• NEWS

    NEWS

    THE LATEST NEWS, DEVELOPMENTS AND ANNOUNCEMENTS AS THEY HAPPEN

    more
  • EVENTS

    EVENTS

    CONFERENCES, TRADE SHOWS, LIVE WEBCASTS, NEW LAUNCHES, SEMINARS AND TRAINING EVENTS

    more
  • COMPANIES

    COMPANIES

    PARTNERS, SOLUTIONS & SERVICE PROVIDERS, SUPPLIERS AND INDUSTRY ORGANIZATIONS

    more
  • RESOURCES

    RESOURCES

    WHITEPAPERS, MARKET REPORTS, RESEARCH, ON-DEMAND WEBINARS, VIDEOS AND INFOGRAPHICS

    more

NEWS

   

    home.aspx
  • Hack the Air Force 2.0 Flies High with $12.5K Payout

    The results of the Pentagon’s Hack the Air Force 2.0 bug-bounty initiative are in: White hats received $103,883 in payouts and reported 106 vulnerabilities within 20 days. The Air Force also awa...


    READ MORE
    https://www.infosecurity-magazine.com/news/hack-the-air-force-flies-high-with/4833
  • 'DoubleDoor' IoT Botnet Uses Two Backdoor Exploits

    A newly discovered Internet of Things (IoT) botnet is using two exploits to ensure it can not only bypass authentication on targeted devices, but also render additional protections useless, NewSky Sec...


    READ MORE
    https://www.securityweek.com/doubledoor-iot-botnet-uses-two-backdoor-exploits4834
  • Microsoft to Extend Windows Defender ATP Support to Windows 7 and 8.1

    Windows Defender Advanced Threat Protection (ATP), a suite of security services that helps Windows 10 systems block emerging and sophisticated attacks, is coming this summer to Windows 7 and Windows 8...


    READ MORE
    http://www.eweek.com/security/microsoft-to-extend-windows-defender-atp-support-to-windows-7-and-8.14827
  • Industrial cyber security improving, but needs work

    Cyber-attacks on industrial and critical infrastructure systems are increasing in number and sophistication, but more attention is being paid to security, says Honeywell at it opens new Dubai facility...


    READ MORE
    http://www.computerweekly.com/news/252434956/Industrial-cyber-security-improving-but-needs-work4828
  • Cyberattack hits Winter Olympics during the opening ceremony

    The Pyeongchang Winter Olympics' internal servers crashed in the attack, as did public Wi-Fi. Officials confirmed the attack, but won't identify the perp. Reports in January from cybersecurity...


    READ MORE
    https://www.cnet.com/news/winter-olympics-pyeongchang-cyberattack-hack-internet-wifi/4824
  • If you like deepfakes, you might be mining cryptocurrency

    A website for fans of doctored videos used its visitors’ computers to mine Monero. It’s the latest way hackers can abuse your computer’s processing power. Your computer can do amazin...


    READ MORE
    https://www.cnet.com/news/deepfakes-users-computers-hacked-to-mine-cryptocurrency/4825
  • Protecting Physical Assets from Cyber Threats Grows in Priority

    Federal regulators have stepped up oversight of the security of the nation’s power utilities as they work to safeguard the grid from threats and incidents such as widespread, long-duration black...


    READ MORE
    https://www.securitymagazine.com/articles/88694-protecting-physical-assets-from-cyber-threats-grows-in-priority4822
  • ShurL0ckr Ransomware Evades Malware Detection in Google Drive, O365

    A new strain of Gojdue ransomware, dubbed ShurL0ckr, has been found on the dark web. Discovered by Bitglass and Cylance, the malware managed to evade being flagged by two well-known cloud platforms wi...


    READ MORE
    https://www.infosecurity-magazine.com/news/shurl0ckr-ransomware-evades/4815
  • Business Wire Suffers Week-Long DDoS Attack

    Press release network Business Wire has admitted suffering an ongoing Distributed Denial of Service (DDoS) attack lasting a week so far, in a sign of the continued pressure high-profile firms are unde...


