• NEWS

    NEWS

    THE LATEST NEWS, DEVELOPMENTS AND ANNOUNCEMENTS AS THEY HAPPEN

    more
  • EVENTS

    EVENTS

    CONFERENCES, TRADE SHOWS, LIVE WEBCASTS, NEW LAUNCHES, SEMINARS AND TRAINING EVENTS

    more
  • COMPANIES

    COMPANIES

    PARTNERS, SOLUTIONS & SERVICE PROVIDERS, SUPPLIERS AND INDUSTRY ORGANIZATIONS

    more
  • RESOURCES

    RESOURCES

    WHITEPAPERS, MARKET REPORTS, RESEARCH, ON-DEMAND WEBINARS, VIDEOS AND INFOGRAPHICS

    more

NEWS

   

    home.aspx
  • Twistlock 2.2 Improves Container Security with Cloud Native Firewall

    Container security startup Twistlock is set to formally announce its latest platform update on Sept. 21, providing new security features to manage and control micro-services deployments. The Twistlock...


    READ MORE
    http://www.eweek.com/security/twistlock-2.2-improves-container-security-with-cloud-native-firewall4589
  • Siemens, PAS Partner on Industrial Cybersecurity

    Engineering giant Siemens and PAS, a company that specializes in cyber security solutions for industrial control systems (ICS), announced on Tuesday a new strategic partnership. The goal of the partne...


    READ MORE
    http://www.securityweek.com/siemens-pas-partner-industrial-cybersecurity4586
  • New "Red Alert" Android Banking Trojan Emerges

    A recently discovered Android banking Trojan features a bot and command and control panel fully written from scratch, SfyLabs has discovered. Dubbed Red Alert 2.0, the malware has been designed and di...


    READ MORE
    http://www.securityweek.com/new-red-alert-android-banking-trojan-emerges4587
  • 3,000 Orgs Open to Equifax-type Breaches

    Analyzing data from the Maven Central repository, the largest distribution point for Java open-source components, Sonatype found a startling lack of hygiene related to enterprise consumption of vulner...


    READ MORE
    https://www.infosecurity-magazine.com/news/3000-orgs-open-to-equifax-type/4582
  • OurMine Leaks Huge Cache of Vevo Information Online

    OurMine has claimed another victim, lifting roughly 3.12TB worth of internal files from Vevo and posting them online. The majority of the files taken from the music video giant include benign data inc...


    READ MORE
    https://www.infosecurity-magazine.com/news/ourmine-leaks-huge-cache-vevo/4578
  • Mobile Insecurity Snowballs in 2017

    Mobile insecurity is increasing exponentially: In the first half of 2017, there were more flaws registered for Android and iOS than all of 2016, according to Zimperium analysis. But poor user practice...


    READ MORE
    https://www.infosecurity-magazine.com/news/mobile-insecurity-snowballs-in-2017/4579
  • Backdoored Plugin Impacts 200,000 WordPress Sites

    Around 200,000 WordPress websites were impacted after a plugin they were using was updated to include malicious code, Wordfence reports. Dubbed Display Widgets, the plugin was sold by its original aut...


    READ MORE
    http://www.securityweek.com/backdoored-plugin-impacts-200000-wordpress-sites4574
  • Average Company Subjected to Hundreds of Daily Web App Attacks

    The average number of attacks against any company’s set of web applications is staggering: They range from 300 to 800 per day—and never fall below 140. That’s according to Positive T...


    READ MORE
    https://www.infosecurity-magazine.com/news/average-company-daily-web-attacks/4575
  • Serious Flaws Found in IBM InfoSphere Products

    IT security services company SEC Consult on Wednesday disclosed the details of several unpatched vulnerabilities affecting IBM’s InfoSphere DataStage and Information Server data integration tool...


    READ MORE
    http://www.securityweek.com/serious-flaws-found-ibm-infosphere-products4570

EVENTS

Conferences

2017 IEEE Cybersecurity Development (SecDev)

2017 IEEE CYBERSECURITY DEVELOPMENT (SECDEV)

September 24-26, 2017
SecDev is distinguished by its focus on how to “build security in” (and not simply to discover the absence of security). Its goal is to encourage and disseminate ideas for secure system development among both academia and industry.

