BUSINESS > Services > Financial


« Back to News

2021-03-13

European Banking Authority Attacked

The European Banking Authority (EBA) has had it’s Microsoft Exchange Servers breached by a suspected Chinese state-backed hacking group.

2021-01-26

Financial Organisations Are Migrating To The Cloud

Financial services organisations are planning to optimise their cloud usage with investments in the hybrid cloud expected to grow significantly.

2021-01-26

Crypto Currency Users Hijacked

ElectroRAT is an unusual new malware specially created to target cryptocurrency users with trojan apps that log keystrokes and execute commands.

2021-01-18

New Zealand Central Bank Cyber Attack

The Reserve Bank of New Zealand has suffered a "malicious and illegal breach” of one of its third-party data sharing application systems.

2021-01-14

British Financial Fraud Surges 28%

Identity fraud in financial transactions has surged in the UK, due to poor verication techniques and the prevalance of fake and stolen ID documents.

2020-12-07

In The Age of Risk, Cyber Security Is The Leading Concern

A top insurance CEO says that Cyber Security is the most pressing exposure for business, more than the Coronavirus and climate change.

2020-11-23

Most Large Financial Firms Have Been Attacked In The Past Year

Over 60% of big Financial Services firms suffered a cyber attack in the last year, despite significantly increased investment in cyber security.

2020-11-03

2020 - Business Cyber Readiness

Cyber losses have risen nearly six-fold worldwide in the past year, with the Financial Services and Energy sectors most badly hit, says top insurer.

2020-10-30

Five Things Management Must Know About Cyber Security

Cyber threats advance more quickly than many organisations can keep up with. It has never been more important for business leaders to take action.

2020-10-30

Nearly Half Of All Businesses Have No Protection

Two new pieces of research confirm the shocking levels of ignorance and complacency which leave so many business exposed to cyber attack.

2020-10-13

Bangladeshi Banks Are Not Properly Cyber Secure

Financial institutions in Bangladesh are poorly equipped to deal with a wave of malware-driven attacks from N.Korean and local cyber criminals.

Quartz Conference
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Perimeter 81 / Zero Trust Network Access Guide

Perimeter 81 / Zero Trust Network Access Guide

Curious how you can Implement a Zero Trust roadmap with insights from Gartner? Download this free report for a limited time only.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Hex Security

Hex Security

Hex Security Limited is a specialist Information Assurance (IA) consultancy working with associates and partners to deliver security certification and accreditation support.

Zscaler

Zscaler

Zscaler enables the world’s leading organizations to securely transform their networks and applications for a mobile and cloud first world.

Trust Guard

Trust Guard

Trust Guard services provide complete security for your website.

Mi-Token

Mi-Token

Mi-Token is an advanced two-factor authentication solution that offers unparalleled security, flexibility, cost-effectiveness and ease of use.

Morphisec

Morphisec

Morphisec Endpoint Threat Prevention blocks zero-days and advanced attacks in real time, before they cause any damage.

Payload Security

Payload Security

Payload Security's VxStream Sandbox is a fully automated malware analysis system.

K2 Integrity

K2 Integrity

K2 Integrity is a preeminent risk, compliance, investigations, and monitoring firm - built by industry leaders to safeguard our clients’ operations, reputations, and economic security.

e-Lock

e-Lock

e-Lock services include IT security consulting and training, security systems integration, managed security and technical support.

Infodas

Infodas

Infodas provides Cybersecurity and IT consulting / system integration services as well as a range of innovative Cybersecurity products to public sector and commercial clients.

Haventec

Haventec

Haventec’s internationally patented technologies reduce cyber risk and enable pervasive trust services with a decentralised approach to authentication.

Garner Products

Garner Products

Garner design, manufacture, and sell equipment that delivers complete, permanent, and verifiable data elimination.

Secured Communications

Secured Communications

Secured Communications has developed the only unified secure communications platform trusted by public safety and counter terrorism professionals around the world.

Tangible Security

Tangible Security

Tangible employs the most sophisticated cyber security tools and techniques available to protect our clients’ sensitive data, infrastructure and competitive advantage.

Infopercept Consulting

Infopercept Consulting

Infopercept is a leading cybersecurity company in India, providing a critical layer of security to protect business information, infrastructure & assets across the organization.

Cyber Defense Technologies (CDT)

Cyber Defense Technologies (CDT)

Cyber Defense Technologies provides services and turn-key solutions to secure and maintain the integrity of your organization’s systems and data against attacks.

Surefire Cyber

Surefire Cyber

Surefire Cyber delivers swift, strong response to cyber incidents such as ransomware, email compromise, malware, data theft, and other threats with end-to-end response capabilities.