• NEWS

    NEWS

    THE LATEST NEWS, DEVELOPMENTS AND ANNOUNCEMENTS AS THEY HAPPEN

    more
  • EVENTS

    EVENTS

    CONFERENCES, TRADE SHOWS, LIVE WEBCASTS, NEW LAUNCHES, SEMINARS AND TRAINING EVENTS

    more
  • COMPANIES

    COMPANIES

    PARTNERS, SOLUTIONS & SERVICE PROVIDERS, SUPPLIERS AND INDUSTRY ORGANIZATIONS

    more
  • RESOURCES

    RESOURCES

    WHITEPAPERS, MARKET REPORTS, RESEARCH, ON-DEMAND WEBINARS, VIDEOS AND INFOGRAPHICS

    more

NEWS

   

    home.aspx
  • Google Study Finds Phishing Most Likely Cause of Account Takeovers

    Data breaches that expose usernames and passwords—like the one at Yahoo, which leaked hundreds of millions of credentials—tend to generate a lot of attention and concern. In reality though...


    READ MORE
    http://www.eweek.com/security/google-study-finds-phishing-most-likely-cause-of-account-takeovers4708
  • Microsoft Issues Advisory for Mitigating DDE Attacks

    A security advisory published by Microsoft on Wednesday provides information on how users can protect themselves against recent attacks abusing the Dynamic Data Exchange (DDE) protocol.


    READ MORE
    http://www.securityweek.com/microsoft-issues-advisory-mitigating-dde-attacks4703
  • Researcher Bypasses IDS Using IDS Signatures

    Bucharest - DefCamp 2017- Intrusion detection system (IDS) signatures can be used as an evasion technique to bypass the IDS itself, a security researcher claims. During a presentation at the DefCamp 2...


    READ MORE
    http://www.securityweek.com/researcher-bypasses-ids-using-ids-signatures4704
  • Millions of Android Apps at Risk from Eavesdropper Vulnerability

    Poor mobile app development practices have created the Eavesdropper vulnerability, which has resulted in a large-scale data exposure from nearly 700 apps in enterprise mobile environments, over 170 of...


    READ MORE
    https://www.infosecurity-magazine.com/news/millions-of-android-apps-at-risk/4707
  • Where DevOps Could Be Increasing The Attack Surface

    The basic premise behind DevOps is that combining the development team and the operations team into a single cohesive unit will improve efficiency. It's all about breaking down silos. But there is...


    READ MORE
    http://www.securityweek.com/where-devops-could-be-increasing-attack-surface4700
  • CCTV Users at 'Risk of Breaching GDPR'

    Organizations that use CCTV systems could be putting themselves at risk of breaching GDPR data protection and privacy requirements by failing to understand how the forthcoming regulations cover the co...


    READ MORE
    https://www.infosecurity-magazine.com/news/cctv-users-at-risk-of-breaching/4701
  • Privileged Accounts Usually Poorly Managed, if Managed at All

    Privileged IT accounts, those administrator “unicorn” accounts that grant virtually unlimited access to nearly every component of a company's IT infrastructure, sensitive systems and d...


    READ MORE
    https://www.infosecurity-magazine.com/news/privileged-accounts-usually-poorly/4697
  • US Orgs Show Dangerous Overconfidence in DDoS Protections

    A full 88% of US businesses claim confidence in their current DDoS mitigation, despite 69% having suffered a successful DDoS attack in the last 12 months. According to a report from Sapio Research on ...


    READ MORE
    https://www.infosecurity-magazine.com/news/us-orgs-overconfidence-ddos/4699
  • Qakbot, Emotet Increasingly Targeting Business Users: Microsoft

    The Quackbot and Emotet information stealing Trojans have been showing renewed activity over the past several months and are increasingly targeting enterprises, small and medium businesses, and other ...


    READ MORE
    http://www.securityweek.com/qakbot-emotet-increasingly-targeting-business-users-microsoft4693

EVENTS

Conferences

Aviation Cyber Security Summit 2017

AVIATION CYBER SECURITY SUMMIT 2017

November 21-22, 2017
Join us on November 21/22 in London, England for the Cyber Senate Aviation Cyber Security Summit. We will address key issues such as the importance of information sharing and collaboration, supply chain and third party risk, incident response, integrating of cyber security and safety.

