• NEWS

    NEWS

    THE LATEST NEWS, DEVELOPMENTS AND ANNOUNCEMENTS AS THEY HAPPEN

    more
  • EVENTS

    EVENTS

    CONFERENCES, TRADE SHOWS, LIVE WEBCASTS, NEW LAUNCHES, SEMINARS AND TRAINING EVENTS

    more
  • COMPANIES

    COMPANIES

    PARTNERS, SOLUTIONS & SERVICE PROVIDERS, SUPPLIERS AND INDUSTRY ORGANIZATIONS

    more
  • RESOURCES

    RESOURCES

    WHITEPAPERS, MARKET REPORTS, RESEARCH, ON-DEMAND WEBINARS, VIDEOS AND INFOGRAPHICS

    more

NEWS

   

EVENTS

Conferences

The World Congress on Industrial Control Systems Security

THE WORLD CONGRESS ON INDUSTRIAL CONTROL SYSTEMS SECURITY

December 11-14, 2017
The WCICSS-2017 is a meeting point for professionals and researchers, IT security professionals, managers, developers, educators, vendors and service providers who are involved in development, integration, assessment, implementation, and operation of industrial cybersecurity technologies.

The 12th International Conference for Internet Technology and Secured Transactions

THE 12TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS

December 11-14, 2017
The ICITST is an international refereed conference dedicated to the advancement of theory and practical implementation of secured Internet transactions and to fostering discussions on information technology evolution.

International Conference on Cyber Security

INTERNATIONAL CONFERENCE ON CYBER SECURITY

January 08-11, 2018
The International Conference on Cyber Security global partnerships for cyber solutions, organized by the International Conference on Cyber Security (ICCS) will take place from 8th January to the 11th January 2018 at the Fordham University Lincoln Center in New York, United States Of America. The con...

Enigma 2018

ENIGMA 2018

January 16-18, 2018
Enigma centers on a single track of engaging talks covering a wide range of topics in security and privacy. Our goal is to clearly explain emerging threats and defenses in the growing intersection of society and technology, and to foster an intelligent and informed conversation within the community ...

The Third International Conference on Information Security and Digital Forensics

THE THIRD INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND DIGITAL FORENSICS

December 08-10, 2017
The organizers of this cyber event in Greece have listed the following as being associated with this event: Cyber Security, Digital Forensic, Information Assurance and Security Management, Cyber Peacefare and Physical Security.

THE 20TH AVAR INTERNATIONAL ANTI-VIRUS SECURITY CONFERENCE

THE 20TH AVAR INTERNATIONAL ANTI-VIRUS SECURITY CONFERENCE

December 06-08, 2017
Cybercriminals are constantly evolving their approaches; they’ve moved from ransomware attacks to IoT botnet attacks, from bank heists to cyber espionage APT, and from malvertising attacks to deceptive social engineering attacks. AVs have responded with machine learning, eradication, disruptio...

Cyber Security Indonesia 2017

CYBER SECURITY INDONESIA 2017

December 06-07, 2017
Cyber Security Indonesia 2017 exhibition and conference, brought to you by the organisers of the Indonesia Infrastructure Week, will bring cyber security solutions providers together with key government and private sector decision makers, buyers, and influencers in order to meet and do business and ...

2nd Edition FinTech Security Summit

2ND EDITION FINTECH SECURITY SUMMIT

December 07-07, 2017
With FinTech becoming a global phenomenon, why should the Middle East be left behind? As Abu Dhabi leads the market with innovations in the financial technologies space, we must not forget the cyber security dynamics involved in this digital transformation.

 

