BUSINESS > Services > Financial


« Back to News

2023-02-10

Specialist Marine Cyber Insurance For Ports & Vessels

Shipping Vulnerable To Cyber Attack: A new partnership to deal with the ever more demanding cyber insurance needs of the maritime sector.

2023-02-02

Ransom Attack On Financial Services Software Supplier 

Ransom Attack: A key supplier of trading software to the City of London with a vital role in the trading of debt, derivatives & shares worldwide.

2023-01-20

Europol Arrest Crypto Currency Fraud Gang

The fraud worked using advertisements posted on social media to lure victims to fake investment websites operated by cyber criminals.

2023-01-11

Crypto Currency: From Bitcoin to Blockchain

Everyone Understands Crypto Currency - Or Do They? As the market dives, everything you need to know about crypto, but were afraid to ask.

2022-12-12

The Current Market For Cyber Security Founders & Investors

Strong IP, sustainable growth potential and a large defined addressable market will help start-ups to grow & prosper. By Damien Henault

2022-11-08

Medibank Won’t Pay Ransom

Critical Health Insurance Data: 9.7 million current and former customer names, dates of birth, phone numbers and email addresses stolen.

2022-10-11

Average Cost Of A Cyber Attack Increases By 80%

Cyber threats are the dominant risk for US businesses with the median cost of a cyber attack costing $18,000, up from $10,000 last year. 

2022-09-27

Securing The Future Of Open Finance

Financial-Grade Security: The adoption of Open Banking raises critical cyber security concerns over outdated systems. By Jacob Ideskog

2022-09-01

Digital Banking & Cyber Crime

Digital banks face rapidly escalating threats as technological developments in cyber crime make it easier than ever for financial criminals. 

2022-08-29

Insurers Will Exclude Some Nation-State Cyber Attacks From Cover

Lloyd's of London will cease offering insurance cover against certain types of nation-state cyber attacks and wars from March 2023.

2022-08-25

Think Carefully Before You Pay For Cloud Downtime Insurance

Considering Buying Cloud Downtime Insurance? Before you buy, take these three vital steps to ensure business continuity. By Florian Malecki

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Maureen Data Systems (MDS)

Maureen Data Systems (MDS)

Our mission at Maureen Data Systems is to digitally transform business environments with the use of cloud infrastructure, security and privacy controls, data analytics, and managed services.

FIDO Alliance

FIDO Alliance

FIDO Alliance is a non-profit organization formed to address the lack of interoperability among strong authentication devices.

ABB

ABB

ABB is a pioneering technology leader in industrial digitalization. Services include cyber security for industrial control systems IoT.

Logsign

Logsign

Logsign is a Security Orchestration, Automation and Response (SOAR) platform with next-gen Security Information and Event Management (SIEM) solution.

TechVets

TechVets

TechVets is a non-for-profit helping UK veterans and service leavers retrain into Cyber Security and Technology jobs.

ITRecycla

ITRecycla

ITRecycla are specialists in the protection of sensitive computer data by data destruction, re-marketing of reusable computer equipment, computer recycling and disposing of electronic e-waste.

White & Black

White & Black

White & Black are specialist corporate & technology lawyers based in London & Oxford.

Reflectiz

Reflectiz

Reflectiz empowers digital businesses to make all web applications safer by non-intrusively mitigating any website risks without a single line of code.

Buchanan & Edwards

Buchanan & Edwards

Buchanan & Edwards delivers forward-focused technology solutions that help our clients transform the way they perform their missions.

eCentre@LindenPointe

eCentre@LindenPointe

The eCenter@LindenPointe provides assistance to the development, management and promotion of STEM (Science, Technology, Engineering, Mathematics) related business ventures.

Artifice Security

Artifice Security

Artifice Security will demonstrate real-world attacks on your network, web applications, infrastructure, and personnel to expose your hidden security risks.

Anchor Technologies Inc (ATI)

Anchor Technologies Inc (ATI)

Anchor provides a full spectrum of cybersecurity services assisting our clients with all aspects of cybersecurity risk planning, identification, management, and monitoring.

eMudhra

eMudhra

eMudhra is a leader in Identity and Transaction Management Solutions.

Data Computer Services

Data Computer Services

Data Computer Services provides professional tailored IT Support and IT Services for businesses throughout Edinburgh and the Lothians.

Cyber Defense International (CDI)

Cyber Defense International (CDI)

At CDI, we utilize decades of experience in designing and building large-scale cybersecurity programs, creating tailored solutions and services that protect businesses from cyber threats.

Sublime Security

Sublime Security

Sublime is an adaptive email security platform that combines best-in-class effectiveness with unprecedented visibility and control.