5ht Annual European Cyber Security Conference

5HT ANNUAL EUROPEAN CYBER SECURITY CONFERENCE

November 23-23, 2017
In a hyper-connected world where the functioning of our economies and democratic processes rely on a secure and resilient cyberspace, our societies are increasingly becoming vulnerable to cyber incidents, with attacks growing in both their sophistication and frequency, causing significant damage.

e-Crime and Cybersecurity Nordics

E-CRIME AND CYBERSECURITY NORDICS

November 29-29, 2017
By virtue of their strategic geographical position, Sweden, Denmark, Norway and Finland - and indeed the Baltic states too – have been the subject of repeated nation-state attacks on both public and private organisations and infrastructure.

Cyber Security Summit: Los Angeles

CYBER SECURITY SUMMIT: LOS ANGELES

November 29-29, 2017
The annual Los Angeles Cyber Security Summit connects C-Suite & Senior Executives responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts.

Cyber Security Summit & Expo 2017

CYBER SECURITY SUMMIT & EXPO 2017

November 16-16, 2017
The Cyber Security Summit and Expo is the UK’s largest one-day exhibition dedicated to putting cyber security firmly on the boardroom agenda of all government departments, public sector organisations and the private sector by connecting 2,000 security, technology and data leaders with business...

Cardis 2017

CARDIS 2017

November 13-15, 2017
Since its creation, CARDIS has provided a space for security experts from industry and academia to exchange on security of smart cards and related applications. Those objects are part of our daily life for years now: banking cards, SIM cards, electronic passports, etc. But the world is changing; the...

IFINSEC Financial Sector IT Security Conference

IFINSEC FINANCIAL SECTOR IT SECURITY CONFERENCE

November 14-15, 2017
FINSEC Financial Sector IT Security Conference and Exhibition will be organized on 14-15 November 2017 in Istanbul Turkey. IFINSEC is a niche and dedicated conference focusing on IT Security, Information Security and Cyber Security technologies.

Global Cyber Security Leaders 2017

GLOBAL CYBER SECURITY LEADERS 2017

November 13-14, 2017
The cyberspace has undeniably become the most fundamental infrastructure to do business globally. With the rise of cyber threats and incidents the role of information technology and security has dramatically changed, meaning that today's cyber security is no longer solely owned by and the respon...

 