Executive Alliance

EXECUTIVE ALLIANCE'S SECURITY LEADERS SUMMIT NEW YORK FALL 2017

September 26-26, 2017
The Security Leaders Summit New York "Fall" will held on September 26, 2017 at the New York Hilton Midtown. The Summit brings together a community of senior IT executives for engaging peer-level interaction, discussions on new approaches to managing complexities in Information Security, an...

(ISC)2 Security Congress Cybersecurity Conference

(ISC)2 SECURITY CONGRESS CYBERSECURITY CONFERENCE

September 25-27, 2017
Join Duo Security at the (ISC)² Security Congress cybersecurity conference, which brings together nearly 1,500 industry colleagues, offers 100+ educational and thought-leadership sessions, and fosters collaboration with other forward-thinking companies. The goal of this conference is to advance...

4th Annual Industrial Control Cyber Security USA Summit

4TH ANNUAL INDUSTRIAL CONTROL CYBER SECURITY USA SUMMIT

October 03-04, 2017
Against a backdrop of targeted Industrial Control System cyber attacks, such as those against energy firms in the Ukraine power industry, the massive attacks against the Norway oil and gas industry, cyber attacks on Saudi Aramco and the new and continued threats such as Crash Override malware, Stuxn...

Cyber Security Summit: New York

CYBER SECURITY SUMMIT: NEW YORK

September 15-17, 2017
The annual New York Cyber Security Summit connects C-Suite & Senior Executives responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. Admission is $350 each, giving you access access to all Interact...

44CON

44CON

September 13-15, 2017
44CON is an Information Security Conference & Training event taking place in London. Designed to provide something for the business and technical Information Security professional.Why do 44CON? To bring the best in international Security training + speaking (as well as the best of local talent) ...

8th Annual Billington CyberSecurity Summit

8TH ANNUAL BILLINGTON CYBERSECURITY SUMMIT

September 13-14, 2017
The 8th Annual Billington CyberSecurity Summit on September 13 will attract over 1000 attendees at the Leading Fall Forum on Cybersecurity in the nation’s capital. The Summit will bring together world-class cybersecurity thought leaders to engage in high-level information sharing, unparalleled...

6th Annual Cyber Security for Energy & Utilities

6TH ANNUAL CYBER SECURITY FOR ENERGY & UTILITIES

September 11-13, 2017
The 6th edition of the highly-successful cyber security conference for energy and utilities, will gather heads of industry to create a platform to help detect and prevent cyber threats and develop a real-time response and recovery to identified threats. Join IT Security Directors, CIOs, CTOs, Networ...

 

