• NEWS

    NEWS

    THE LATEST NEWS, DEVELOPMENTS AND ANNOUNCEMENTS AS THEY HAPPEN

    more
  • EVENTS

    EVENTS

    CONFERENCES, TRADE SHOWS, LIVE WEBCASTS, NEW LAUNCHES, SEMINARS AND TRAINING EVENTS

    more
  • COMPANIES

    COMPANIES

    PARTNERS, SOLUTIONS & SERVICE PROVIDERS, SUPPLIERS AND INDUSTRY ORGANIZATIONS

    more
  • RESOURCES

    RESOURCES

    WHITEPAPERS, MARKET REPORTS, RESEARCH, ON-DEMAND WEBINARS, VIDEOS AND INFOGRAPHICS

    more

NEWS

   

    home.aspx
  • Hackers Can Hijack Phones via Replacement Screens: Researchers

    Touchscreens and other components that are often replaced in smartphones and tablets can hide malicious chips capable of giving attackers complete control over the device, warned researchers at the Be...


    READ MORE
    http://www.securityweek.com/hackers-can-hijack-phones-replacement-screens-researchers4505
  • Decryption Key for Apple's SEP Firmware Posted Online

    What appears to be the decryption key for Apple's Secure Enclave Processor (SEP) firmware was posted online by a hacker going by the name of xerub. A coprocessor fabricated in the Apple S2, Apple ...


    READ MORE
    http://www.securityweek.com/decryption-key-apples-sep-firmware-posted-online4506
  • Kaspersky Details APT Trends for Q2 2017

    While continuing to deploy their usual set of hacking tools onto compromised systems, advanced persistent threat (APT) actors were observed using leveraging zero-day vulnerabilities and quickly adopti...


    READ MORE
    http://www.securityweek.com/kaspersky-details-apt-trends-q2-20174502
  • Cyber-Attacks Soar by a Quarter as Phishing Dominates

    Cyber-attacks were up by a quarter in Q2 2017, with manufacturers bearing the brunt and phishing emails the most popular threat vector, according to NTT Security. The managed security giant claimed th...


    READ MORE
    https://www.infosecurity-magazine.com/news/cyberattacks-soar-by-a-quarter-q2/4503
  • Firefox Makes Adobe Flash Click-to-Activate by Default

    Starting with the release of Firefox 55 this week, the Adobe Flash plugin is no longer active by default in Mozilla’s web browser, and users of the new version will be required to activate it fo...


    READ MORE
    http://www.securityweek.com/firefox-makes-adobe-flash-click-activate-default4497
  • Ukrainian Postal Service Knocked Offline By Repeated DDoS

    Ukrposhta, the national postal service in Ukraine, was hit with a two-day DDoS attack that began on Monday, knocking some systems offline. According to the Interfax news agency, the computer systems t...


    READ MORE
    https://www.infosecurity-magazine.com/news/ukrainian-postal-service-repeated/4499
  • Campaign Targets Russian-Speaking Enterprises With New Backdoor

    A malicious email campaign that has been active for at least two months is targeting Russian-speaking enterprises and delivering a new Windows-based backdoor, Trend Micro warns. The attack relies on a...


    READ MORE
    http://www.securityweek.com/campaign-targets-russian-speaking-enterprises-new-backdoor4495
  • Smoke Loader Backdoor Gets Anti-Analysis Improvements

    The infamous Smoke Loader backdoor now has more complex anti-analysis techniques that allow it to remain a potent malware delivery mechanism, PhishLabs security researchers warn. Also known as Dofoil,...


    READ MORE
    http://www.securityweek.com/smoke-loader-backdoor-gets-anti-analysis-improvements4496
  • Malware-less Threats Against Endpoints Start to Crest in 2017

    When it comes to what threatens endpoints—and the users behind them—malware-less threats are on a significant rise. According to research from the SANS Institute, the most common threats s...


    READ MORE
    https://www.infosecurity-magazine.com/news/malwareless-threats-start-to-crest/4490

EVENTS

Conferences

11th International Conference on Network and System Security

11TH INTERNATIONAL CONFERENCE ON NETWORK AND SYSTEM SECURITY

August 21-23, 2017
While the attack systems have become more easy-to-use, sophisticated, and powerful, interest has greatly increased in the field of building more effective, intelligent, adaptive, active and high performance defense systems which are distributed and networked. The conference will cover research on al...

