• NEWS

    NEWS

    THE LATEST NEWS, DEVELOPMENTS AND ANNOUNCEMENTS AS THEY HAPPEN

    more
  • EVENTS

    EVENTS

    CONFERENCES, TRADE SHOWS, LIVE WEBCASTS, NEW LAUNCHES, SEMINARS AND TRAINING EVENTS

    more
  • COMPANIES

    COMPANIES

    PARTNERS, SOLUTIONS & SERVICE PROVIDERS, SUPPLIERS AND INDUSTRY ORGANIZATIONS

    more
  • RESOURCES

    RESOURCES

    WHITEPAPERS, MARKET REPORTS, RESEARCH, ON-DEMAND WEBINARS, VIDEOS AND INFOGRAPHICS

    more

NEWS

   

    home.aspx
  • Zyklon Malware Delivered via Recent Office Flaws

    A piece of malware known as Zyklon has been delivered by cybercriminals using some relatively new vulnerabilities in Microsoft Office, FireEye reported on Wednesday. Zyklon has been around since early...


    READ MORE
    http://www.securityweek.com/zyklon-malware-delivered-recent-office-flaws4781
  • Crypto-Mining Attack Targets Web Servers Globally

    A new malware family is targeting web servers worldwide in an attempt to ensnare them into a crypto-mining botnet, security researchers have discovered. Dubbed RubyMiner, the threat was discovered las...


    READ MORE
    http://www.securityweek.com/crypto-mining-attack-targets-web-servers-globally4783
  • Three-Quarters of Businesses Saw Phishing Attacks in 2017

    The war against phishing is still on, with 76% of organizations experiencing phishing attacks in 2017. Further, nearly half of information security professionals surveyed said that the rate of attacks...


    READ MORE
    https://www.infosecurity-magazine.com/news/threequarters-of-businesses/4785
  • Half Million Impacted by Four Malicious Chrome Extensions

    Four malicious Chrome extensions managed to infect over half a million users worldwide, including employees of major organizations, ICEBRG reports. The extensions were likely used to conduct click fra...


    READ MORE
    http://www.securityweek.com/half-million-impacted-four-malicious-chrome-extensions4777
  • "PowerStager" Tool Employs Unique Obfuscation

    A malicious tool that has managed to fly under the radar since April 2017 is showing great focus on obfuscation, in an attempt to evade detection, Palo Alto Networks warns. Dubbed PowerStager, the too...


    READ MORE
    http://www.securityweek.com/powerstager-tool-employs-unique-obfuscation4779
  • Simple Attack Allows Full Remote Access to Most Corporate Laptops

    Researchers have discovered a flaw in Intel's Advanced Management Technology (AMT) implementation that can be abused with less than a minute of physical access to the device. An Evil Maid attack c...


    READ MORE
    http://www.securityweek.com/simple-attack-allows-full-remote-access-most-corporate-laptops4774
  • Bad Botnet Growth Skyrockets in 2017

    According to the Spamhaus Botnet Threat Report 2017, the company’s malware division identified and issued Spamhaus Block List (SBL) listings for more than 9,500 botnet C&C servers on 1,122 d...


    READ MORE
    https://www.infosecurity-magazine.com/news/bad-botnet-growth-skyrockets-in/4776
  • VirusTotal Launches Visualization Tool

    VirusTotal this week announced the availability of a visualization tool designed to help with malware investigations. The tool should make it easier for investigators who are working with multiple rep...


    READ MORE
    http://www.securityweek.com/virustotal-launches-visualization-tool4770
  • Google Drive Exploited to Download Malware Directly from URL

    A vulnerability has emerged that allows hackers to automatically download malware to a victim’s computer directly from a Google Drive URL. Proofpoint uncovered the vulnerability and created a pr...


    READ MORE
    https://www.infosecurity-magazine.com/news/google-drive-exploited-to-download/4772

EVENTS

Conferences

Air Force Cyber Strategy Conference

AIR FORCE CYBER STRATEGY CONFERENCE

January 23-24, 2018
The problems facing the United States military and government in cyberspace are threat and vulnerability proliferation in our critical infrastructure and national security systems.  Strategic thinking about cyberspace needs to move left of threat. Instead of having a reactive strategy, strategi...

