• NEWS

    NEWS

    THE LATEST NEWS, DEVELOPMENTS AND ANNOUNCEMENTS AS THEY HAPPEN

    more
  • EVENTS

    EVENTS

    CONFERENCES, TRADE SHOWS, LIVE WEBCASTS, NEW LAUNCHES, SEMINARS AND TRAINING EVENTS

    more
  • COMPANIES

    COMPANIES

    PARTNERS, SOLUTIONS & SERVICE PROVIDERS, SUPPLIERS AND INDUSTRY ORGANIZATIONS

    more
  • RESOURCES

    RESOURCES

    WHITEPAPERS, MARKET REPORTS, RESEARCH, ON-DEMAND WEBINARS, VIDEOS AND INFOGRAPHICS

    more

NEWS

   

    home.aspx
  • Corvil Integrates its Security Analytics Into Cisco's Tetration Platform

    At Cisco Live, Las Vegas Monday, IT analytics firm Corvil announced the integration of its Security Analytics with the Cisco Tetration Analytics platform. The intention is to combine Corvil's real...


    READ MORE
    http://www.securityweek.com/corvil-integrates-its-security-analytics-ciscos-tetration-platform4395
  • FBI: $1.45 Billion in Losses to Internet Crime Reported in 2016

    The FBI has published its Internet Crime Report 2016 based on information received by the Internet Crime Complaint Center (IC3). It shows that 298,728 complaints were received by the IC3 during 2016 (...


    READ MORE
    http://www.securityweek.com/fbi-145-billion-losses-internet-crime-reported-20164396
  • UCL ransomware attack traced to malvertising campaign

    Security researchers have suggested that the ransomware attack on University College London last week was spread through a "malvertising" campaign. Proofpoint reckons the AdGholas group spre...


    READ MORE
    https://www.theregister.co.uk/2017/06/22/ucl_ransomware_malvertising/4392
  • Necurs Botnet Distributing Locky Ransomware via Fake Invoices

    The Necurs spam botnet has switched back to distributing the Locky ransomware in a campaign featuring messages disguised as fake invoices, Cisco Talos security researchers reveal. Last year, Necurs wa...


    READ MORE
    http://www.securityweek.com/necurs-botnet-distributing-locky-ransomware-fake-invoices4394
  • Intelligence Panel Learns How to Hack Air-Gapped Voting Systems

    "Our election infrastructure is not as distant from the internet as it may seem," Alex Halderman, a University of Michigan computer science professor, testified Wednesday before the Senate S...


    READ MORE
    http://www.bankinfosecurity.in/intelligence-panel-learns-how-to-hack-air-gapped-voting-systems-a-100304389
  • Crypto in Europe: Battle Lines Drawn

    Those proposals are part of a number of changes being put forward to update a 2002 EU electronic privacy directive, transforming it into a regulation that would take effect at the same time as the EU ...


    READ MORE
    http://www.bankinfosecurity.in/crypto-in-europe-battle-lines-drawn-a-100284390
  • North Korea's DDoS Attacks Analyzed Based on IPs

    Arbor Networks has used the IP addresses shared recently by United States authorities to analyze distributed denial-of-service (DDoS) attacks attributed to the North Korean government. The security fi...


    READ MORE
    http://www.securityweek.com/north-koreas-ddos-attacks-analyzed-based-ips4382
  • Cisco Releases Open Source Malware Signature Generator

    Cisco’s Talos intelligence and research group announced on Monday the availability of a new open source framework designed for automatically generating antivirus signatures from malware. The too...


    READ MORE
    http://www.securityweek.com/cisco-releases-open-source-malware-signature-generator4383
  • Geopolitical Context a Prerequisite for Finished Intelligence

    Finished intelligence, at its core, requires both data and context. While I’ve written previously about how different data sources -- specifically the Deep & Dark Web versus the open web -- ...


    READ MORE
    http://www.securityweek.com/geopolitical-context-prerequisite-finished-intelligence4381

EVENTS

Conferences

ICISCIS 2017 : 19th International Conference on Information Security Controls and Information Systems

ICISCIS 2017 : 19TH INTERNATIONAL CONFERENCE ON INFORMATION SECURITY CONTROLS AND INFORMATION SYSTEMS

June 28-29, 2017
The ICISCIS 2017: 19th International Conference on Information Security Controls and Information Systems aims to bring together leading academic scientists, researchers and research scholars to exchange and share their experiences and research results on all aspects of Information Security Controls ...

