BUSINESS > Services > Financial


« Back to News

2018-12-07

What Makes Blockchain A New Security Standard?

As efforts to standardize the technology progress, blockchain could become a new security standard for many industries. By Mary Ann Callahan

2018-11-30

A Cyber Attack Could Spark A Run On Banks

Attacks can cause systemic problems unless Government works with banks to coordinate crisis communication to ensure consistent messages.

2018-11-30

Barclays Fights Off Cyber-Attacks Daily

Barclays Bank fights off attacks from cyber criminals every single day, according to the head of the bank’s cyber security operations centre.

2018-11-28

Faster Blockchain For Financial Institutions

Blockchain technology is becoming increasingly integrated into the mainstream finance industry, beyond the popular crypto-currency market.

2018-11-22

Shush... Russian Banks Under Phishing Attack

Banks in Russia are the target of a massive phishing campaign that aimed to deliver a tool used by the Silence group of hackers.

2018-11-06

Lloyds Bank Is Replacing Customer Debit Cards After Cyber Attacks

Fraud: The UK bank is going to reissue debit cards to all customers that have made purchases on the British Airways and Ticketmaster websites.

2018-10-23

How Cyber Criminals Are Using Social Media To Hack Bank Accounts

Criminals use social media to check when customers are contacting banks about problems to then pose as the bank to hack people's data.

2018-10-11

Robotics Will Soon Become Mainstream In Finance

Robotic Process Automation will be adopted by nearly 3 in 4 Financial Controllers by 2020, according to new research by Gartner.

2018-10-09

Financial Sector Breaches Soar Despite Heavy Security Spending

Banks and other financial firms have disclosed three times as many breaches so far this year than they did in 2016, say the experts at Bitglass.

2018-10-09

How Cyber Attackers Stole £2.26m From Tesco Bank Customers

Poor debit card security and a "series of errors" in reporting exacerbated an incident that could have been easily avoided.

2018-10-03

Scammers Steal Half-a-Billion Pounds From UK Bank Customers

Over £500m was stolen from UK bank customers in H1 of 2018 and most it was lost to transactions made without account holders' authorisation.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

PFP Cybersecurity

PFP Cybersecurity

PFP provides a SaaS solution for life-cycle protection based on our IoT security platform and power usage analytics.

Lares Consulting

Lares Consulting

Lares is a security consulting firm that helps companies secure electronic, physical, intellectual, and financial assets through a unique blend of assessment, testing and coaching.

Picus Security

Picus Security

Huge gaps often exists between the "perceived"​ and "actual"​ IT security level of an organization. Picus Security continuously assesses security controls and reveals deficient ones before hackers do.

CSIRT GOV - Poland

CSIRT GOV - Poland

Computer Security Incident Response Team CSIRT GOV, run by the Head of the Internal Security Agency, acts as the national CSIRT responsible for coordinating the response to computer incidents.

Procsima Group

Procsima Group

Procsima Group was created to help you achieve good IT management and security excellence.

IAmI Authentications

IAmI Authentications

IAmI is a first in Tokenization Cloud-based IAM Security Services, delivering the most advanced form of Two-Factor Authentication.

Intel Capital

Intel Capital

Intel Capital, Intel's strategic investment organization, backs innovative technology startups and companies worldwide. We invest in a broad range of hardware, software, and services.

Tehtris

Tehtris

TEHTRIS XDR Platform was developed to control and improve the IT security of private and public companies against advanced cyber threats such as cyber espionage or cyber sabotage activities.

Eaton

Eaton

Eaton provides comprehensive cybersecurity services for operational technology (OT) to help keep your operations and personnel safe.

Gijima

Gijima

Gijima is one of SA’s leading ICT companies in Cloud & Outsourcing, Systems integration, Human Capital Management & Training, Cybersecurity, and Unified Communications.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Nigerian Communications Commission (NCC)

Nigerian Communications Commission (NCC)

NCC has established a CSIRT for the telecommunication industry to provide services and support for the prevention and management of potential cyber security related emergencies.

Iris Powered by Generali

Iris Powered by Generali

Iris Powered by Generali is an identity theft resolution provider. Our offering combines expert assistance and support with user-friendly identity protection technology.

Hush

Hush

Hush is a premium privacy service that gives people unprecedented visibility and control of their digital footprint. Hush assesses threats, and goes to work to eliminate digital risks on your behalf.

Saffron Networks

Saffron Networks

Saffron Networks is an ISO-certified company. We assure our clients of reliable solutions, specifically with the Security landscape and Enterprise Networking.

Network Coverage

Network Coverage

Network Coverage align, maintain, and integrate technology and cloud solutions with business operations to improve productivity and security with as few issues and disruptions as possible.