BUSINESS > Services > Financial


« Back to News

2015-04-07

Cyber Insurance: Well Worth it but Beware of Exclusions

It’s what all sensible people do to mitigate the risk of catastrophic financial damage: Buy insurance.

2015-03-30

Threat Lessons from Sony and Anthem

The cyberattack on Sony Pictures and Health Insurer Anthem have left plenty of unanswered questions.

2015-03-23

Latest Insurance Hack Affects 11 Million Customers

Premera Blue Cross suffered a hack, exposing claims and clinical data affecting 11 million US customers.

2015-03-10

Private Equity and Cyber Security: The 3 Weak Points

Private equity COOs and managing partners should consider the three main areas of the private equity business model that are susceptible to cyber attack:

2015-03-09

More CEOs Discover Power of Analytics

CEOs are looking to digital tools such as data analytics, mobile, cybersecurity and the Internet of Things to help them seize bigger opportunities ..

2015-03-03

Cyber Insurance Market Boosting Cyber Security

The insurance industry sits squarely at the intersection of cyber risk management and market solutions.

2015-01-27

How Fraud & Cyber Security Will Evolve in 2015

Banks need to implement new security measures and tactics, and fraudsters are sure to respond by changing their operations.

2015-02-05

The US and UK are to stage CyberWar against the Banks

The US and UK are to wage a series of cyber 'war games' against each other to test the resilience of the two country's defences against online criminals, beginning with a mock exercise directed at the banking and finance sector.

2015-02-25

Are Cyber War & Cyber Terrorism Insurable?

The frequency of cyber war and terrorism is no longer the risk. The magnitude of the potential damages is the real threat.

2015-02-09

Anthem failed to encrypt data prior to cyber-attack

Despite myriad health information standards and a landmark law to protect patient privacy, it appears insurance giant Anthem (ANTM) apparently didn’t encrypt personal data of 80 million of its customers.

2015-01-09

Cyber Security Insurance Underwriters Demand their Clients Understand the Threat Landscape

Insurance underwriters aren't looking for companies impervious to risk. They want clients that understand the threat landscape and have demonstrated abilities to mitigate attacks.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

UK Cyber Week Expo & Conference

UK Cyber Week Expo & Conference

Award-winning event organiser ROAR B2B announces the launch of UK Cyber Week and its inaugural event on 4 and 5 April 2023 at the Business Design Centre, London.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

44CON

44CON

44CON is an Information Security Conference & Training event taking place in London. Designed to provide something for the business and technical Information Security professional.

CERT-IS

CERT-IS

CERT-IS is the national Computer Emergency Response Team for Iceland.

Telia Cygate

Telia Cygate

Cygate are specialists in information security, data networks, and data centre and cloud technologies.

SecureDevice

SecureDevice

SecureDevice is a Danish IT Security company.

Executive Women's Forum (EWF)

Executive Women's Forum (EWF)

The Executive Women's Forum is the largest member organization serving emerging leaders and influential female executives in the Information Security, Risk Management and Privacy industries.

ITC Secure Networking

ITC Secure Networking

ITC are a leading cloud-based MSSP delivering service innovation in cyber security analytics & cloud technology.

Solana Networks

Solana Networks

Solana Networks is a specialist in IT networking and security.

Vericlave

Vericlave

At Vericlave we prevent cyberattacks on critical assets with a simple to deploy, proven solution that mitigates risks and addresses security challenges.

Penacity

Penacity

Penacity, LLC provides strategic consulting technology services and Information Security Services to commercial and government organizations.

S2S Group

S2S Group

S2S Group specialise in the destruction and management of IT assets at the end of the lifecycle.

Keyavi Data

Keyavi Data

With Keyavi’s evolutionary data protection technology, your data stays within the bounds of your control in perpetuity.

Keeper Security

Keeper Security

Keeper is a leading enterprise password manager and cybersecurity platform for preventing password-related data breaches and cyberthreats.

Gijima

Gijima

Gijima is one of SA’s leading ICT companies in Cloud & Outsourcing, Systems integration, Human Capital Management & Training, Cybersecurity, and Unified Communications.

Camel Secure

Camel Secure

Camel Secure is a company specialized in the development of products for information security and technology risk management.

Feroot Security

Feroot Security

Feroot Security secures client-side web applications so that businesses can deliver a flawless user experience to their customers. Our products help organizations protect their client-side surface.

NSI Global

NSI Global

NSI Global is a specialist Global Risk and Intelligence Advisory Firm that has built a reputation for consistently managing complex projects.