16th European Conference on Cyber Warfare and Security

16TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY

June 29-30, 2017
It is now 16 years since the European Conference on Cyber Warfare and Security (ECCWS) was established. It has been held in Germany, Finland, Estonia, Greece, Portugal, England, The Netherlands to mention only a few of the countries which have hosted it.This conferences attracts an interesting combi...

ICICSCS 2017 : 19th International Conference on Industrial Control Systems Cyber Security

ICICSCS 2017 : 19TH INTERNATIONAL CONFERENCE ON INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY

July 04-05, 2017
The ICICSCS 2017: 19th International Conference on Industrial Control Systems Cyber Security aims to bring together leading academic scientists, researchers and research scholars to exchange and share their experiences and research results on all aspects of Industrial Control Systems Cyber Security....

ICIPSI 2017 : 19th International Conference on Information Privacy, Security and Integrity

ICIPSI 2017 : 19TH INTERNATIONAL CONFERENCE ON INFORMATION PRIVACY, SECURITY AND INTEGRITY

July 04-05, 2017
The ICIPSI 2017: 19th International Conference on Information Privacy, Security and Integrity aims to bring together leading academic scientists, researchers and research scholars to exchange and share their experiences and research results on all aspects of Information Privacy, Security and Integri...

ICCNS 2017 : 19th International Conference on Communication and Networking Security

ICCNS 2017 : 19TH INTERNATIONAL CONFERENCE ON COMMUNICATION AND NETWORKING SECURITY

March 29-30, 2017
Sponsored
The ICCNS 2017: 19th International Conference on Communication and Networking Security aims to bring together leading academic scientists, researchers and research scholars to exchange and share their experiences and research results on all aspects of Communication and Networking Security. It also p...

ICCWS 2017 : 19th International Conference on Cyber Warfare and Security

ICCWS 2017 : 19TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY

June 25-26, 2017
The ICCWS 2017: 19th International Conference on Cyber Warfare and Security aims to bring together leading academic scientists, researchers and research scholars to exchange and share their experiences and research results on all aspects of Cyber Warfare and Security. It also provides a premier inte...

ICISC 2017 : 19th International Conference on Information Security Controls

ICISC 2017 : 19TH INTERNATIONAL CONFERENCE ON INFORMATION SECURITY CONTROLS

June 25-26, 2017
The ICISC 2017: 19th International Conference on Information Security Controls aims to bring together leading academic scientists, researchers and research scholars to exchange and share their experiences and research results on all aspects of Information Security Controls. It also provides a premie...

ICPISL 2017 : 19th International Conference on Privacy and Information Security Law

ICPISL 2017 : 19TH INTERNATIONAL CONFERENCE ON PRIVACY AND INFORMATION SECURITY LAW

June 25-25, 2017
The ICPISL 2017: 19th International Conference on Privacy and Information Security Law aims to bring together leading academic scientists, researchers and research scholars to exchange and share their experiences and research results on all aspects of Privacy and Information Security Law. It also pr...

 

