• NEWS

    NEWS

    THE LATEST NEWS, DEVELOPMENTS AND ANNOUNCEMENTS AS THEY HAPPEN

    more
  • EVENTS

    EVENTS

    CONFERENCES, TRADE SHOWS, LIVE WEBCASTS, NEW LAUNCHES, SEMINARS AND TRAINING EVENTS

    more
  • COMPANIES

    COMPANIES

    PARTNERS, SOLUTIONS & SERVICE PROVIDERS, SUPPLIERS AND INDUSTRY ORGANIZATIONS

    more
  • RESOURCES

    RESOURCES

    WHITEPAPERS, MARKET REPORTS, RESEARCH, ON-DEMAND WEBINARS, VIDEOS AND INFOGRAPHICS

    more

NEWS

   

    home.aspx
  • Defenders Gaining on Attackers, But Attacks Becoming More Destructive: Cisco

    Cisco's just-released Midyear Cybersecurity Report (PDF) draws on the accumulated work of the Cisco Security Research members. The result shows some improvement in industry's security posture,...


    READ MORE
    http://www.securityweek.com/defenders-gaining-attackers-attacks-becoming-more-destructive-cisco4444
  • Hacker Steals $30 Million in Ethereum from Parity Wallets

    A hacker was allegedly able to exploit a vulnerability in Ethereum wallet client Parity and steal over $30 million worth of crypto-currency. Because of a security flaw in the Parity Ethereum client, t...


    READ MORE
    http://www.securityweek.com/hacker-steals-30-million-ethereum-parity-wallets4447
  • A Hacker's Dream: American Password Reuse Runs Rampant

    Americans are not very good at password hygiene, according to a study on online security habits. The research, conducted by Wakefield Research, found that although online anxiety is rampant, password ...


    READ MORE
    https://www.infosecurity-magazine.com/news/american-password-reuse-runs/4440
  • Google Warns Users of Potentially Risky Web Apps

    Google is taking another step to better protect users from malicious third-party web applications: it is now warning users of newly created web apps and Apps Scripts that are pending verification.The ...


    READ MORE
    http://www.securityweek.com/google-warns-users-potentially-risky-web-apps4441
  • Hackers Make Off with $7M in Crypto-Currency from CoinDash

    Hackers have stolen $7 million in Ethereum virtual money from CoinDash, an Israeli cryptocurrency social trading start-up. The company said that it suffered a massive security breach in which the comp...


    READ MORE
    https://www.infosecurity-magazine.com/news/hackers-7m-in-cryptocurrency/4436
  • Malware Targets NAS Devices Via SambaCry Exploit

    A piece of malware dubbed by researchers SHELLBIND leverages a recently patched Samba vulnerability in attacks aimed at Internet of Things (IoT) devices, particularly network-attached storage (NAS) ap...


    READ MORE
    http://www.securityweek.com/malware-targets-nas-devices-sambacry-exploit4437
  • Security Pros Show Worrisome Lack of Malware Knowledge

    When asked to identify different malware behaviors, it turns out that a significant percentage of cybersecurity professionals are lagging when it comes to the latest tricks and tendencies of malicious...


    READ MORE
    https://www.infosecurity-magazine.com/news/security-pros-lack-of-malware/4432
  • Major Cyber-Attack Could Cost World Economy $121.4bn

    A huge global cyber-attack could cost the world economy $121.4bn, according to a new report by one of the world’s biggest insurers, Lloyd’s of London. In its report, which it has co-writte...


    READ MORE
    https://www.infosecurity-magazine.com/news/cyberattack-cost-world-economy-1/4433
  • Risk Intelligence Firm Flashpoint Raises $28 Million

    Flashpoint, a New York, NY-based threat intelligence and research company that focuses on what it calls “Business Risk Intelligence” (BRI) gleaned from combing the Deep & Dark Web, has...


    READ MORE
    http://www.securityweek.com/risk-intelligence-firm-flashpoint-raises-28-million4428

EVENTS

Conferences

ICSPWMN 2017 : 19th International Conference on Security and Privacy in Wireless and Mobile Networks

ICSPWMN 2017 : 19TH INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS

July 24-25, 2017
The ICSPWMN 2017: 19th International Conference on Security and Privacy in Wireless and Mobile Networks aims to bring together leading academic scientists, researchers and research scholars to exchange and share their experiences and research results on all aspects of Security and Privacy in Wireles...

