• NEWS

    NEWS

    THE LATEST NEWS, DEVELOPMENTS AND ANNOUNCEMENTS AS THEY HAPPEN

    more
  • EVENTS

    EVENTS

    CONFERENCES, TRADE SHOWS, LIVE WEBCASTS, NEW LAUNCHES, SEMINARS AND TRAINING EVENTS

    more
  • COMPANIES

    COMPANIES

    PARTNERS, SOLUTIONS & SERVICE PROVIDERS, SUPPLIERS AND INDUSTRY ORGANIZATIONS

    more
  • RESOURCES

    RESOURCES

    WHITEPAPERS, MARKET REPORTS, RESEARCH, ON-DEMAND WEBINARS, VIDEOS AND INFOGRAPHICS

    more

NEWS

   

    home.aspx
  • Locky Skyrockets Up Global Malware Rankings

    Check Point’s latest Global Threat Impact Index revealed a major Locky campaign in September, making the ransomware the world’s second most-used malware and impacting 11.5% of organization...


    READ MORE
    https://www.infosecurity-magazine.com/news/locky-skyrockets-up-global-malware/4648
  • Phishing Gambit Tailors Malware to Location

    According to PhishMe analysis, on September 28 threat actors used a phishing narrative that claimed to deliver a scanned document needing the recipient's attention. Attached to the message was a ....


    READ MORE
    https://www.infosecurity-magazine.com/news/phishing-gambit-tailors/4649
  • Android Trojan Infrastructure Serves Fake Adobe Flash Apps

    The recently discovered Red Alert 2 Android Trojan is using an infrastructure that serves fake Adobe Flash Android apps to unsuspecting users, RiskIQ has discovered. The threat was first detailed last...


    READ MORE
    http://www.securityweek.com/android-trojan-infrastructure-serves-fake-adobe-flash-apps4644
  • Bug Caused Microsoft Outlook to Send Emails in Cleartext

    A vulnerability that that was recently addressed by Microsoft as part of the October 2017 Patch Tuesday could result in Outlook sending emails in cleartext when S/MIME encryption was supposed to be us...


    READ MORE
    http://www.securityweek.com/bug-caused-microsoft-outlook-send-emails-cleartext4645
  • Data Breach Notification Most Clicked Subject in Phishing Tests

    The most common subject line to get an employee’s attention and act to click relates to data breaches. According to the top 10 global phishing email subject lines for Q3 2017 by KnowBe4, examini...


    READ MORE
    https://www.infosecurity-magazine.com/news/data-breach-notification-phishing/4640
  • Hacking the Election: Security Flaws Need Fixing, Researchers Say

    Hackers could have easily infiltrated US voting machines in 2016 and are likely to try again in light of vulnerabilities in electronic polling systems, a group of researchers said Tuesday.


    READ MORE
    http://www.securityweek.com/hacking-election-security-flaws-need-fixing-researchers-say4635
  • Iranian Cyberspies Use New Trojan in Middle East Attacks

    A cyberespionage group previously linked to Iran has been using a new Trojan in attacks aimed at entities in the Middle East, Palo Alto Networks reported on Monday. The threat actor, known as OilRig, ...


    READ MORE
    http://www.securityweek.com/iranian-cyberspies-use-new-trojan-middle-east-attacks4637
  • Latest ATM Malware is Lightweight and Simple

    The image of an ATM spewing out cash is a bank’s worst nightmare, but Kaspersky Lab researchers have discovered new malware that does just that. It’s the latest in a long line of cash mach...


    READ MORE
    https://www.infosecurity-magazine.com/news/latest-atm-malware-is-lightweight/4641
  • Half of ITDMs: Cybersecurity Still Not a Top Priority for the Board

    Almost half of IT decision makers (ITDMs) think members of the board still do not consider cybersecurity to be a top priority, according to findings from Fortinet’s Global Enterprise Security Su...


    READ MORE
    https://www.infosecurity-magazine.com/news/tdms-cybersecurity-not-top/4631

EVENTS

Conferences

Cyber Security Chicago

CYBER SECURITY CHICAGO

October 18-19, 2017
Chicago offers invaluable security insight for both IT managers & security decision makers. Hear from industry experts on how you can build stronger defenses against cyber-attacks & how to recover if your systems are breached.

