BUSINESS > Services > Financial


« Back to News

2016-07-08

Cybersecurity Insurance – What Is It? How Does It Work?

Cyber insurance has been around for almost a decade, but is only now becoming a popular safeguard against hackers.

2016-07-05

Preventing Hackers From Accessing Financial Information

Combating hackers with voice biometric authentication of customers adds another layer of security to prevent growing fraud.

2016-07-05

IBM Computer To ‘Help’ Accountants

KPMG Australia has signed a deal with IBM to use the Watson supercomputer to do big company audits.

2016-07-05

Hackers Steal $10m From Ukrainian Bank

More grief for the interbank platform SWIFT as hackers extract $millions from an undisclosed bank in Ukraine.

2016-07-04

How Will IOT Change Banking?

The banking industry is now starting to see the various potential ways in which IoT can help to take it to the next level.

2016-06-28

Russian Cyber Gangs Linked To Bank Robberies

Investigators have linked malware used by Russian and eastern European cyber-gangs to a string of bank thefts perpetrated using SWIFT.

2016-06-24

Insurers Want A Comprehensive Cyber Attack Database

The head of the Association of British Insurers wants to create a database where companies would have to record details of cyber attacks.

2016-06-23

An Inside Job: Looking For Cyber Criminals

The use of technology has outpaced cybersecurity literacy. All employees need to improve their knowledge & awareness of security issues.

2016-06-22

Cyber Insurance Is Changing How We Look At Risk

Sony Pictures thought that their General Liabilities insurance covered them against a damaging cyberattack. They learned a valuable lesson.

2016-06-15

Who’s Stealing The Money? SWIFT Tightens Security As A Fourth Bank Is Attacked.

The international bank money transfer system is suffering multiple attacks from a mystery assailant using the same type of code as used to hack Sony.

2016-06-08

12% Of Bank CEOs Don’t Even Know If They’ve Been Hacked

KPMG say there is a clear disconnect between how the C-Suite views cyber security versus the next tier of executives.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

NATO Cooperative Cyber Defence Centre (CCDCOE)

NATO Cooperative Cyber Defence Centre (CCDCOE)

NATO CCDCOE's mission is to enhance the capability, cooperation and information sharing among NATO, NATO nations and partners in cyber defence.

Berkman Klein Center for Internet & Society

Berkman Klein Center for Internet & Society

The Berkman Klein Center for Internet & Society is a research center at Harvard University that focuses on the study of cyberspace.

EC-Council

EC-Council

EC-Council is a member-based organization that certifies individuals in various e-business and information security skills.

Hodgson Russ

Hodgson Russ

Hodgson Russ is a US business law firm. Practice areas include Privacy, Data Breach & Cybersecurity.

Jamcracker

Jamcracker

Jamcracker is a cloud services management and cloud governance solutions company, with more than a decade of experience providing industry leading software and services.

Temasoft

Temasoft

TEMASOFT is a software company focused on developing security and infrastructure products.

Centro de Gestion de Incidentes Informaticos (CGII)

Centro de Gestion de Incidentes Informaticos (CGII)

CGII is the Computer Incident Management Center of the State of Bolivia.

Data Eliminate

Data Eliminate

Data Eliminate provide data destruction, secure end-of-life IT asset disposal, and data protection consultancy services.

Base Cyber Security

Base Cyber Security

Base Cyber Security is an information and cyber security talent service provider and career specialist.

Right-Hand Cybersecurity

Right-Hand Cybersecurity

Right-Hand Cybersecurity empowers businesses to monitor, measure and mitigate employee induced cyber risks in real-time.

Haven Group

Haven Group

Haven Group and its companies are a cyber security one-stop-shop for our clients offering a full range of cyber security services to our clients in a unified and united way.

BIO-key

BIO-key

BIO-key is a pioneer and innovator, we are recognized as a leading developer of fingerprint biometric authentication and security solutions.

Jit

Jit

Jit empowers developers to own security for the product they are building from day zero.

Ping Identity

Ping Identity

At Ping Identity, we believe in making digital experiences both secure and seamless for all users, without compromise. That’s digital freedom.

Fletch

Fletch

Fletch’s AI tracks the evolving cybersecurity threat landscape by reading and interpreting every threat article every day and matching those threats to a company’s exposure.

Mindsprint

Mindsprint

Mindsprint (formerly Olam Technology and Business Services - OTBS) are a leading edge technology and business services firm.