BUSINESS > Services > Transport & Travel


« Back to News

2018-09-18

The BA Hack And How Not To Respond To A Cyber Attack

There have been poor responses to cyber attacks on major companies before, but the airline’s actions could be one of weakest in recent history.

2018-09-14

How Hackers Skipped Through BA’s Security

Researchers from the threat detection firm RiskIQ shed new light on how attackers pulled off the theft of 380,000 customer transaction records from BA.

2018-09-17

Embracing The AI Robot Revolution

Relax. Robotics expert Prof. Noel Sharkey says robotics is about convenience and customers service, not an existential threat.

2018-09-12

British Airways Faces £Multimillion Fine

BA faces a fine of up to £500 million from the Information Commissioner for the breach of GDPR rules caused by a massive hack of customer data.

2018-09-10

British Airways Data Breach

Under the newly enforced GDPR rules BA could face potentially significant fines from the UK ICO for a data breach affecting 380,000 transactions.

2018-09-07

British Airways Fake Facebook Page

The bogus “British Airways Holidays”page steals personal data by claiming you can win holidays and free air travel by clicking a “Sign Up” button.

2018-08-16

Hacking Your Holiday: Cyber Criminals Target Tourism

Last year there were 3.9 billion malicious login attempts on sites belonging to airlines, cruise lines, hotels, travel, car rental & transport organisations.

2018-08-15

Cybersecurity In Self-Driving Cars

There are a broad range of cybersecurity challenges that must be overcome before autonomous and connected vehicles can be widely adopted.

2018-07-31

COSCO Cyber Attack And The Importance Of Maritime Cybersecurity

COSCO shipping has been at the receiving end of a cyber attack that saw its operations being hit across the world.

2018-07-25

Dubai Launches First Standard For Driverless Cars

Dubai plans to transform 25 percent of its transport system to autonomous mode by 2030 and is setting new guidelines for self-driving vehicles.

2018-07-17

For Sale: Access To Airport Security

Cybercriminals are offering stolen access to airport security systems including transit, surveillance & building automation systems for only $10.

Quartz Conference
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / Zero Trust Network Access Guide

Perimeter 81 / Zero Trust Network Access Guide

Curious how you can Implement a Zero Trust roadmap with insights from Gartner? Download this free report for a limited time only.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Blue Frost Security

Blue Frost Security

Blue Frost Security provides high-level IT security consulting, penetration testing services, ISO 27001 Solutions, PCI compliance solutions and training.

DriveLock

DriveLock

Our security solution is designed to prevent external attacks, which are evermore sophisticated as well as monitor, document and even prevent internal incidents.

Prim'X Technologies

Prim'X Technologies

Prim'X Technologies provides information protection solutions to prevent unauthorised access to sensitive data.

CyberDef

CyberDef

CyberDef is a consulting company specialising in cyber defence services for small and medium enterprises.

Cybercrypt

Cybercrypt

Cybercrypt is a world leading system provider in robust cryptography. Protecting critical assets, applications and sensitive data.

CyberVista

CyberVista

CyberVista is a cybersecurity training education and workforce development company. Our mission is to eliminate the skills gap by creating job ready professionals.

Picus Security

Picus Security

Huge gaps often exists between the "perceived"​ and "actual"​ IT security level of an organization. Picus Security continuously assesses security controls and reveals deficient ones before hackers do.

Applied Security (APSEC)

Applied Security (APSEC)

APSEC provides products and services in the areas of encryption, digital signature, authentication and data loss prevention.

Seqrite

Seqrite

Seqrite offers a highly advanced range of enterprise and IT security solutions to protect your organization's most critical data.

Jazz Networks

Jazz Networks

Jazz Networks provides user behavior analytics (UBA UEBA) and data loss prevention (DLP) cybersecurity software to prevent the insider threat.

Vehere

Vehere

Vehere specialises in mission critical signals aquisition and analytics platform and cyber defence systems.

Macomb-OU Incubator

Macomb-OU Incubator

Macomb-Oakland University Incubator supports startup and emerging companies in the niche industries of defense, homeland security, advanced manufacturing and technology.

IoT Cybersecurity Alliance

IoT Cybersecurity Alliance

IoT Cybersecurity Alliance is where industry-leading IoT security providers and top IoT experts come together to establish and share best practices to secure the IoT ecosystem for the good of all.

Quantum Armor

Quantum Armor

Quantum Armor is a next-gen cyber security monitoring platform that allows you to continuously stay aware of your security posture, and proactively spot trends, vulnerabilities and potential attacks.

Have I Been Pwned (HIBP)

Have I Been Pwned (HIBP)

Have I Been Pwned is a free resource for anyone to quickly assess if they may have been put at risk due to an online account of theirs having been compromised or "pwned" in a data breach.

Luta Security

Luta Security

Luta Security implements a holistic approach to advance the security maturity of governments and organizations around the world.