BUSINESS > Services > Financial


« Back to News

2017-06-07

Small Businesses Should Consider Cyber Insurance

A shockingly low number of small businesses invest in cyber liability insurance to combat the potentially devastating effects of a cyber attack.

2017-06-05

Five Pitfalls of Cybersecurity Insurance

Businesses are increasingly considering investing in cybersecurity insurance. But insurance is only as effective as the scope of the coverage.

2017-05-25

Cyber Crime Drives Up The Cost Of Insurance

Insurers see coverage against hackers as one of their most promising markets, estimating that premiums will triple over the next four years.

2017-05-17

Systemic Cyber Attacks Most Likely In Finance & Energy Industries

Experts at insurance giant AIG have identified the industry sectors at highest risk to systemic threats.

2017-05-17

Bank Data Breaches Are Up And It's An Inside Job

Bank breaches are not always due to legacy operating systems or their inability to cope with new forms of cyber attacks. There is human error.

2017-05-10

The Cybersecurity Threats That Keep Banks Alert

People in charge of vast volumes of valuable financial data are under increasing pressure to keep customer data safe from hackers & fraudsters.

2017-05-10

Thieves Drain Protected Bank Accounts

A known security hole in the networking protocol used by mobile phone providers enabled a string of attacks that emptied bank customer accounts.

2017-05-03

Cyber Should Be Standalone Insurance

Treating cyber risk as a standalone insurance risk promises to unlock the potential for meaningful coverage for both insurers & buyers.

2017-04-24

Targeted Ransomware Attacks Are Focusing On Business

Cyber criminals are increasingly turning their attention from attacks against private users to targeted ransomware attacks against businesses.

2017-04-24

Cybercrime Cost The Global Economy $450Billion In 2016

Hiscox Insurance chief says there is an epidemic of cybercrime costing billions. Yet, 53% of US, UK and German businesses are unprepared.

2017-04-14

Insurers Get Much More Cautious About Cyber Risk

Major US insurer Anthem wants reviews of PC usage by customers seeking damages as it may be solely their client’s fault.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Information Commissioner's Office (ICO) - UK

Information Commissioner's Office (ICO) - UK

The Information Commissioner's Office is an independent authority set up to uphold information rights in the public interest.

Parasoft

Parasoft

Parasoft is an independent software testing and software quality assurance tool and solution vendor.

Kernelios

Kernelios

Kernelios is a simulator-based training center and an incubator for cyber experts worldwide.

UK Cyber Security Forum

UK Cyber Security Forum

UK Cyber Security Forum is a community interest group for cyber security companies in the UK.

Deceptive Bytes

Deceptive Bytes

Deceptive Bytes provides an Active Endpoint Deception platform that dynamically responds to attacks as they evolve and changes their outcome.

QuillAudits

QuillAudits

QuillAudits offers advanced Ethereum, EOS, TRON smart contract audit, blockchain protocol security and formal verification to ensure your platform’s integrity.

Trail of Bits

Trail of Bits

Trail of Bits combine high-end security research with a real-world attacker mentality to reduce risk and fortify code.

doIT Solutions

doIT Solutions

doIT solutions specialize in IT security and infrastructure, security automation, data center, and cybersecurity.

Rocky Mountain Cybersecurity

Rocky Mountain Cybersecurity

Rocky Mountain Cybersecurity's mission is to provide value by dramatically improving the cybersecurity posture of our clients and business partners.

Tech Vedika

Tech Vedika

Tech Vedika has access to technical guidance, training and resources from AWS to successfully undertake solution architecture, application development, application migration, and managed services.

Tonex

Tonex

Tonex providing industry-leading technology training, courses, seminars, workshops, and consulting services to companies and government organizations around the world.

Security Awareness Special Interest Group (SASIG)

Security Awareness Special Interest Group (SASIG)

The Security Awareness Special Interest Group (SASIG) addresses the human aspects of security and fraud prevention in an initiative to improve trust and confidence in the online environment.

Runecast Solutions

Runecast Solutions

Runecast Solutions is a global leader in AI-powered risk mitigation, security, continuous compliance and more efficient IT operations management.

rThreat

rThreat

rThreat is a cloud-based SaaS solution that challenges your cyber defenses using real-world and custom threats in a secure environment, ensuring your readiness for attacks.

Cyberagentur (Cyber Agency)

Cyberagentur (Cyber Agency)

Cyberagentur is the Federal Agency in Germany for innovation in cybersecurity. Our mission is to advance research and groundbreaking innovations in the field of cybersecurity and related technologies.

Forthright Technology Partners

Forthright Technology Partners

Forthright Technology Partners (Forthright) is a next-generation cloud and managed IT services provider serving a global clientele.