7th Annual Cyber Security Training & Technology Forum (CSTTF)

7TH ANNUAL CYBER SECURITY TRAINING & TECHNOLOGY FORUM (CSTTF)

August 30-31, 2017
The Information Systems Security Association (ISSA) – Colorado Springs Chapter and FBC, Inc. will once again co-host the 7th Annual Cybersecurity Training & Technology Forum (CSTTF). CSTTF set to convene from Wednesday August 30th to Thursday, August 31st, 2017 at the DoubleTree by Hilton,...

6th Annual Cyber Security for Energy & Utilities

6TH ANNUAL CYBER SECURITY FOR ENERGY & UTILITIES

September 11-13, 2017
The 6th edition of the highly-successful cyber security conference for energy and utilities, will gather heads of industry to create a platform to help detect and prevent cyber threats and develop a real-time response and recovery to identified threats. Join IT Security Directors, CIOs, CTOs, Networ...

8th Annual Billington CyberSecurity Summit

8TH ANNUAL BILLINGTON CYBERSECURITY SUMMIT

September 13-14, 2017
The 8th Annual Billington CyberSecurity Summit on September 13 will attract over 1000 attendees at the Leading Fall Forum on Cybersecurity in the nation’s capital. The Summit will bring together world-class cybersecurity thought leaders to engage in high-level information sharing, unparalleled...

Cyber Security Summit: Chicago

CYBER SECURITY SUMMIT: CHICAGO

August 08-08, 2017
The annual Chicago Cyber Security Summit connects C-Suite & Senior Executives responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts.

 CyberSecurity International Symposium

CYBERSECURITY INTERNATIONAL SYMPOSIUM

July 10-11, 2017
According to the British insurance company Lloyd's, cyber attacks cost businesses as much as $400 billion each year, which includes direct damage plus post-attack disruption to the normal course of business. Research firm Cybersecurity Ventures estimates that the global cost of cybercrime will g...

2017 East Midlands Cyber Security Conference

2017 EAST MIDLANDS CYBER SECURITY CONFERENCE

July 06-06, 2017
This conference and expo will bring together over 150 businesses, information security providers and key influencers to discuss the threats posed by online criminals and the practical ways in which business make themselves more resilient to cyber crime. Core themes this year will include the securit...

16th European Conference on Cyber Warfare and Security

16TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY

June 29-30, 2017
It is now 16 years since the European Conference on Cyber Warfare and Security (ECCWS) was established. It has been held in Germany, Finland, Estonia, Greece, Portugal, England, The Netherlands to mention only a few of the countries which have hosted it.This conferences attracts an interesting combi...

 