Cyber Defence & Network Security Conference

CYBER DEFENCE & NETWORK SECURITY CONFERENCE

January 23-25, 2018
CDANS 2018 will confront the challenge of securing the distributed network. As data-heavy remote assets and cloud storage proliferate, new weaknesses emerge for aggressors to exploit. With cyber now officially a NATO domain of warfare, the combat commander is increasingly sensitive to the need to en...

The Coming of Age of Quantum Cybersecurity

THE COMING OF AGE OF QUANTUM CYBERSECURITY

January 20-26, 2018
The Winter School will feature two tracks: the executive track will provide a high-level overview of quantum threats and cyber security during the first two days, and the in-depth technology track will last the full week and go into all of the technical details.  The goal of this event is to in...

The 3rd Annual China Automotive Cyber Security Summit

THE 3RD ANNUAL CHINA AUTOMOTIVE CYBER SECURITY SUMMIT

January 25-26, 2018
Automakers have been challenged with the task of making a fully secure connected vehicle to keep drivers safe on the road and protect their privacy. Vehicles are designed with driver and passenger safety as a key concern; however, without proper security, there cannot be safety.

Enigma 2018

ENIGMA 2018

January 16-18, 2018
Enigma centers on a single track of engaging talks covering a wide range of topics in security and privacy. Our goal is to clearly explain emerging threats and defenses in the growing intersection of society and technology, and to foster an intelligent and informed conversation within the community ...

BSides Roma - Security Conference

BSIDES ROMA - SECURITY CONFERENCE

January 13-13, 2018
Each BSides is a community-driven framework for building events for and by information security community members. The goal is to expand the spectrum of conversation beyond the traditional confines of space and time. It creates opportunities for individuals to both present and participate in an inti...

International Conference on Cyber Security

INTERNATIONAL CONFERENCE ON CYBER SECURITY

January 08-11, 2018
The International Conference on Cyber Security global partnerships for cyber solutions, organized by the International Conference on Cyber Security (ICCS) will take place from 8th January to the 11th January 2018 at the Fordham University Lincoln Center in New York, United States Of America. The con...

FloCon 2018

FLOCON 2018

January 08-11, 2018
FloCon provides a forum for exploring large-scale, next-generation data analytics in support of security operations.  FloCon is geared toward operational analysts, tool developers, researchers, security professionals, and others interested in applying cutting-edge techniques to analyze and visu...

 

Webinars

JAN 22, 2018 | 12:00 PM
[BREACH PREVENTION] 2018 CYBERSECURITY PREDICTIONS AND RECOMMENDATIONS
Join to hear Palo Alto Networks cybersecurity predictions for 2018 and get recommendations on how to mitigate against them to achieve a more resilient posture in the new year. Experts will dive into predictions on the threat landscape, cloud security, cyber hygiene, endpoint protection, Io...
JAN 23, 2018 | 8:00 AM
LEVERAGING THREAT HUNTING TECHNIQUES TO INVESTIGATE PETYA
Since the outbreak of Petya there have been many webinars dissecting the malware, its purpose, and its attribution. We view the Petya outbreak differently. In this webinar we show you how we leveraged threat hunting techniques developed to identify and pattern malicious behaviour evident i...
JAN 23, 2018 | 1:00 PM
TOP 5 CYBERSECURITY TRENDS FOR 2018
Equipped with Imperva’s own research, interactions with our customers, and a wealth of crowdsourced data analyzed from installations around the world, we’ve looked ahead to the future of Internet security. Join Terry Ray, CTO of Imperva, as he provides insight into cybersecurit...
JAN 23, 2018 | 11:00 AM
BREAKING DOWN CLOUD SECURITY: DISCOVER WHAT IT MEANS TO YOU
Cloud Security has recently filled everyone's network security forecast. Everyone is talking about it, but are they talking about the same thing? Today's webinar puts a framework around a term that has become ever-present in today's conversations even though its definition has ...
JAN 23, 2018 | 4:30 AM
CYBER SECURITY WEBINAR: THE JOURNEY TOWARDS GDPR COMPLIANCE
Learn the pragmatic and simple approach to deal with GDPR Join Fred Streefland, senior product marketing manager at Palo Alto Networks and guest speaker Mark Child, managing director at Xcina Consulting, for an informative webinar about taking a pragmatic approach to the GDPR and complianc...
JAN 23, 2018 | 12:00 AM
WHAT SUCCESSFUL SECURITY LEADERS ARE DOING TO AVOID BREACHES
Learn what critical insights were derived from CISOs and other security professionals in this recent Forrester survey, including the resilient strategies that proved to be successful in avoiding breaches, as well as those that failed.