Webinars

JUN 29, 2017 | 1:00 pm
FUTURE OF SIEM—SNIFF OUT MALWARE & SPEAR-PHISHING W/BEHAVIORAL ANALYTICS
Malware and spear-phishing continue to cause the most headaches for IT security teams. Over the years, attackers have become more sophisticated and SIEM systems have failed to keep up. Key indicators of emerging threats include lateral movement, where the attacker silently attempts to acce...
JUN 29, 2017 | 15:00
HOW TO DEFEAT A SUSPICIOUS ATTACK AND PREPARE THE BEST RESPONSE
According to the 2017 Global Threat Intelligence Report from Dimension Data and NTT Security, 30% of cyber-attacks were deemed ‘suspicious’, and included tactics of privileged access attempts, exploitation software, and policy denials on security controls. Yet, as new sources a...
JUN 29, 2017 | 12:00 pm
ADVANCED THREAT PROTECTION FOR MESSAGING GATEWAY
Symantec has just released new advanced threat protection capabilities for Messaging Gateway 10.6 based on integration with Symantec’s Content & Malware Analysis platform. This new advanced threat defense option for Messaging Gateway provides offloading of messages to Content &am...
JUL 05, 2017 | 5:00 am
USING WINDOWS SECURITY EVENTS TO DETECT INTRUDERS IN YOUR NETWORK
Over time, any given computer on your network will establish a pattern of systems it does and doesn’t talk to. If you can properly baseline that behaviour and detect when the computer deviates from normal activity you can produce critical early warnings of a potential incident. In th...
JUL 11, 2017 | 2:00 pm
THREAT HUNTING SCENARIO: MONITORING FOR INSIDER DATA EXFILTRATION
Industry statistics point to 1 in 5 enterprise breaches involve insider actions. Insider threats are often the costliest and most disruptive to an enterprise - even highly secure enterprises (think Edward Snowden). According to the FBI, “the thief who is harder to detect and who coul...
JUL 11, 2017 | 10:00 am
TURNING THE TABLE ON HACKERS AND BREACHES
Data breaches in 2016 got even more personal with big hacks of adult entertainment sites and social media databases. Hackers mined these for gold, in other words, valuable data to create social engineering attacks, ransom operations and identity theft. According to Gemalto’s Breach L...
GETTING STARTED WITH WEB APPLICATION SECURITY
Sponsored
Chances are, at any given moment, your organization's web applications are under attack (if not already exploited). Attackers see web applications as the front door: just one vulnerability allows them entry - perhaps to the database supporting the web application or maybe to your busin...
BUSINESS EMAIL MASQUERADING: HOW HACKERS ARE FOOLING EMPLOYEES TO COMMIT FRAUD
In the past year, so-called business email compromise attacks, also known as "masquerading" and "executive impersonation," have emerged as one of the greatest wire fraud worries. These schemes threaten to overshadow what was previously seen from commercial account takeover incidents.
TOP TRENDS AND TAKE-AWAYS FOR CYBERSECURITY
Cybersecurity continues to be one of the top concerns of organizations, even more so as complexity and threats increase. What are the key trends in 2015 for cybersecurity, and what steps can leaders take to prepare? What is the current state of cybersecurity threat and response? What are t...
A COMPREHENSIVE GUIDE TO CONNECTEDNESS WITH TRUST, SECURITY AND ETHICS IN THE DIGITAL BUSINESS
Trust is the foundation of all personal and business transactions. But who can you trust in digital business, with its endless connections and constantly shifting configurations? Trust is hard enough when it's personal, but how do you trust and be trusted when dealing with a multitude ...
WHAT EVERY CIO SHOULD KNOW ABOUT SECURITY, RISK AND VALUE
Although cybersecurity climbs back up the priority list and engaging risk is central to your success in digital business, the risk conversation is changing between you and non-IT executives. You have to balance the need to protect and the need to run your business. Integrating risk and cor...
ONE SIMPLE WAY TO GET YOUR CEO TO EMBRACE RISK MANAGEMENT
Most CEOs or other senior business executives cringe at the thought of having to meet with risk management professionals. By their very nature, CEOs are hard-wired to seek out growth opportunities that will add value to their companies. However, risk management professionals are tasked wit...

RESOURCES

To be fair, its method of assessing the security of operating systems is somewhat bunk. It sets a figure based on the number of vulnerabilities found rather than the importance of those vulnerabilitie...

This White Paper offers an overview of ETSI's work on security in Information and Communications Technologies (ICT). Each section introduces a specific technology and outlines ETSI's involvement in t...

"Sony, Target, estinghouse, Home Depot, U.S.Steel, Neiman Marcus, and the National Security Agency (NSA). The security breaches suffered by these and many other organizations, including most rece...

"Healthcare organizations must comply with federal HIPAA regulations to protect patient health data. But the ever-changing threat landscape requires more robust security risk management programs that ...

Threat intelligence is rapidly becoming an ever-higher business priority. There is a general awareness of the need to ‘do’ threat intelligence, and vendors are falling over themselves to offer a confu...

Whether changes in access, its level of sensitivity or who can receive it outside of the organization, protecting your firm's most confidential data requires not only protecting the data itself but pr...

Decades ago, a group of merchants created a concept of general average—which is when all parties in a maritime venture share in losses resulting from a sacrifice of cargo in an emergency. What this gr...

"Enterprises increasingly rely upon third-party software and services to handle business-critical processes and perations."...

In the words of Lord Kelvin, “If you cannot measure it, you cannot improve it.” This maxim holds true today as it replies to information security and the need to accurately measure an orga...