Webinars

AUG 22, 2017
UNSUPERVISED LEARNING TO UNCOVER ADVANCED CYBER ATTACKS
This case study is framed in a multinational company with 300k+ employees, present in 100+ countries, that is adding one extra layer of security based on big data analytics capabilities, in order to provide net-new value to their ongoing SOC-related investments.  Having billions of ev...
AUG 23, 2017 | 18:00
DETECT AND RESPOND TO CYBER THREATS WITH THREAT LIFECYCLE MANAGEMENT
Today’s reality is that your organization will continue to be confronted by increasingly frequent and complex cyber threats. The Threat Lifecycle Management Framework (TLM) is a series of aligned security operations capabilities. It begins with the ability to monitor and search acros...
AUG 23, 2017 | 5:00 AM
THE STATE OF SECURITY OPERATIONS: HOW PREPARED ARE YOU FOR AN ATTACK?
Cyberattacks are top of mind for organizations across the globe. In fact, 62 percent of firms are being attacked at least weekly and 145 percent are experiencing a rise in the number of security threats. But do organizations have the processes in place to investigate and effectively respon...
AUG 29, 2017 | 1:00 pm
A TACTICAL GUIDE TO REDUCING YOUR DATA BREACH RISK
Over 90% of the world’s data has been generated in the last few years. Accompanying this rapid growth in data comes exponential risks, as witnessed by the spike in cyber attacks of which no organization seems immune. The financial rewards gained by the perpetuators of cyber attacks i...
AUG 29, 2017 | 11:30 AM
2017 MALWARE TRENDS - WANNACRY, NOTPETYA, EMOTET AND MORE
Ransomware and destructive malware attacks have had tremendous growth and impact in 2017, and it’s only August. Not only has there been a rise in the severity and frequency of attacks, but the level of sophistication, attack vectors and attack motives have also changed. Join this web...
SEP 07, 2017 | 9:30am
CYBERSECURITY FOR BUILDINGS - CAN WE STAY AHEAD OF THE ONGOING THREAT?
Cybersecurity for Buildings - Can We Stay Ahead of the Ongoing Threat? Not a day goes by that there is not a story about some form of Cybersecurity breach. In our industry, one focused on buildings, we have 4 different areas to worry about; 1) general IT threats, 2) real estate data and tr...
GETTING STARTED WITH WEB APPLICATION SECURITY
Sponsored
Chances are, at any given moment, your organization's web applications are under attack (if not already exploited). Attackers see web applications as the front door: just one vulnerability allows them entry - perhaps to the database supporting the web application or maybe to your busin...
BUSINESS EMAIL MASQUERADING: HOW HACKERS ARE FOOLING EMPLOYEES TO COMMIT FRAUD
In the past year, so-called business email compromise attacks, also known as "masquerading" and "executive impersonation," have emerged as one of the greatest wire fraud worries. These schemes threaten to overshadow what was previously seen from commercial account takeover incidents.
TOP TRENDS AND TAKE-AWAYS FOR CYBERSECURITY
Cybersecurity continues to be one of the top concerns of organizations, even more so as complexity and threats increase. What are the key trends in 2015 for cybersecurity, and what steps can leaders take to prepare? What is the current state of cybersecurity threat and response? What are t...
A COMPREHENSIVE GUIDE TO CONNECTEDNESS WITH TRUST, SECURITY AND ETHICS IN THE DIGITAL BUSINESS
Trust is the foundation of all personal and business transactions. But who can you trust in digital business, with its endless connections and constantly shifting configurations? Trust is hard enough when it's personal, but how do you trust and be trusted when dealing with a multitude ...
WHAT EVERY CIO SHOULD KNOW ABOUT SECURITY, RISK AND VALUE
Although cybersecurity climbs back up the priority list and engaging risk is central to your success in digital business, the risk conversation is changing between you and non-IT executives. You have to balance the need to protect and the need to run your business. Integrating risk and cor...
ONE SIMPLE WAY TO GET YOUR CEO TO EMBRACE RISK MANAGEMENT
Most CEOs or other senior business executives cringe at the thought of having to meet with risk management professionals. By their very nature, CEOs are hard-wired to seek out growth opportunities that will add value to their companies. However, risk management professionals are tasked wit...

RESOURCES

To be fair, its method of assessing the security of operating systems is somewhat bunk. It sets a figure based on the number of vulnerabilities found rather than the importance of those vulnerabilitie...

IT security has gone through major changes. Enterprises today are facing a rapid expansion of diverse users, along with an influx of applications, device types, APIs, and microservices, all while navi...

The Regulation updates and modernises the principles enshrined in the 1995 Data Protection Directive to guarantee privacy rights. It focuses on: reinforcing individuals’ rights, strengthening th...

Cloud applications, big data, unified communications and real-time video demand an enormous amount of bandwidth and have a large impact on the company network. This whitepaper describes how you can gu...

As your online business expands, the individual user experience is one of the most important factors for building audience satisfaction and driving revenues. But whether you are delivering videos, web...

Organizations are in a perfect storm that is the result of an evolving threat landscape combined with the inefficiencies of many security technologies and programs, made worse by the shortage of skill...

Virtualization is the creation of a logical rather than an actual physical version of something, such as a storage device, hardware platform, operating system, database or network resource. The usual ...

Do you know how to protect your organization from ransomware threats? In this infographic, get the facts and start your protection plan. Can you answer these four data security questions? What is rans...

The Disaster Recovery 101 guide will help you learn about DR from the ground up and assist you in making informed decisions when implementing your DR strategy, enabling you to build a resilient IT inf...