BUSINESS > Services > Transport & Travel


« Back to News

2020-06-17

Maritime Cyber Attacks Quadruple

Ageing shipping infrastructure, complex supply chains and the effects of lockdown combine to make the shipping industry highly vulnerable.

2020-06-11

Vehicle Cyber Crime Attacks Double

Hackers can manipulate vehicles through shared information protocols and cyber attacks on connected cars have grown 99% in the last year.

2020-06-10

Hacked Vehicle Owner Database For Sale

A database with 129 million records of Russian car owners, thought to be hacked from the Moscow Police force, is for sale on the Dark Web.

2020-06-08

Chinese Hackers Attacked EasyJet

The recent cyber attack that struck British airline EasyJet is thought have been carried out by Chinese hackers for espionage, not fraud.

2020-06-02

Customer Compensation Claim Follows The EasyJet Hack

EasyJet faces a liability of £18 billion from a class action claim filed in London on behalf of the airline's customers hit by a data breach.

2020-05-22

Cyber Security At Schiphol Airport Is Ineffective

The importance of IT in border control is huge and the systems at Amsterdam's Schipol airport do not seem to meet the required standard.

2020-05-20

Nine Million EasyJet Customers Hacked

British budget airline EasyJet admits that customer data, email addresses and travel details of 9 million customers have been hacked & stolen.

2020-04-14

Marriott Hotels - Millions Hacked Again

Careless: After the first incident in 2018 Marriott says it has now lost personal data for as many as 5.2 million guests in a second giant breach.

2020-04-06

Container Shipping Gets A Cyber Security Mandate

Detailed guidance is released to ship-owners and sea-going vessels to get them ready for new international maritime cyber security rules.

2020-03-28

New Guidelines For Maritime Cyber Security

Cyber attacks on maritime freight may result in severe operational failures and new guidelines aim to contain threats from phishing emails & malware.

Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

A simple and cost-effective solution to monitor, investigate and analyze data from the web, social media and cyber sources to identify threats and make better security decisions.

Perimeter 81

Perimeter 81

Perimeter 81 is a Zero Trust Network as a Service designed to simplify secure network, cloud and application access for the modern and distributed workforce.

Cylance Smart Antivirus

Cylance Smart Antivirus

An antivirus that works smarter, not harder, from BlackBerry. Lightweight, non-intrusive protection powered by artificial intelligence. BUY NOW - LIMITED DISCOUNT OFFER.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

WEBINAR: How To Build A Security Observability Strategy In AWS

WEBINAR: How To Build A Security Observability Strategy In AWS

Thursday, Apr 22, 2021 - Join this webinar to learn how to build a security observability strategy in AWS, covering cloud-native monitoring sources, guardrails, and automation capabilities.

Dark Reading

Dark Reading

Dark Reading is one of the most widely-read cyber security news sites on the Web

Zscaler

Zscaler

Zscaler offers a cloud security solution that preserves the user experience, while boosting web and application security with a cloud-based firewall proxy architecture

Oracle Cloud Security

Oracle Cloud Security

Oracle’s cloud security solutions enable organizations to implement and manage consistent security policies across the hybrid data center.

NetMotion Software

NetMotion Software

NetMotion Software specializes in mobile performance management solutions to manage, secure and support the mobile enterprise.

Cloudneeti

Cloudneeti

Cloudneeti is a software company with innovative solutions for continuous cloud security, data privacy and compliance assurance.

Ensconce Data Technology (EDT)

Ensconce Data Technology (EDT)

EDT’s focus is on providing solutions to properly sanitize Solid State Drives (SSD) and Magnetic Drives (HDD) before they are disposed or redeployed.

Kasada

Kasada

Kasada provides bot detection and mitigation for enterprise web applications. Stop the bots before they reach your site and web applications.

Green House Data

Green House Data

Green House Data is a managed services provider delivering hybrid solutions to enterprises who need secure IT environments and efficient management of their critical applications and business data.

Jericho Systems

Jericho Systems

Jericho Systems Corporation was established to meet the need to securely share information in increasingly complex and sophisticated environments.

Tactical Network Systems (TNS)

Tactical Network Systems (TNS)

Tactical Network Solutions helps you discover hidden attack vectors in IoT and connected devices before someone else does.