Webinars

SEP 26, 2017 | 12:00 PM-12:45 PM
OPTIMIZE INCIDENT RESPONSE IN THE AGE OF RANSOMWARE
Organizations face increasing volumes of network data across their expanding physical, virtual and cloud networks. At the same time, dangerous malware, data breaches and ransomware continue to successfully penetrate their networks.
SEP 27, 2017 | 12:00 PM
DETECT THREATS FASTER AND ADVANCE YOUR NETWORK SECURITY
Current network security architectures are rapidly becoming inefficient. Dangerous malware, data breaches and ransomware often go unseen in enterprise networks, putting the business and their customers at risk. When a data breach occurs, Security Operations teams often struggle to pinpoint...
SEP 28, 2017 | 12:00 PM-01:00 PM
FACING THE INEVITABLE: TARGETED MEASURES TO PREVENT AND MITIGATE RANSOMWARE
Ransomware is at the top of most organizations’ risk profiles. It’s difficult to prevent in a large environment and it’s an easy vector for attackers to leverage. And high returns ensure attackers will continue to pour more resources toward this “opportunity.”...
OCT 03, 2017 | 5:00 AM-6:00 AM
PHISHING RESPONSE: IT’S A CLUSTER
Attend this webinar to learn why responders are drowning in emails instead of hunting real threats. See why they’re betting on automation whilst we know, tech alone won’t stop threats from getting through and wreaking serious havoc. Learn what rapid changes and investments your...
OCT 10, 2017 | 7:00 AM-8:00 AM
SECURITY CONTROL QUICK WINS THAT HELP ACHIEVE CLARITY FOR THE GDPR
Organisations apply many cybersecurity controls to help measure and maintain data security and regulatory compliance. Several are purposeful and list requirements that are subjective in how to employ them and how to meet their unique business risk strategy.
OCT 11, 2017 | 11:00 AM-11:30 AM
CYBERSECURITY IN THE WORKPLACE IS EVERYONE'S BUSINESS
Building a culture of cybersecurity is critical to every organization no matter the size. Join Aaron Cohen, Director of Cyber Security Services, to learn more about how to strengthen your organization’s cyber resiliency.
GETTING STARTED WITH WEB APPLICATION SECURITY
Sponsored
Chances are, at any given moment, your organization's web applications are under attack (if not already exploited). Attackers see web applications as the front door: just one vulnerability allows them entry - perhaps to the database supporting the web application or maybe to your busin...
BUSINESS EMAIL MASQUERADING: HOW HACKERS ARE FOOLING EMPLOYEES TO COMMIT FRAUD
In the past year, so-called business email compromise attacks, also known as "masquerading" and "executive impersonation," have emerged as one of the greatest wire fraud worries. These schemes threaten to overshadow what was previously seen from commercial account takeover incidents.
TOP TRENDS AND TAKE-AWAYS FOR CYBERSECURITY
Cybersecurity continues to be one of the top concerns of organizations, even more so as complexity and threats increase. What are the key trends in 2015 for cybersecurity, and what steps can leaders take to prepare? What is the current state of cybersecurity threat and response? What are t...
A COMPREHENSIVE GUIDE TO CONNECTEDNESS WITH TRUST, SECURITY AND ETHICS IN THE DIGITAL BUSINESS
Trust is the foundation of all personal and business transactions. But who can you trust in digital business, with its endless connections and constantly shifting configurations? Trust is hard enough when it's personal, but how do you trust and be trusted when dealing with a multitude ...
WHAT EVERY CIO SHOULD KNOW ABOUT SECURITY, RISK AND VALUE
Although cybersecurity climbs back up the priority list and engaging risk is central to your success in digital business, the risk conversation is changing between you and non-IT executives. You have to balance the need to protect and the need to run your business. Integrating risk and cor...
ONE SIMPLE WAY TO GET YOUR CEO TO EMBRACE RISK MANAGEMENT
Most CEOs or other senior business executives cringe at the thought of having to meet with risk management professionals. By their very nature, CEOs are hard-wired to seek out growth opportunities that will add value to their companies. However, risk management professionals are tasked wit...

RESOURCES

To be fair, its method of assessing the security of operating systems is somewhat bunk. It sets a figure based on the number of vulnerabilities found rather than the importance of those vulnerabilitie...

IT security has gone through major changes. Enterprises today are facing a rapid expansion of diverse users, along with an influx of applications, device types, APIs, and microservices, all while navi...

The Regulation updates and modernises the principles enshrined in the 1995 Data Protection Directive to guarantee privacy rights. It focuses on: reinforcing individuals’ rights, strengthening th...

Cloud applications, big data, unified communications and real-time video demand an enormous amount of bandwidth and have a large impact on the company network. This whitepaper describes how you can gu...

As your online business expands, the individual user experience is one of the most important factors for building audience satisfaction and driving revenues. But whether you are delivering videos, web...

Organizations are in a perfect storm that is the result of an evolving threat landscape combined with the inefficiencies of many security technologies and programs, made worse by the shortage of skill...

Virtualization is the creation of a logical rather than an actual physical version of something, such as a storage device, hardware platform, operating system, database or network resource. The usual ...

Do you know how to protect your organization from ransomware threats? In this infographic, get the facts and start your protection plan. Can you answer these four data security questions? What is rans...

The Disaster Recovery 101 guide will help you learn about DR from the ground up and assist you in making informed decisions when implementing your DR strategy, enabling you to build a resilient IT inf...