Webinars

DEC 12, 2017 | 12:00 PM-01:00 PM
THREAT INTELLIGENCE IS VITAL TO DATA PROTECTION AND MALWARE MITIGATION
Threat Intelligence plays a critical role in ensuring your data is protected and malware communication is prevented from command and control (C&C) l sites at the DNS control plane. During this webinar, we will discuss best practices in: Disruption of the cyber kill chain and prevention...
DEC 12, 2017 | 9:30 AM-10:30 AM
CYBERSECURITY & HEALTHCARE: HOW PREPARED ARE YOU?
Securing your healthcare organization goes beyond investing in technology to secure your devices, data, and applications. In today's complex digital healthcare environment, your healthcare workflows broaden your risk exposure by interacting with multiple apps, devices, and users spread...
DEC 12, 2017 | 12:00 PM
DEFENSE AGAINST A RANSOMWARE ATTACK: LATEST RESEARCH AND BEST PRACTICES
On May 12 2017, a new variant of the WannaCry ransomware (Ransom.Wannacry) suddenly appeared, infecting thousands of computers worldwide within a matter of hours.It was a new and particularly dangerous form of threat because of its ability to self-propagate and spread itself across an orga...
DEC 12, 2017 | 11:00 AM
OCC 2018 PART 1: CYBERSECURITY AND OPERATIONAL RESILIENCY
The Office of the Comptroller of the Currency (OCC) recently released its operating plan priorities for 2018. Coming in at #1: cybersecurity and operational resiliency. Whether you’re a banker or service provider to the financial industry, this should not come as a surprise. In this ...
DEC 12, 2017 | 1:00 PM
CYBERSECURITY CHOICES: SIEM, MSSP, OR SOC-AS-A-SERVICE?
Gain insight into three cybersecurity solutions: SIEM, MSSP, and SOC-as-a-Service. Discover which solution is the best fit for your organization based on some of the following criteria:company size offerings,detection and response capabilities, deployment times, support and expertise.
DEC 13, 2017 | 10:00 AM
IMPLEMENTING A CYBER SECURITY RX TO SUPPORT THE LATEST HEALTHCARE ADVANCES
The healthcare industry is experiencing a surge in transformative new technologies, and introducing telemedicine, more networked devices (Internet of Medical Things), and increases in protected EMR transmissions over Wi-Fi to enable better treatment, productivity, and communication within ...
GETTING STARTED WITH WEB APPLICATION SECURITY
Sponsored
Chances are, at any given moment, your organization's web applications are under attack (if not already exploited). Attackers see web applications as the front door: just one vulnerability allows them entry - perhaps to the database supporting the web application or maybe to your busin...
BUSINESS EMAIL MASQUERADING: HOW HACKERS ARE FOOLING EMPLOYEES TO COMMIT FRAUD
In the past year, so-called business email compromise attacks, also known as "masquerading" and "executive impersonation," have emerged as one of the greatest wire fraud worries. These schemes threaten to overshadow what was previously seen from commercial account takeover incidents.
TOP TRENDS AND TAKE-AWAYS FOR CYBERSECURITY
Cybersecurity continues to be one of the top concerns of organizations, even more so as complexity and threats increase. What are the key trends in 2015 for cybersecurity, and what steps can leaders take to prepare? What is the current state of cybersecurity threat and response? What are t...
A COMPREHENSIVE GUIDE TO CONNECTEDNESS WITH TRUST, SECURITY AND ETHICS IN THE DIGITAL BUSINESS
Trust is the foundation of all personal and business transactions. But who can you trust in digital business, with its endless connections and constantly shifting configurations? Trust is hard enough when it's personal, but how do you trust and be trusted when dealing with a multitude ...
WHAT EVERY CIO SHOULD KNOW ABOUT SECURITY, RISK AND VALUE
Although cybersecurity climbs back up the priority list and engaging risk is central to your success in digital business, the risk conversation is changing between you and non-IT executives. You have to balance the need to protect and the need to run your business. Integrating risk and cor...
ONE SIMPLE WAY TO GET YOUR CEO TO EMBRACE RISK MANAGEMENT
Most CEOs or other senior business executives cringe at the thought of having to meet with risk management professionals. By their very nature, CEOs are hard-wired to seek out growth opportunities that will add value to their companies. However, risk management professionals are tasked wit...

RESOURCES

To be fair, its method of assessing the security of operating systems is somewhat bunk. It sets a figure based on the number of vulnerabilities found rather than the importance of those vulnerabilitie...

IT security has gone through major changes. Enterprises today are facing a rapid expansion of diverse users, along with an influx of applications, device types, APIs, and microservices, all while navi...

The Regulation updates and modernises the principles enshrined in the 1995 Data Protection Directive to guarantee privacy rights. It focuses on: reinforcing individuals’ rights, strengthening th...

Cloud applications, big data, unified communications and real-time video demand an enormous amount of bandwidth and have a large impact on the company network. This whitepaper describes how you can gu...

As your online business expands, the individual user experience is one of the most important factors for building audience satisfaction and driving revenues. But whether you are delivering videos, web...

Organizations are in a perfect storm that is the result of an evolving threat landscape combined with the inefficiencies of many security technologies and programs, made worse by the shortage of skill...

Virtualization is the creation of a logical rather than an actual physical version of something, such as a storage device, hardware platform, operating system, database or network resource. The usual ...

Do you know how to protect your organization from ransomware threats? In this infographic, get the facts and start your protection plan. Can you answer these four data security questions? What is rans...

The Disaster Recovery 101 guide will help you learn about DR from the ground up and assist you in making informed decisions when implementing your DR strategy, enabling you to build a resilient IT inf...