BSides Calgary

BSIDES CALGARY

October 19-20, 2017
BSides Calgary is a two-day gathering for information security professionals, hackers, coders and the greater tech community. During the conference, attendees will share, discuss and learn about information security, privacy and technology in Calgary.

13th Cyber Security Conference UISGCON

13TH CYBER SECURITY CONFERENCE UISGCON

October 20-20, 2017
UISGCON Conferences are annual events where cyber security services providers meet their potential and cuerrent customers; Among UISGCON audience there are many pople who consider this industry important and interesting, who is interested to discuss current cybersecurity trends with experts, and to ...

Industrial Control Systems (ICS) Cyber Security Conference

INDUSTRIAL CONTROL SYSTEMS (ICS) CYBER SECURITY CONFERENCE

October 23-26, 2017
As the largest and longest-running cyber security-focused conference for the industrial control systems sector, the event caters to the energy, utility, chemical, transportation, manufacturing, and other industrial and critical infrastructure organizations, including the military. The conference wil...

SAINTCON Security Conference

SAINTCON SECURITY CONFERENCE

October 10-13, 2017
SAINTCON is the premiere cyber security conference of the intermountain-west. The conference is presented by Jup1t3r and the UtahSAINT Organization. Originally designed to provide security training to Utah based public entities. Today the conference has grown into a large gathering of security profe...

NATIONAL INFORMATION SECURITY CONFERENCE

NATIONAL INFORMATION SECURITY CONFERENCE

October 11-13, 2017
Now in its 18th year, the National Information Security Conference (NISC) provides insight into the most up-to-date cyber security trends, risks and defence strategies. Cyber security no longer falls under the remit of the IT Manager. High profile security breaches such as Talk-Talk and Tesco have h...

MANUSEC: Cyber Security for Critical Manufacturing

MANUSEC: CYBER SECURITY FOR CRITICAL MANUFACTURING

October 11-12, 2017
As the manufacturing sector continues to embrace innovation in technology, it exposes itself to a widening array of cyber threats. To properly face cyber risk in the 21st century, organisations must fully engage all levels from the executive board down, to collaborate and establish best practice pol...

IEEE Conference on Communications and Network Security

IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY

October 09-11, 2017
The city of Las Vegas, Nevada will host the 5th Annual IEEE CNS from 9-11 October 2017.More Connection, Better Protection has been announced as the theme of the conference.Indrajit Ray and Sencun Zhu have been selected as conference general chairs.Moti Yug and Yanchao Zhang will serve as program cha...

 

