BUSINESS > Services > Transport & Travel


« Back to News

2019-04-11

The Maritime Shipping Industry Should Be On Red Alert

There is widespread concern that the maritime industry remains vulnerable and is not doing enough to protect itself from cyber criminals.

2019-03-27

NASA’s Poor Cybersecurity Is An Operational Threat

Serious deficiencies in NASA’s information security program include inaccurate data in system security plans and delays in control assessments.

2019-03-20

Car Hacking & Data Collection

The amazing driver-assist mechanisms and must-have infotainment systems in many new cars are raising big concerns about safety and privacy.

2019-03-01

Sydney Airport Steps Up Cybersecurity

Sydney Airport is preparing to establish a cyber security operations centre to protect its systems and data holdings from the threat of cyber attack.

2019-03-06

Blockchain’s Newest Application Is Civil Aviation

Blockchain networks and smart contracts can help mitigate some of the most difficult security issues in the aviation industry.

2019-01-30

Denmark's Maritime Cybersecurity Plan Highlights Financial Threats

Denmark's cybersecurity strategy classifies financial threats to the maritime sector from cyber criminals 'very high' compared to terrorist threats.

2019-01-09

Drones Interrupt International Flights

Drone sightings cause confusion at two of London's international airports and it is not clear who is responsible for the intrusions.

2019-01-09

NASA Discloses A Data Breach

NASA has admitted recently to getting hacked in 2018 although they say they still dont know the number employees affected.

2019-01-07

Optimising Maritime Cybersecurity

Modern vessels have multiple, complex technologies. Now, both onboard and shoreside crews can monitor each ship and an entire fleet

2018-12-14

Waymo Is First With Driverless Car Service

Waymo is reportedly planning to launch the world’s first commercial driverless car service this month (December 2018).

2018-12-03

Marriott Hack- 500m Data Records Exposed

Hackers exfiltrated data on 500m customers, thought to include payment card details, name & address, along with the system encryption keys.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ZDL Group

ZDL Group

At ZDL (formerly ZeroDayLab) we take a comprehensive view of our clients cyber security risks and provide quality services to address those risk

QASymphony

QASymphony

QASymphony software testing and QA tools help companies create better software by improving speed, efficiency and collaboration during the testing lifecycle.

Detectify

Detectify

Detectify is a web security service that simulates automated hacker attacks on your website, detecting critical security issues before real hackers do.

Brainloop

Brainloop

Brainloop's security architecture enables you to work on and distribute strictly confidential documents both within and beyond the firewall.

QOMPLX

QOMPLX

QOMPLX integrate, contextualize, and analyze data from virtually any source to help you identify operational risk and inefficiencies throughout the enterprise.

Salient Law

Salient Law

Salient Law is a virtual law firm that specialises in advising providers and users of technology on contracts involving technology.

Global Cyber Security Capacity Centre (GCSCC) - Oxford University

Global Cyber Security Capacity Centre (GCSCC) - Oxford University

GCSCC's work is focused on developing a framework for understanding what works, what doesn’t work and why – across all areas of cybersecurity capacity.

Carve Systems

Carve Systems

Carve Systems was founded to bring enterprise level information security, training, and risk management services to organizations of any size and industry.

ThreatReady Resources

ThreatReady Resources

ThreatReady reduces an organization’s risk by delivering cyber security awareness training based on the latest, state-of-the-art learning science to effectively drive long-term cyber-safe behavior.

QuoIntelligence

QuoIntelligence

QuoIntelligence experts can help your team understand the evolving cyber threats and provide simple yet comprehensive recommendations so you can focus on what matters.

Nitel

Nitel

Nitel is a leading next-generation technology services provider. We simplify the complex technology challenges of today’s enterprises to create seamless and integrated managed network solutions.

Diversified Technical Services Inc. (DTSI)

Diversified Technical Services Inc. (DTSI)

DTSI provides a wide range of technology solutions for Federal Agencies, the Department of Defense, and commerical organizations with capabilities including Cyber Security and DevSecOps.

Reken

Reken

Reken are building a new type of AI platform and products to protect against generative AI threats.

Averlon

Averlon

Averlon offers organizations peerless cloud security through Panoptic Cloud Visibility, Predictive Attack Intelligence and Rapid Remediation.

Secur-Serv

Secur-Serv

Secur-Serv is a security-first managed services provider. We provides Managed IT, Managed Print, Managed Device, and Cybersecurity services to companies of every size.

MergeBase

MergeBase

Reduce software supply chain risk with MergeBase proven Software Composition Analysis (SCA).