    READ MORE
    https://www.infosecurity-magazine.com/news/business-wire-suffers-weeklong/4817

EVENTS

Conferences

NDSS Symposium 2018

NDSS SYMPOSIUM 2018

February 18-21, 2018
The Network and Distributed System Security Symposium (NDSS) fosters information exchange among researchers and practitioners of network and distributed system security. The target audience includes those interested in practical aspects of network and distributed system security, with a focus on act...

2018 FINRA Cybersecurity Conference

2018 FINRA CYBERSECURITY CONFERENCE

February 22-22, 2018
This year’s conference helps you stay current on today’s cybersecurity challenges and the ways in which organizations can understand vulnerabilities and threats, and create resilience against cyber attacks. Whether you are the Chief Information Security Officer, an IT professional, compl...

General Cybersecurity Conference

GENERAL CYBERSECURITY CONFERENCE

February 23-23, 2018
Security Titans is a ground-breaking information security event, bringing the biggest names in Information Security together – all in one day, on a single stage to give the nation’s booming security industry access to the very best InfoSec thought leadership in one, focused event.

CyberThreat 2018

CYBERTHREAT 2018

February 27-28, 2018
CyberThreat 2018 is a brand new initiative developed and delivered by NCSC and SANS Institute. Designed to bring together the UK and Europe's technical cyber security community, the event is focused solely on enabling organisations and security practitioners to build effective cyber threat intel...

Italian Conference on Cyber Security

ITALIAN CONFERENCE ON CYBER SECURITY

February 06-09, 2018
The Second Italian Conference on Cyber Security (ITASEC18) is an annual event supported by the CINI Cybersecurity National Laboratory that aims at putting together Italian researchers and professionals from academia, industry, and government working in the field of cyber security.

Atlanta Cyber Security Conference

ATLANTA CYBER SECURITY CONFERENCE

February 08-08, 2018
The Atlanta Cyber Security Conference, organized by the Data Connectors, LLC will take place on 8th Feb 2018 in Atlanta, United States Of America. The conference will cover areas like discussing current tech-security issues such as cloud security.

CPX 360 Cyber Security Summit and Expo

CPX 360 CYBER SECURITY SUMMIT AND EXPO

February 06-08, 2018
CPX 360 promises to be the premier cyber security summit. For the first time, we will bring our customers and partners together in a mega conference and expo. CPX 360 is where you’ll receive up-to-the-minute intelligence about global-threats and other vital topics from the world’s leadin...

MANUSEC: Cyber Security for Critical Manufacturing

MANUSEC: CYBER SECURITY FOR CRITICAL MANUFACTURING

February 07-08, 2018
Cyber attacks targeting manufacturing companies are on the rise. The manufacturing sector is an inviting target for hackers, being the most attacked sector only behind healthcare. The first European ManuSec Summit brings together senior security thought leaders to share best practices and find new w...

 

Webinars

FEB 20, 2018 | 1:00 PM
ANATOMY OF AN EMAIL-BORNE ATTACK
Email remains the biggest entry point into your healthcare organization, and with medical records at least 10X as valuable as credit cards, potential payoffs are high. Security threats are real and debilitating – they can even affect patient care – and they aren’t going a...
FEB 21, 2018 | 2:00 PM
IS YOUR SECURITY TEAM EQUIPPED TO MAKE THE BEST TACTICAL DECISIONS?
Our webinar with LookingGlass’ Senior Directors of Intelligence, Olga Polishchuk and Jonathan Tomek will explore how you and your security team can benefit from finished intelligence, including insights into key topics like policy, high-profile events, and threat trends. Whether you ...
FEB 21, 2018 | 11:00 AM
BEST PRACTICES IN PREVENTING CREDENTIAL PHISHING IN HEALTHCARE
According to the 2017 HIMSS Healthcare IT Cybersecurity Study, almost 90% of all U.S. respondents report that phishing, and education about phishing, represent their top vulnerabilities and opportunities for improvement. Join us for a webinar hosted by Matt Mellen, a healthcare specialist ...
FEB 27, 2018 | 12:00 PM
CEO INSIGHTS: 2018'S TOP CYBER SECURITY PREDICTIONS
In this webinar, Brian NeSmith, CEO and co-founder of Arctic Wolf Networks, will share his insights on the top 7 predictions to look out for in 2018. Here is a preview of the top 3 predictions that is bound to surprise you. - AI will not improve security. You will need Hybrid-AI.
FEB 27, 2018 | 12:00 PM
SECURING TODAY’S ENTERPRISE THE PROOF IS IN THE PROXY
While many network security technologies by themselves promise complete security, the only real protection against advanced threats in today's risk-laden environment is a multi-layered defense comprised of different network, end-point and gateway technologies.
MAR 06, 2018 | 7:00 AM
BUILDING A SECURE FUTURE FOR WOMEN IN CYBER SECURITY
Aside from breaches, ransomware attacks, and insider threats, another large issue faced by the cyber security industry is diversity, or lack thereof. Making the industry more appealing to women and then eventually retaining female talent are both challenges that are still affecting the cyb...

