• NEWS

    NEWS

    THE LATEST NEWS, DEVELOPMENTS AND ANNOUNCEMENTS AS THEY HAPPEN

    more
  • EVENTS

    EVENTS

    CONFERENCES, TRADE SHOWS, LIVE WEBCASTS, NEW LAUNCHES, SEMINARS AND TRAINING EVENTS

    more
  • COMPANIES

    COMPANIES

    PARTNERS, SOLUTIONS & SERVICE PROVIDERS, SUPPLIERS AND INDUSTRY ORGANIZATIONS

    more
  • RESOURCES

    RESOURCES

    WHITEPAPERS, MARKET REPORTS, RESEARCH, ON-DEMAND WEBINARS, VIDEOS AND INFOGRAPHICS

    more

NEWS

   

    home.aspx
  • Employees still in the dark about data protection

    With just a month to go before the GDPR compliance deadline, many employees still don’t know how to protect confidential data, a study shows. Employees are still struggling to understand how to ...


    READ MORE
    https://www.computerweekly.com/news/252439865/Employees-still-in-the-dark-about-data-protection5033
  • Major DDoS cyber crime website shut down

    A website linked to more than four million cyber attacks across the globe, including those targeting some of the UK’s biggest banks, has been shut down, with arrests in Croatia, Serbia, Canada a...


    READ MORE
    https://www.computerweekly.com/news/252439880/Major-DDoS-cyber-crime-website-shut-down5034
  • Ransomware attack hit Ukraine energy ministry website

    Cyber attack on Ukraine’s energy ministry shows that websites remain a weak point for many organisations online, say security experts. Cyber attackers have targeted the website of Ukraine’...


    READ MORE
    https://www.computerweekly.com/news/252439798/Ransomwareattack-hit-Ukraine-energy-ministry-website5029
  • Orangeworm cyber attack group targets health sector

    A cyber crime group is targeting the health sector and related industries in the US, Europe and Asia in a suspected corporate espionage campaign, researchers warn. A cyber attack group dubbed Orangewo...


    READ MORE
    https://www.computerweekly.com/news/252439782/Orangeworm-cyber-attack-group-targeting-health-sector5030
  • No business safe from cyber attack, says KPMG

    Businesses that operate online should be working to ensure operational resilience, while the financial sector should focus more on collaboration, says professional services firm KPMG. Every organisati...


    READ MORE
    https://www.computerweekly.com/news/252439708/No-business-safe-from-cyber-attack-says-KPMG5025
  • Next generation of SCADA industrial controls will protect against cyber attack

    Oil, energy and chemical companies are rethinking how to control big manufacturing plants, replacing expensive control technology with cheaper, more secure systems, taking their cue from biology. Oil ...


    READ MORE
    https://www.computerweekly.com/news/252439658/Next-generation-of-SCADA-industrial-controls-will-protect-against-cyber-attack5026
  • NIST Launches Search for Lightweight Cryptographic Champions

    The search for Lightweight Cryptographic Champions is on now that the National Institute of Standards and Technology (NIST) has launched a call for submissions of previously published and analyzed alg...


    READ MORE
    https://www.infosecurity-magazine.com/news/nist-search-for-lightweight/5021
  • RSA 2018: Juniper CEO stresses training, automation in cybersecurity

    During his RSA Conference keynote, Juniper CEO Rami Rahim encouraged leaders to be "agents of change" that embrace automation in cybersecurity and new training techniques. During his RSA Con...


    READ MORE
    https://searchcio.techtarget.com/news/252439687/RSA-2018-Juniper-CEO-stresses-training-automation-in-cybersecurity5022
  • Still No. 1: Survey Says Cybersecurity Remains Top Concern for Risk Managers

    For three years running, cybersecurity has remained the top threat to businesses across multiple categories, including infrastructure, geopolitical and emerging risks. That’s according to the 11...


    READ MORE
    https://www.infosecurity-magazine.com/news/cybersecurity-ranks-top-concern/5017

EVENTS

Conferences

IANS 2018 Dallas Information Security Forum

IANS 2018 DALLAS INFORMATION SECURITY FORUM

May 02-03, 2018
IANS 2018 Dallas Information Security Forum delivers an immersive curriculum with over 30+ sessions led by esteemed IANS Faculty, global information security thought leaders and solution providers. Attend the two-day Forum to gain actionable technical solutions and leadership insights focused on cur...

