BUSINESS > Services > Financial


« Back to News

2015-08-04

Identity Access Management: Lessons From JPMorgan’s Insider Breaches

Another JPMorgan Chase & Co. employee arrested on charges of stealing customer data & trying to sell it for thousands of dollars.

2015-08-04

Disclosure: Internet companies Face UK Tax Crackdown

Internet companies may have to disclose information on people & businesses that sell goods and services online.

2015-07-24

Five Arrested in JPMorgan Hacking Case

Stock price manipulation and an illegal Bitcoin exchange.

2015-07-21

RBS Under Pressure over New IT Failure

Fintech problems throw doubt on the capability of the banks’ ageing technology systems.

2015-07-16

New Case Highlights Deep Hole in Cyber Insurance

Mistake Exclusion means a failure to maintain adequate data security can turn out to be very costly.

2015-07-16

Bitcoins Berlin Launch for Cashless Greeks

Greek bank customers are limited to a 40 Euros cash withdrawal per day.Maybe Bitcoin will come in useful.

2015-07-07

U.S. Government Support Insurers Protection from Cyber Hacks

The U.S government has the backs of insurers & their clients as they adapt to the fast-evolving threat of cyber attacks,

2015-07-06

Is The Tech Investment Bubble About To Burst ?

Is the tech industry is in denial about looming threats? There are sufficient indicators for those willing to open their eyes.

2015-06-30

Financial Institutions Face Increasing Cyber Attacks

Going Under: Cyber attacks on financial institutions are relentless in their frequency and severity.

2015-06-23

Financial Services Firms Stare into the Abyss as Data Breaches Rocket

The UK Information Commissioner’s Office reports 791 breaches in this sector between 2012 and 2014, including 585 in 2014 alone.

2015-06-22

Cyber Insurers Won’t Cover Data Breach

Insurers can decline to pay out over inadequate cybersecurity.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Okta

Okta

Okta is an enterprise-grade identity management service, built from the ground up in the cloud to address the challenges of a cloud-mobile-interconnected world.

UK Cyber Security Forum

UK Cyber Security Forum

UK Cyber Security Forum is a community interest group for cyber security companies in the UK.

DXC Technology

DXC Technology

DXC Technology helps global companies run their mission critical systems and operations while modernizing IT, optimizing data architectures, and ensuring security and scalability.

FTAPI Software

FTAPI Software

FTAPI SecuTransfer is a software solution for end-to-end encrypted data exchange of large and sensitive data with customers and partners.

Center for Research on Scientific & Technical Information (CERIST)

Center for Research on Scientific & Technical Information (CERIST)

CERIST is a scientific and technical research centre with activities focused in the area of networks, information systems and IT security.

CYQUEO

CYQUEO

CYQUEO is your professional partner and system integrator. We secure your organization against advanced cyber threats.

Secon Cyber Security

Secon Cyber Security

Secon Cyber Security is an Advanced Managed Security Services Provider with long standing experience of providing cyber security solutions to customers ranging from small to large enterprises.

Onsist

Onsist

Onsist brand protection services provide proactive defense against fraudulent use of your brand online.

NOW Insurance

NOW Insurance

NOW Insurance provides small business owners and other professional classes with a seamless purchasing experience for general liability, professional liability, and cybersecurity insurance coverage.

Devolutions

Devolutions

Devolutions make best-in-class Privileged Access Management, Password Management, and Remote Connection Management solutions available to ALL organizations — including SMBs.

LogicMonitor

LogicMonitor

LogicMonitor provides SaaS-based IT infrastructure monitoring services for on-premises and multi-cloud environments.

Framework Security

Framework Security

With Framework Security, you get more than a consultancy; you get a partner dedicated to simplifying cybersecurity and protecting your business in the most efficient way possible.

Buzz Cybersecurity

Buzz Cybersecurity

Buzz Cybersecurity systems and services are designed to proactively guard against common and uncommon cyber threats.

Rootly

Rootly

Rootly is an incident management platform on Slack that helps automate manual admin work during incidents.

FearsOff

FearsOff

FearsOff is a global information security company serving clients worldwide. White hat operators with a black hat mindset to emulate real world attacks and everchanging threat vectors.

Internet Watch Foundation (IWF)

Internet Watch Foundation (IWF)

Since the early days of the internet, our job has been to help child victims of sexual abuse by hunting down and removing any online record of the abuse.