GETTING STARTED WITH WEB APPLICATION SECURITY
Sponsored
Chances are, at any given moment, your organization's web applications are under attack (if not already exploited). Attackers see web applications as the front door: just one vulnerability allows them entry - perhaps to the database supporting the web application or maybe to your busin...
BUSINESS EMAIL MASQUERADING: HOW HACKERS ARE FOOLING EMPLOYEES TO COMMIT FRAUD
In the past year, so-called business email compromise attacks, also known as "masquerading" and "executive impersonation," have emerged as one of the greatest wire fraud worries. These schemes threaten to overshadow what was previously seen from commercial account takeover incidents.
TOP TRENDS AND TAKE-AWAYS FOR CYBERSECURITY
Cybersecurity continues to be one of the top concerns of organizations, even more so as complexity and threats increase. What are the key trends in 2015 for cybersecurity, and what steps can leaders take to prepare? What is the current state of cybersecurity threat and response? What are t...
A COMPREHENSIVE GUIDE TO CONNECTEDNESS WITH TRUST, SECURITY AND ETHICS IN THE DIGITAL BUSINESS
Trust is the foundation of all personal and business transactions. But who can you trust in digital business, with its endless connections and constantly shifting configurations? Trust is hard enough when it's personal, but how do you trust and be trusted when dealing with a multitude ...
WHAT EVERY CIO SHOULD KNOW ABOUT SECURITY, RISK AND VALUE
Although cybersecurity climbs back up the priority list and engaging risk is central to your success in digital business, the risk conversation is changing between you and non-IT executives. You have to balance the need to protect and the need to run your business. Integrating risk and cor...
ONE SIMPLE WAY TO GET YOUR CEO TO EMBRACE RISK MANAGEMENT
Most CEOs or other senior business executives cringe at the thought of having to meet with risk management professionals. By their very nature, CEOs are hard-wired to seek out growth opportunities that will add value to their companies. However, risk management professionals are tasked wit...

RESOURCES

To be fair, its method of assessing the security of operating systems is somewhat bunk. It sets a figure based on the number of vulnerabilities found rather than the importance of those vulnerabilitie...

IT security has gone through major changes. Enterprises today are facing a rapid expansion of diverse users, along with an influx of applications, device types, APIs, and microservices, all while navi...

The Regulation updates and modernises the principles enshrined in the 1995 Data Protection Directive to guarantee privacy rights. It focuses on: reinforcing individuals’ rights, strengthening th...

Cloud applications, big data, unified communications and real-time video demand an enormous amount of bandwidth and have a large impact on the company network. This whitepaper describes how you can gu...

As your online business expands, the individual user experience is one of the most important factors for building audience satisfaction and driving revenues. But whether you are delivering videos, web...

Organizations are in a perfect storm that is the result of an evolving threat landscape combined with the inefficiencies of many security technologies and programs, made worse by the shortage of skill...

Virtualization is the creation of a logical rather than an actual physical version of something, such as a storage device, hardware platform, operating system, database or network resource. The usual ...

Do you know how to protect your organization from ransomware threats? In this infographic, get the facts and start your protection plan. Can you answer these four data security questions? What is rans...

The Disaster Recovery 101 guide will help you learn about DR from the ground up and assist you in making informed decisions when implementing your DR strategy, enabling you to build a resilient IT inf...