Global Cyber Security in Healthcare & Pharma Summit

GLOBAL CYBER SECURITY IN HEALTHCARE & PHARMA SUMMIT

May 03-04, 2018
Global Engage is pleased to announce the Global Cyber Security in Healthcare & Pharma Summit 2018, which will be taking place 3rd & 4th May 2018 in London. The conference will be co-located with the Blockchain in Healthcare Congress 2018. The number of cyber-attacks in healthcare is on the r...

THE PREMIER CYBERSECURITY EVENT IN SOUTHERN CALIFORNIA

THE PREMIER CYBERSECURITY EVENT IN SOUTHERN CALIFORNIA

May 02-04, 2018
IT and InfoSec executives, leaders, analysts, and practitioners will be gathering May 2-4, 2018 at the Universal City Hilton to learn from the experts and exchange ideas and solutions with their peers. With hacking and breaches reaching record numbers, CIOs and CISOs today are simply not able to kee...

ISSA-LA Security Summit X

ISSA-LA SECURITY SUMMIT X

May 02-04, 2018
IT and InfoSec executives, leaders, analysts, and practitioners will be gathering May 2-4, 2018 at the Universal City Hilton to learn from the experts and exchange ideas and solutions with their peers. With hacking and breaches reaching record numbers, CIOs and CISOs today are simply not able to kee...


Data Connectors Baltimore Cybersecurity Conference 2018

DATA CONNECTORS BALTIMORE CYBERSECURITY CONFERENCE 2018

April 26-26, 2018
Data Connectors will be hosting the Baltimore Cybersecurity Conference on Thursday, April 26th. The event will start at 8:15 AM with a check-in and opening introductions before presentation sessions begin at 8:45. Between the educational sessions that go throughout the day, there will be time to vis...

BALTIMORE (CYBERSECURITY)

BALTIMORE (CYBERSECURITY)

April 26-26, 2018
The Baltimore Area Cyber Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift ca...

5th Annual Cybersecurity Summit 2018

5TH ANNUAL CYBERSECURITY SUMMIT 2018

April 24-24, 2018
Join the Potomac Officers Club for the Fifth Annual Cybersecurity Summit to hear from public and private sector leaders on how federal agencies can improve their respective data security measures. In 2017, the number of cyber attacks nearly doubled compared to the previous year. Both federal agencie...

2018 RSA

2018 RSA

April 16-20, 2018
Not all threats are created equal, so managing your organization’s security posture can be a difficult task if the right tools and technologies aren’t available to you. LookingGlass’ holistic solutions portfolio equips your team with the tools and data to solve your toughest securi...

 

Webinars

MAY 01, 2018 | 6:00 AM
STOP PHISHING ATTACKS: WHAT YOU NEED TO KNOW
We’ve all seen the emails: someone shared a Google doc with us, our bank wants to verify our password, we’ve received an “important” attachment, you name it. Phishing is common. It’s common because it’s easy. Not only is phishing common, but it’s g...
MAY 01, 2018 | 11:30 AM
CPR FOR CISOS: CODE VULNERABILITIES, PASSWORD THEFT AND RANSOMWARE
Modern malware and active adversary attacks are using unique applications and URLs, as well as leveraging social engineering, to make the greatest impact. In this session, Sophos breaks down several recent attacks, explains the techniques used and discusses how modern security vendors must...
MAY 02, 2018 | 10:00 AM
COMPLIANCE SOLUTIONS: HOW CAN PENETRATION TESTING SUPPORT YOUR GDPR PROJECT?
Although many organisations are familiar with the concept of penetration testing, they often struggle to understand how to fit it into their overall General Data Protection Regulation (GDPR) compliance project, or even how to get started. Organisations could still face fines for any poor d...
MAY 03, 2018
LIVE WEBINAR | PHISHING LIKE THE BAD GUYS: SOCIAL ENGINEERING'S BIGGEST SUCCESS
In spite of all the news about advanced persistent threats and targeted hacks from nation-states, the most common security challenge facing enterprises today continues to be social engineering. Successful hackers know the user is the weakest link in the security chain. Email phishing campa...
MAY 03, 2018 | 12:00 PM
SELECTING AND SECURING YOUR ENTERPRISE ANDROID DEVICES
With some basic Android knowledge, you will be able to pick devices which meet enterprise user requirements and your security guidelines. Once you have picked the right devices, let the pros of IBM MaaS360 and Google help you effectively embrace all things Android in the enterprise. Join t...
MAY 18, 2018 | 1:00 pm
CYBER STRONG: PREPARING THE NATION’S CYBER WORKFORCE
The Nation has an ever-growing need for cybersecurity professionals who can protect our networks and infrastructure from increasing cyber threats and attacks. According to a study by the Center for Cyber Safety and Education, there will be a shortage of 1.8 million information security wor...