ICKSSE 2017 : 19th International Conference on Knowledge Security, Storage and Encryption

ICKSSE 2017 : 19TH INTERNATIONAL CONFERENCE ON KNOWLEDGE SECURITY, STORAGE AND ENCRYPTION

July 24-25, 2017
The ICKSSE 2017: 19th International Conference on Knowledge Security, Storage and Encryption aims to bring together leading academic scientists, researchers and research scholars to exchange and share their experiences and research results on all aspects of Knowledge Security, Storage and Encryption...

ICIKSE 2017 : 19th International Conference on Innovative Knowledge Security and Encryptio

ICIKSE 2017 : 19TH INTERNATIONAL CONFERENCE ON INNOVATIVE KNOWLEDGE SECURITY AND ENCRYPTIO

July 24-25, 2017
The ICIKSE 2017: 19th International Conference on Innovative Knowledge Security and Encryption aims to bring together leading academic scientists, researchers and research scholars to exchange and share their experiences and research results on all aspects of Innovative Knowledge Security and Encryp...

ICCCIS 2017 : 19th International Conference on Cryptography, Coding and Information Security

ICCCIS 2017 : 19TH INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, CODING AND INFORMATION SECURITY

July 24-25, 2017
The ICCCIS 2017: 19th International Conference on Cryptography, Coding and Information Security aims to bring together leading academic scientists, researchers and research scholars to exchange and share their experiences and research results on all aspects of Cryptography, Coding and Information Se...

ICCNS 2017 : 19th International Conference on Communication and Networking Security

ICCNS 2017 : 19TH INTERNATIONAL CONFERENCE ON COMMUNICATION AND NETWORKING SECURITY

March 29-30, 2017
Sponsored
The ICCNS 2017: 19th International Conference on Communication and Networking Security aims to bring together leading academic scientists, researchers and research scholars to exchange and share their experiences and research results on all aspects of Communication and Networking Security. It also p...

ICCCC 2017 : 19th International Conference on Cyberengagement, Cybersecurity and Communications

ICCCC 2017 : 19TH INTERNATIONAL CONFERENCE ON CYBERENGAGEMENT, CYBERSECURITY AND COMMUNICATIONS

July 20-21, 2017
The ICCCC 2017: 19th International Conference on Cyberengagement, Cybersecurity and Communications aims to bring together leading academic scientists, researchers and research scholars to exchange and share their experiences and research results on all aspects of Cyberengagement, Cybersecurity and C...

ICCR 2017 : 19th International Conference on Cybersecurity and Resilience

ICCR 2017 : 19TH INTERNATIONAL CONFERENCE ON CYBERSECURITY AND RESILIENCE

July 20-21, 2017
The ICCR 2017: 19th International Conference on Cybersecurity and Resilience aims to bring together leading academic scientists, researchers and research scholars to exchange and share their experiences and research results on all aspects of Cybersecurity and Resilience. It also provides a premier i...

ICIMDS 2017 : 19th International Conference on Information Management and Data Security

ICIMDS 2017 : 19TH INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT AND DATA SECURITY

July 20-21, 2017
The ICIMDS 2017: 19th International Conference on Information Management and Data Security aims to bring together leading academic scientists, researchers and research scholars to exchange and share their experiences and research results on all aspects of Information Management and Data Security. It...

 