GETTING STARTED WITH WEB APPLICATION SECURITY
Sponsored
Chances are, at any given moment, your organization's web applications are under attack (if not already exploited). Attackers see web applications as the front door: just one vulnerability allows them entry - perhaps to the database supporting the web application or maybe to your busin...
BUSINESS EMAIL MASQUERADING: HOW HACKERS ARE FOOLING EMPLOYEES TO COMMIT FRAUD
In the past year, so-called business email compromise attacks, also known as "masquerading" and "executive impersonation," have emerged as one of the greatest wire fraud worries. These schemes threaten to overshadow what was previously seen from commercial account takeover incidents.
TOP TRENDS AND TAKE-AWAYS FOR CYBERSECURITY
Cybersecurity continues to be one of the top concerns of organizations, even more so as complexity and threats increase. What are the key trends in 2015 for cybersecurity, and what steps can leaders take to prepare? What is the current state of cybersecurity threat and response? What are t...
A COMPREHENSIVE GUIDE TO CONNECTEDNESS WITH TRUST, SECURITY AND ETHICS IN THE DIGITAL BUSINESS
Trust is the foundation of all personal and business transactions. But who can you trust in digital business, with its endless connections and constantly shifting configurations? Trust is hard enough when it's personal, but how do you trust and be trusted when dealing with a multitude ...
WHAT EVERY CIO SHOULD KNOW ABOUT SECURITY, RISK AND VALUE
Although cybersecurity climbs back up the priority list and engaging risk is central to your success in digital business, the risk conversation is changing between you and non-IT executives. You have to balance the need to protect and the need to run your business. Integrating risk and cor...
ONE SIMPLE WAY TO GET YOUR CEO TO EMBRACE RISK MANAGEMENT
Most CEOs or other senior business executives cringe at the thought of having to meet with risk management professionals. By their very nature, CEOs are hard-wired to seek out growth opportunities that will add value to their companies. However, risk management professionals are tasked wit...

RESOURCES

To be fair, its method of assessing the security of operating systems is somewhat bunk. It sets a figure based on the number of vulnerabilities found rather than the importance of those vulnerabilitie...

IT security has gone through major changes. Enterprises today are facing a rapid expansion of diverse users, along with an influx of applications, device types, APIs, and microservices, all while navi...

The Regulation updates and modernises the principles enshrined in the 1995 Data Protection Directive to guarantee privacy rights. It focuses on: reinforcing individuals’ rights, strengthening th...

Cloud applications, big data, unified communications and real-time video demand an enormous amount of bandwidth and have a large impact on the company network. This whitepaper describes how you can gu...

As your online business expands, the individual user experience is one of the most important factors for building audience satisfaction and driving revenues. But whether you are delivering videos, web...

Organizations are in a perfect storm that is the result of an evolving threat landscape combined with the inefficiencies of many security technologies and programs, made worse by the shortage of skill...

Virtualization is the creation of a logical rather than an actual physical version of something, such as a storage device, hardware platform, operating system, database or network resource. The usual ...

Do you know how to protect your organization from ransomware threats? In this infographic, get the facts and start your protection plan. Can you answer these four data security questions? What is rans...

The Disaster Recovery 101 guide will help you learn about DR from the ground up and assist you in making informed decisions when implementing your DR strategy, enabling you to build a resilient IT inf...