GETTING STARTED WITH WEB APPLICATION SECURITY
Sponsored
Chances are, at any given moment, your organization's web applications are under attack (if not already exploited). Attackers see web applications as the front door: just one vulnerability allows them entry - perhaps to the database supporting the web application or maybe to your busin...
BUSINESS EMAIL MASQUERADING: HOW HACKERS ARE FOOLING EMPLOYEES TO COMMIT FRAUD
In the past year, so-called business email compromise attacks, also known as "masquerading" and "executive impersonation," have emerged as one of the greatest wire fraud worries. These schemes threaten to overshadow what was previously seen from commercial account takeover incidents.
TOP TRENDS AND TAKE-AWAYS FOR CYBERSECURITY
Cybersecurity continues to be one of the top concerns of organizations, even more so as complexity and threats increase. What are the key trends in 2015 for cybersecurity, and what steps can leaders take to prepare? What is the current state of cybersecurity threat and response? What are t...
A COMPREHENSIVE GUIDE TO CONNECTEDNESS WITH TRUST, SECURITY AND ETHICS IN THE DIGITAL BUSINESS
Trust is the foundation of all personal and business transactions. But who can you trust in digital business, with its endless connections and constantly shifting configurations? Trust is hard enough when it's personal, but how do you trust and be trusted when dealing with a multitude ...
WHAT EVERY CIO SHOULD KNOW ABOUT SECURITY, RISK AND VALUE
Although cybersecurity climbs back up the priority list and engaging risk is central to your success in digital business, the risk conversation is changing between you and non-IT executives. You have to balance the need to protect and the need to run your business. Integrating risk and cor...
ONE SIMPLE WAY TO GET YOUR CEO TO EMBRACE RISK MANAGEMENT
Most CEOs or other senior business executives cringe at the thought of having to meet with risk management professionals. By their very nature, CEOs are hard-wired to seek out growth opportunities that will add value to their companies. However, risk management professionals are tasked wit...

RESOURCES

To be fair, its method of assessing the security of operating systems is somewhat bunk. It sets a figure based on the number of vulnerabilities found rather than the importance of those vulnerabilitie...

Given the evolving way Web and Cloud applications are used— and the constantly shifting threat landscape organizations must confront—proxy architecture is more important than ever in terms...

This White Paper offers an overview of ETSI's work on security in Information and Communications Technologies (ICT). Each section introduces a specific technology and outlines ETSI's involveme...

Sony, Target, Westinghouse, Home Depot, U.S. Steel, Neiman Marcus, and the National Security Agency (NSA). The security breaches suffered by these and many other organizations, including most recently...

The ever-changing threat landscape requires more robust security risk management programs that can defend against the unknown. This survey assesses how healthcare entities are doing with regulatory co...

Threat intelligence is rapidly becoming an ever-higher business priority. There is a general awareness of the need to ‘do’ threat intelligence, and vendors are falling over themselves to o...

Enterprise Chief Security Officers (CSOs) face a myriad of challenges in protecting their organizations’ most confidential business documents as they flow inside and outside of the firm. In addi...

Decades ago, a group of merchants created a concept of general average—which is when all parties in a maritime venture share in losses resulting from a sacrifice of cargo in an emergency. What t...

Enterprises increasingly rely upon third-party software and services to handle business-critical processes and operations. Whether on-premises or in the cloud, these solutions must provide a level of ...