BUSINESS > Services > Financial


« Back to News

2017-08-02

Russian Arrested For $4billion Bitcoin Theft

The “internationally sought mastermind of a crime organisation” Alexander Vinnik is accused of laundering more than $4bn in bitcoin.

2017-08-03

Microsoft Cloud Earnings Beat Expectations

There's a reason Microsoft founder Bill Gates is still the richest man in the world and it's not because of PCs & software. It's all about the Cloud.

2017-08-01

WannaCry Drives Cyber Insurance

One effect of WannaCry compared to other high profile attacks is an unprecedented jump and a sustained interest in corporate cyber insurance.

2017-07-24

Global Cyber Attack Could Cost $53Billion.

Insurance experts at Lloyds calculate that the cost of a major cyber attack would equal the economic losses from a catastrophic natural disaster.

2017-07-19

Half Of US Firms Do Not Buy Cyber Insurance

A full 50% of US firms do not have cyber risk insurance and 27% of US executives say their firms have no plans to take out a cyber policy.

2017-07-17

Terrorist Activities On Social Media

The financial services sector is required to report suspicious transactions. Should the same apply to suspicious communications on social media?

2017-07-13

Are Corporate Cyber Defenses Adequate?

It’s not just about the technology: Business leaders should be focusing on their companies’ systemic risks, rather than just software.

2017-07-11

Insurance: How Cyber Risks Are Evolving

Lloyds of London say that both the costs and the ways in which companies can be targeted by organised cyber criminals are increasing.

2017-07-03

App Or Browser: Which Is Safer For Online Banking?

If you need to make a transaction on the go banking apps ought to be more secure than browsers, but it isn’t necessarily so.

2017-06-26

Report Predicts Banks To Get €4.7bn Fines In First 3 years Under GDPR

With an estimated 128 breaches per year in the EU financial services industry, the cost of paying GDPR penalties could be huge.

2017-06-21

Advice For Cyber Insurance Buyers

Companies interested in securing cyber insurance should know that the underwriting process requires them to do careful due diligence.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Code42

Code42

Code42 CrashPlan, is an enterprise SaaS solution that backs up all distributed end-user data on a single, secure platform.

Rockwell Automation

Rockwell Automation

Rockwell Automation offer industrial security solutions to protect the integrity and availability of your complex automation solutions.

itWatch

itWatch

itWatch is focused on data loss prevention (DLP), endpoint security, mobile security, encryption, and cost reducing solutions for IT operations.

Cyber Exchange

Cyber Exchange

Cyber Exchange provides a focal point for UK organisations connected with, or with an interest in, cyber security to connect, engage and collaborate.

Focal Point Data Risk

Focal Point Data Risk

Focal Point is a pure-play data risk management provider capable of offering end-to-end consulting, implementation, and training services.

Computer Forensics Consult (CFC)

Computer Forensics Consult (CFC)

Computer Forensics Consult provides disaster recovery, computer forensics, electronic discovery and litigation support services in the growing area of Cyber Security.

Digital Management (DMI)

Digital Management (DMI)

DMI is a provider of mobile enterprise, business intelligence and cybersecurity services.

Framatome

Framatome

Framatome Cybersecurity portfolio is directly inspired by its unique experience in nuclear safety for critical information systems and electrical systems design.

Across Verticals

Across Verticals

Across Verticals is a boutique cyber security consulting firm that specializes in holistic, deeply technical and end to end cyber security advisory services based on industry best practices.

NormCyber

NormCyber

NormCyber provide award-winning cyber security and data protection as a service for midsize organisations.

Kong

Kong

Kong - powering the API world. Increase developer productivity, security, and performance at scale with the unified platform for API management, service mesh, and ingress controller.

Jitterbit

Jitterbit

Jitterbit integrates critical business processes and enables application development to deliver the experiences and insights needed by enterprises of all sizes to accelerate their digital journey.

CyberGrape

CyberGrape

CyberGrape is a client centric managed services company, providing enterprise leading security solutions and helping companies through their IT risk and security challenges.

12Port

12Port

12Port network security solutions help companies tackle modern cybersecurity threats cost-effectively while implementing zero-trust architectures.

Transcendental Technologies

Transcendental Technologies

Transcendental is a consulting organization which specializes in customized assurance services in the fields of Localization, Mobile Software Solutions, Web Design, Cyber Security & Cyber Forensics.

London School of Emerging Technology (LSET)

London School of Emerging Technology (LSET)

LSET's Cyber Security Unit is your premier destination for comprehensive cybersecurity education and training.