliver customised solutions tailored to your needs.