Webinars

OCT 19, 2017 | 1:00 PM-2:00 PM
CYBERSECURITY IN THE WORKPLACE IS EVERYONE’S BUSINESS
Creating a culture of cybersecurity is critical for all organizations. Join the conversation with our own security pros to learn how they keep employees ahead of phishing attacks, share best practices for phishing education and explain how to use innovative technologies to strengthen cyber...
OCT 19, 2017 | 1:00 PM-2:00 PM
FILELESS CYBER ATTACKS DEMYSTIFIED
From attacks that abuse PowerShell to attacks that live exclusively in memory, “fileless” threats have become increasingly common and dangerous. They’re built to evade detection from even the most advanced defenses, but that doesn’t mean they can’t be stopped ...
OCT 25, 2017 | 1:00 PM-2:00 PM
A DATA SECURITY SURVIVAL GUIDE IN AN INTERCONNECTED WORLD
As the number of internet-connected devices skyrockets into the billions, a data security strategy is an increasingly important part of any organization’s ability to manage and protect critical information. Enterprises are migrating to the cloud in droves, however, protecting data in...
OCT 26, 2017 | 10:30 PM-11:30 PM
HOW TO STAY SAFE FROM CYBER SECURITY BREACHES?
Asia Pacific has recently seen numerous changes to legislation and regulations as governments attempt to come to grips with the risks posed by cyber security breaches. In particular, the strengthening of data privacy laws which are increasingly requiring organizations to disclose, within a...
OCT 31, 2017 | 14:00
DON'T LET UNEXPECTED PHISHING GIVE YOU THE FRIGHT OF YOUR LIFE!
Phishing emails are one of the oldest forms of online scams and now far from the days of promises of riches from foreign royalty, Business Email Compromise has emerged as one of the main threats to business security as the tactics are simple with evidence showing that this can reap fraudul...
OCT 31, 2017 | 10AM
IMPLEMENTING THE NIST CYBERSECURITY FRAMEWORK SHOULDN’T BE SCARY
According to Gartner, “The NIST Cybersecurity Framework is an absolute minimum of guidance for new or existing cybersecurity risk programs, and is a legal framework for aligning IT to OT security.”
GETTING STARTED WITH WEB APPLICATION SECURITY
Sponsored
Chances are, at any given moment, your organization's web applications are under attack (if not already exploited). Attackers see web applications as the front door: just one vulnerability allows them entry - perhaps to the database supporting the web application or maybe to your busin...
BUSINESS EMAIL MASQUERADING: HOW HACKERS ARE FOOLING EMPLOYEES TO COMMIT FRAUD
In the past year, so-called business email compromise attacks, also known as "masquerading" and "executive impersonation," have emerged as one of the greatest wire fraud worries. These schemes threaten to overshadow what was previously seen from commercial account takeover incidents.
TOP TRENDS AND TAKE-AWAYS FOR CYBERSECURITY
Cybersecurity continues to be one of the top concerns of organizations, even more so as complexity and threats increase. What are the key trends in 2015 for cybersecurity, and what steps can leaders take to prepare? What is the current state of cybersecurity threat and response? What are t...
A COMPREHENSIVE GUIDE TO CONNECTEDNESS WITH TRUST, SECURITY AND ETHICS IN THE DIGITAL BUSINESS
Trust is the foundation of all personal and business transactions. But who can you trust in digital business, with its endless connections and constantly shifting configurations? Trust is hard enough when it's personal, but how do you trust and be trusted when dealing with a multitude ...
WHAT EVERY CIO SHOULD KNOW ABOUT SECURITY, RISK AND VALUE
Although cybersecurity climbs back up the priority list and engaging risk is central to your success in digital business, the risk conversation is changing between you and non-IT executives. You have to balance the need to protect and the need to run your business. Integrating risk and cor...
ONE SIMPLE WAY TO GET YOUR CEO TO EMBRACE RISK MANAGEMENT
Most CEOs or other senior business executives cringe at the thought of having to meet with risk management professionals. By their very nature, CEOs are hard-wired to seek out growth opportunities that will add value to their companies. However, risk management professionals are tasked wit...

RESOURCES

To be fair, its method of assessing the security of operating systems is somewhat bunk. It sets a figure based on the number of vulnerabilities found rather than the importance of those vulnerabilitie...

IT security has gone through major changes. Enterprises today are facing a rapid expansion of diverse users, along with an influx of applications, device types, APIs, and microservices, all while navi...

The Regulation updates and modernises the principles enshrined in the 1995 Data Protection Directive to guarantee privacy rights. It focuses on: reinforcing individuals’ rights, strengthening th...

Cloud applications, big data, unified communications and real-time video demand an enormous amount of bandwidth and have a large impact on the company network. This whitepaper describes how you can gu...

As your online business expands, the individual user experience is one of the most important factors for building audience satisfaction and driving revenues. But whether you are delivering videos, web...

Organizations are in a perfect storm that is the result of an evolving threat landscape combined with the inefficiencies of many security technologies and programs, made worse by the shortage of skill...

Virtualization is the creation of a logical rather than an actual physical version of something, such as a storage device, hardware platform, operating system, database or network resource. The usual ...

Do you know how to protect your organization from ransomware threats? In this infographic, get the facts and start your protection plan. Can you answer these four data security questions? What is rans...

The Disaster Recovery 101 guide will help you learn about DR from the ground up and assist you in making informed decisions when implementing your DR strategy, enabling you to build a resilient IT inf...