Webinars

NOV 21, 2017 | 8:30 pm
NAVIGATING THE CHASM OF SIAM-MANAGING INFRASTRUCTURE IN 2018
Governments continue to try to regulate cyberspace, often with little effective impact. Security professionals struggle to design and operate infrastructure that will comply with rules written with Semantically Intentional Ambiguous Meaning (SIAM). Learn from the classrooms of one of the w...
NOV 28, 2017 | 1:46 AM
PROTECT AND PREVENT: 3 STRATEGIES FOR BLOCKING FILELESS ATTACKS AND EXPLOITS
Ransomware continues to experience record growth in 2017. Traditional solutions aren't enough and can't keep up with hundreds of thousands of new malware versions created daily. File-less attacks and exploits are now the most common vectors for successful ransomware attacks and mos...
NOV 30, 2017 | 12:00 PM-01:00 PM
YOUR ORGANIZATION THROUGH THE EYES OF AN ATTACKER
Attackers follow a number of paths as they search for entry-points into your organization. In this webinar, we'll show you easy ways to stalk and attack your organization to improve security. This will be a practical session providing a high-level overview of the theory/practices used,...
DEC 05, 2017 | 12:00 PM-01:00 PM
DESIGN BETTER SECURITY, HOW TO USE “ATTACK PATH MAPPING” TO PRESCRIBE YOUR SECURITY CONTROLS
Well, now someone has done it – using a technique called attack path mapping, to understand the probability of the hacker kill chain and quantify the risks, companies can not only reduce risk but design controls better.
DEC 06, 2017 | 12:00 PM-01:00 PM
STOP LOSING GAME REVENUE AND PLAYERS TO CYBER ATTACKS
Cyberattacks cost companies over $1 million per day and the video game industry is being targeted more than ever. The global audience is huge and growing across demographics. The number of platforms, from personal computers, consoles and hand-helds to smartphones and tablets, makes a smorg...
DEC 06, 2017 | 2:05 AM-3:05 AM
YOUR SECURITY SANDBOX WON'T CATCH IT ALL - THE PHISHING PROBLEM
Phishing attacks don’t involve malware, but instead they take advantage of people to steal credentials, rendering your sandbox useless. Email threats continue to plague organizations around the world, but when thinking about email threats, it’s critical not to focus only on mal...
GETTING STARTED WITH WEB APPLICATION SECURITY
Sponsored
Chances are, at any given moment, your organization's web applications are under attack (if not already exploited). Attackers see web applications as the front door: just one vulnerability allows them entry - perhaps to the database supporting the web application or maybe to your busin...
BUSINESS EMAIL MASQUERADING: HOW HACKERS ARE FOOLING EMPLOYEES TO COMMIT FRAUD
In the past year, so-called business email compromise attacks, also known as "masquerading" and "executive impersonation," have emerged as one of the greatest wire fraud worries. These schemes threaten to overshadow what was previously seen from commercial account takeover incidents.
TOP TRENDS AND TAKE-AWAYS FOR CYBERSECURITY
Cybersecurity continues to be one of the top concerns of organizations, even more so as complexity and threats increase. What are the key trends in 2015 for cybersecurity, and what steps can leaders take to prepare? What is the current state of cybersecurity threat and response? What are t...
A COMPREHENSIVE GUIDE TO CONNECTEDNESS WITH TRUST, SECURITY AND ETHICS IN THE DIGITAL BUSINESS
Trust is the foundation of all personal and business transactions. But who can you trust in digital business, with its endless connections and constantly shifting configurations? Trust is hard enough when it's personal, but how do you trust and be trusted when dealing with a multitude ...
WHAT EVERY CIO SHOULD KNOW ABOUT SECURITY, RISK AND VALUE
Although cybersecurity climbs back up the priority list and engaging risk is central to your success in digital business, the risk conversation is changing between you and non-IT executives. You have to balance the need to protect and the need to run your business. Integrating risk and cor...
ONE SIMPLE WAY TO GET YOUR CEO TO EMBRACE RISK MANAGEMENT
Most CEOs or other senior business executives cringe at the thought of having to meet with risk management professionals. By their very nature, CEOs are hard-wired to seek out growth opportunities that will add value to their companies. However, risk management professionals are tasked wit...

RESOURCES

To be fair, its method of assessing the security of operating systems is somewhat bunk. It sets a figure based on the number of vulnerabilities found rather than the importance of those vulnerabilitie...

IT security has gone through major changes. Enterprises today are facing a rapid expansion of diverse users, along with an influx of applications, device types, APIs, and microservices, all while navi...

The Regulation updates and modernises the principles enshrined in the 1995 Data Protection Directive to guarantee privacy rights. It focuses on: reinforcing individuals’ rights, strengthening th...

Cloud applications, big data, unified communications and real-time video demand an enormous amount of bandwidth and have a large impact on the company network. This whitepaper describes how you can gu...

As your online business expands, the individual user experience is one of the most important factors for building audience satisfaction and driving revenues. But whether you are delivering videos, web...

Organizations are in a perfect storm that is the result of an evolving threat landscape combined with the inefficiencies of many security technologies and programs, made worse by the shortage of skill...

Virtualization is the creation of a logical rather than an actual physical version of something, such as a storage device, hardware platform, operating system, database or network resource. The usual ...

Do you know how to protect your organization from ransomware threats? In this infographic, get the facts and start your protection plan. Can you answer these four data security questions? What is rans...

The Disaster Recovery 101 guide will help you learn about DR from the ground up and assist you in making informed decisions when implementing your DR strategy, enabling you to build a resilient IT inf...