HOW CAN THE FINANCIAL SERVICES SECTOR PROTECT AGAINST PRIVILEGED ACCOUNT BREACHES?

April 25, 2019

The incoming chief of New York’s top financial services regulator called cybersecurity “the number one threat facing all industries and governments globally” during a speech in April 2019 at the Association of the Bar of the City of New York. Cyber-attacks also cost financial services firms more to address than firms in any other industry at $18 million per firm (vs. $12 million for firms across industries).

Spotlight

Mantix4

Mantix4 technology development began in 2011 by a team of defense intelligence, cyber security, and military experts who recognized the need to help enterprise organizations and government agencies manage and protect their critical assets against emerging cyber threats. Mantix4’s M4 Cyber Threat Hunting Platform was originally developed in 2011 by a team of defense intelligence, cyber security, and military experts. The technology was purpose-built to reduce the complexity of their current infrastructure and give their security team real-time, actionable data to prevent and manage emerging cyber threats. Mantix4’s revolutionary technology bridges the large visibility gap left by traditional security technologies”.

Other Infographics
news image

What is phishing? How this cyber attack works and how to prevent it

Infographic | February 12, 2020

Phishing is a cyber attack that uses disguised email as a weapon. The goal is to trick the email recipient into believing that the message is something they want or need — a request from their bank, for instance, or a note from someone in their company — and to click a link or download an attachment. What really distinguishes phishing is the form the message takes: the attackers masquerade as a trusted entity of some kind, often a real or plausibly real person, or a company the victim might do business with. It's one of the oldest types of cyberattacks, dating back to the 1990s, and it's still one of the most widespread and pernicious, with phishing messages and techniques becoming increasingly sophisticated.

Read More
news image

Who is behind cyber attacks?

Infographic | January 2, 2020

Regardless of the size or type of organisation you work for, it's important to understand why you might be vulnerable to cyber attack, and how to defend yourself. The advice summarised below is applicable to your working life and your home life. You should also familiarise yourself with any cyber security policies and practices that your organisation has already put in place.

Read More
news image

The Booming Information Security Industry

Infographic | August 26, 2021

The information security industry is expected to exhibit tremendous growth in 2021. The key drivers of this growth are increased spending on cybersecurity services and the rising demand for cloud security. According to Gartner, the 2021 information security and risk management spending is anticipated to grow almost 2X from the previous year.

Read More
news image

Infographic: Is Your Software Vulnerable to Cybercrime

Infographic | February 13, 2020

Third-party support and self-maintenance can’t protect youthe real solution is at the source. Don’t be fooled by third-party support providers and self-maintenance security methods. Security patching is essential for securing enterprise software, including Oracle’s. If you don’t own the code, you can’t access or update it. That leaves your software open to attack and your business open to risk.

Read More
news image

Cybersecurity: main and emerging threats in 2021

Infographic | January 27, 2022

The progress of digital transformation has inevitably led to new cybersecurity threats. Cybercriminals take advantage of the Covid-19 pandemic, in particular by targeting organisations and companies working remotely. Parliament has adopted its position on a new EU directive that reflects how cybersecurity threats have evolved and introduces harmonised measures across the EU, including on the protection of essential sectors.

Read More
news image

Cyber Security What Makes a Strong Password

Infographic | December 1, 2019

The frustration of a forgotten password can be just too much to bear. Why not go with “Charles 15” or “my password”? because cybercrime is so prevalent. If you want your bank account to still have your money in the morning, you’d better strengthen your password.

Read More

Spotlight

Mantix4

Mantix4 technology development began in 2011 by a team of defense intelligence, cyber security, and military experts who recognized the need to help enterprise organizations and government agencies manage and protect their critical assets against emerging cyber threats. Mantix4’s M4 Cyber Threat Hunting Platform was originally developed in 2011 by a team of defense intelligence, cyber security, and military experts. The technology was purpose-built to reduce the complexity of their current infrastructure and give their security team real-time, actionable data to prevent and manage emerging cyber threats. Mantix4’s revolutionary technology bridges the large visibility gap left by traditional security technologies”.

Events