Webinars

JUL 25, 2017 | 11:00 AM
BREACH PREVENTION HOW DOES CREDENTIAL THEFT AFFECT YOUR ORGANIZATION?
The effects of a credential-based attack differs by organization and by job function. In this session, we will cover a look at how these attacks affect different types of organizations, along with the analysis and demonstration of how an attack is done. In this session, hear about: Credent...
JUL 25, 2017 | 11:00 AM
PROOFPOINT CUSTOMER TECHNICAL WEBINAR: IMPOSTER EMAILS & BEC ATTACKS
More than 90% of targeted attacks start with email fraud. Learn how to gain insight into, and effectively defend against, these attacks. Join us for a Proofpoint technical webinar, brought to you by engineers, for engineers.  This session will focus on effectively defending your domai...
JUL 26, 2017 | 6:00 PM
PREVENT MAJOR DATA BREACHES WITH THREAT LIFECYCLE MANAGEMENT
Throughout 2017 organisations will continue to be confronted by increasingly frequent and complex cyber threats. It’s not a matter of if your organisation will be compromised, but when. A traditional prevention-centric strategy naively assumes all threats can be blocked at the perime...
JUL 26, 2017 | 11:00 AM
BREACH PREVENTION DISRUPTING CREDENTIAL-BASED ATTACKS
Learn how to use the Palo Alto Networks next-generation security platform to disrupt the unique attack lifecycle used in credential-based attacks. In this session, get details about the strategies and key technologies for preventing both the theft and abuse of credentials. In this session,...
JUL 27, 2017 | 10:30 pm
DATA-CENTRIC SECURITY WITH CLASSIFICATION, ENCRYPTION, & FILE PROTECTION
Data-centric Security with Classification, Encryption, & File Protection. With HPE data security, your stolen data is useless to attackers, but still useful for your business processes and applications. Our standards-based technology enables you to encrypt and analyze your data with li...
JUL 27, 2017 | 5:00 am-6:00 am
CYBERSECURITY IN FINTECH
Cybersecurity in FinTech. Cybersecurity is a booming sector with plenty of implications for the FinTech industry. This webinar will look at the latest trends and emerging synergies in an increasingly complicated digital landscape.
GETTING STARTED WITH WEB APPLICATION SECURITY
Sponsored
Chances are, at any given moment, your organization's web applications are under attack (if not already exploited). Attackers see web applications as the front door: just one vulnerability allows them entry - perhaps to the database supporting the web application or maybe to your busin...
BUSINESS EMAIL MASQUERADING: HOW HACKERS ARE FOOLING EMPLOYEES TO COMMIT FRAUD
In the past year, so-called business email compromise attacks, also known as "masquerading" and "executive impersonation," have emerged as one of the greatest wire fraud worries. These schemes threaten to overshadow what was previously seen from commercial account takeover incidents.
TOP TRENDS AND TAKE-AWAYS FOR CYBERSECURITY
Cybersecurity continues to be one of the top concerns of organizations, even more so as complexity and threats increase. What are the key trends in 2015 for cybersecurity, and what steps can leaders take to prepare? What is the current state of cybersecurity threat and response? What are t...
A COMPREHENSIVE GUIDE TO CONNECTEDNESS WITH TRUST, SECURITY AND ETHICS IN THE DIGITAL BUSINESS
Trust is the foundation of all personal and business transactions. But who can you trust in digital business, with its endless connections and constantly shifting configurations? Trust is hard enough when it's personal, but how do you trust and be trusted when dealing with a multitude ...
WHAT EVERY CIO SHOULD KNOW ABOUT SECURITY, RISK AND VALUE
Although cybersecurity climbs back up the priority list and engaging risk is central to your success in digital business, the risk conversation is changing between you and non-IT executives. You have to balance the need to protect and the need to run your business. Integrating risk and cor...
ONE SIMPLE WAY TO GET YOUR CEO TO EMBRACE RISK MANAGEMENT
Most CEOs or other senior business executives cringe at the thought of having to meet with risk management professionals. By their very nature, CEOs are hard-wired to seek out growth opportunities that will add value to their companies. However, risk management professionals are tasked wit...

RESOURCES

To be fair, its method of assessing the security of operating systems is somewhat bunk. It sets a figure based on the number of vulnerabilities found rather than the importance of those vulnerabilitie...

This White Paper offers an overview of ETSI's work on security in Information and Communications Technologies (ICT). Each section introduces a specific technology and outlines ETSI's involveme...

Sony, Target, Westinghouse, Home Depot, U.S. Steel, Neiman Marcus, and the National Security Agency (NSA). The security breaches suffered by these and many other organizations, including most recently...

The ever-changing threat landscape requires more robust security risk management programs that can defend against the unknown. This survey assesses how healthcare entities are doing with regulatory co...

Threat intelligence is rapidly becoming an ever-higher business priority. There is a general awareness of the need to ‘do’ threat intelligence, and vendors are falling over themselves to o...

Enterprise Chief Security Officers (CSOs) face a myriad of challenges in protecting their organizations’ most confidential business documents as they flow inside and outside of the firm. In addi...

Decades ago, a group of merchants created a concept of general average—which is when all parties in a maritime venture share in losses resulting from a sacrifice of cargo in an emergency. What t...

Enterprises increasingly rely upon third-party software and services to handle business-critical processes and operations. Whether on-premises or in the cloud, these solutions must provide a level of ...

In the words of Lord Kelvin, “If you cannot measure it, you cannot improve it.” This maxim holds true today as it replies to information security and the need to accurately measure an orga...