BUSINESS > Services > Transport & Travel


« Back to News

2021-07-19

Autonomous Ships And Cyber Security

Maritime Autonomy: Unmanned surface ships are becoming more independent and capable of accomplishing sophisticated missions.

2021-06-24

Maritime Shipping Line Under Attack

The shipping industry continues to be the target of cyber criminals as South Korean carrier HMM becomes the latest to suffer a cyber attack.

2021-06-16

Protecting Critical Infrastructure

Cyber attacks on critical infrastructure have a significant economic impact and securing these vital systems is all about controlling digital access.

2021-05-19

Maritime Shipping Is An Ideal Target For Ransom

The maritime industry is dependent on just-in-time supply chains, often with outdated technology, making an attractive target for cyber criminals.

2021-04-29

Maritime Cyber Security Has Missing Parts

Whether the target is ships, humans or logistics chains, the maritime environment continues to be vastly underappreciated for its cybersecurity risks.

2021-03-17

Multiple Airlines Hit By Supply Chain Attack

A major aviation IT company has been breached in what appears to be a highly sophisticated, coordinated supply chain attack.

2021-03-16

Maritime Cyber Security Is Equally Important On Land

With the global shipping industry already under pressure, addressing the risk to port infrastructure from cyber attacks has never been more critical.

2021-03-04

Connected Cars & Cyber Security

An increase in malicious attacks arising from the wider adoption of connected vehicles is driving growth in the automotive cyber security market.

2021-02-24

Cyber Security Is Crucial For Maritime Shipping

Cyber attacks targeting ocean transport are growing exponentially and present great risks to the safety of crews, vessels, cargoes and ports.

2021-01-29

Maritime Cyber Security Needs Shipping Companies to Focus

The maritime shipping industy’s vulnerability has never been greater, as digital transformation provides many more opportunities for hackers.

2021-01-16

Airline Faces £800m Penalty For Customer Data Breach

A British High Court ruling means that 400,000 British Airways customers can claim compensation after hackers skipped though its network security.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

SecurityMetrics

SecurityMetrics

SecurityMetrics is leader in data security, PCI, and HIPAA compliance solutions

SQA Service

SQA Service

SQA Service provide independent software and process Quality Assurance services.

Government Communications Headquarters (GCHQ)

Government Communications Headquarters (GCHQ)

GCHQ defends Government systems from cyber threat, provide support to the Armed Forces and strive to keep the public safe, in real life and online.

CionSystems

CionSystems

CionSystems provides identity, access and authentication solutions to improve security and streamline IT infrastructure management.

Electric Imp

Electric Imp

Electric Imp offers an innovative and powerful Internet of Things platform that securely connects devices with advanced cloud computing resources.

Sumo Logic

Sumo Logic

Sumo Logic simplifies how you collect and analyze machine data so that you can gain deep visibility across your full application and infrastructure stack.

Cognni

Cognni

Cognni (formerly Shieldox) will make your InfoSec think like a human, right out of the box, so you can focus on the bigger picture, keeping the information flow safe.

Office of the Government Chief Information Officer (OGCIO) - Hong Kong

Office of the Government Chief Information Officer (OGCIO) - Hong Kong

OGCIO supports the development of community-wide information technology infrastructure and setting of technical and professional standards to strengthen Hong Kong’s position as a world digital city.

Pentest360

Pentest360

Pentest360 is a 24x7x365 Penetration testing service offered through a feature-rich, centralised platform on the cloud that delivers instant visibility during security assessments.

N8 Identity

N8 Identity

N8 Identity helps organizations realize the vision of Autonomous Identity Governance™ with AI-driven Identity solutions.

Marcum Technology

Marcum Technology

Marcum Technology consultants are focused on helping you reach your company’s full potential by exploring creative ways to integrate tomorrow’s technology into your business today.

CCX Technologies

CCX Technologies

CCX Technologies design and develop a wide range of cybersecurity and testing solutions for the aviation, and military and government markets.

PolySwarm

PolySwarm

PolySwarm is a crowdsourced threat intelligence marketplace that provides a more effective way to detect, analyze and respond to the latest threats.

Iolo

Iolo

Iolo develops patented technology and award-winning software that repairs, optimizes, and protects computers, to maximize system speed and performance while keeping them safe.

Ultima

Ultima

Ultima are on a mission to help businesses unlock their true potential by using the right IT to protect your company’s revenue and reputation – 24/7.

Ivolv Cybersecurity

Ivolv Cybersecurity

Ivolv is here to assist your organization in building effective protection and resilience against cyber attacks.