• NEWS

    NEWS

    THE LATEST NEWS, DEVELOPMENTS AND ANNOUNCEMENTS AS THEY HAPPEN

    more
  • EVENTS

    EVENTS

    CONFERENCES, TRADE SHOWS, LIVE WEBCASTS, NEW LAUNCHES, SEMINARS AND TRAINING EVENTS

    more
  • COMPANIES

    COMPANIES

    PARTNERS, SOLUTIONS & SERVICE PROVIDERS, SUPPLIERS AND INDUSTRY ORGANIZATIONS

    more
  • RESOURCES

    RESOURCES

    WHITEPAPERS, MARKET REPORTS, RESEARCH, ON-DEMAND WEBINARS, VIDEOS AND INFOGRAPHICS

    more

NEWS

   

    home.aspx
  • Federal HR wants to modernize cybersecurity recruiting, pay

    The U.S. Dept. of Homeland Security wants to modernize recruitment and management of its cybersecurity workforce. It is asking vendors to explain how DHS can achieve its goals. The U.S. Dept. of Homel...


    READ MORE
    https://searchhrsoftware.techtarget.com/news/252441891/Federal-HR-wants-to-modernize-cybersecurity-recruiting-pay5136
  • IDC, Cisco survey assesses future IT staffing needs

    New IDC survey on digital transformation's effects on future IT staffing outline technology trends affecting IT hiring and 20 roles that emphasize need for expanded skill sets. Network engineers, ...


    READ MORE
    https://searchnetworking.techtarget.com/news/252441859/IDC-Cisco-survey-assesses-future-IT-staffing-needs5137
  • More Unsecure Wi-Fi and Phishing? Not So Flashy

    As more companies embrace the productivity of a mobile workforce, the fact that work is being conducted from potentially unsecured Wi-Fi networks puts enterprise security at risk. According to The 201...


    READ MORE
    https://www.infosecurity-magazine.com/news/more-unsecure-wifi-and-phishing/5132
  • Security Shifts Focus From Defense to Response

    Despite more organizations feeling that they are getting worse at preventing data breaches, the number of businesses that feel better prepared to respond to incidents is on the rise, according to the ...


    READ MORE
    https://www.infosecurity-magazine.com/news/security-shifts-focus-from-defense/5133
  • New Variants Found in Spectre and Meltdown

    Two new variants of the Meltdown and Spectre vulnerabilities that can allow an attacker to gain access to sensitive information have been disclosed, according to a 21 May US-CERT alert. Google and Mic...


    READ MORE
    https://www.infosecurity-magazine.com/news/new-variants-found-in-spectre-and/5128
  • Georgia Votes in Primary amid Cybersecurity Suit

    Despite the continued development of a federal lawsuit regarding the cybersecurity of Georgia's voting machines against Georgia's Secretary of State Brian Kemp and others, today's highly c...


    READ MORE
    https://www.infosecurity-magazine.com/news/georgia-votes-in-primary-amid/5129
  • Unintended Consequences of GDPR Threaten Blockchain, Domain Name IDs

    Some services including the public blockchain that’s at the core of crypto-currency and the internet’s “WHOIS” domain name identification function may run afoul of Europe&rsquo...


    READ MORE
    http://www.eweek.com/security/unintended-consequences-of-gdpr-threaten-blockchain-domain-name-ids5124
  • Pen testers find weaknesses in banks’ cyber security

    Humans are the biggest weakness in banks’ cyber defences, but there are several others that also need attention, penetration testers have revealed. Banks have formidable barriers to external cyb...


    READ MORE
    https://www.computerweekly.com/news/252441525/Pen-testers-find-weaknesses-in-banks-cyber-security5125
  • Cybersecurity the latest battleground for MSPs

    SolarWinds MSP says relationships with customers will suffer if channel doesn’t get security offerings right. Cybersecurity has become the latest battleground where business is won and lost, acc...


    READ MORE
    https://www.computerweekly.com/microscope/news/252441291/Cybersecurity-the-latest-battleground-for-MSPs5120

EVENTS

Conferences

ISSA Mid Atlantic Information Security Conference

ISSA MID ATLANTIC INFORMATION SECURITY CONFERENCE

June 01-01, 2018
SSA Mid Atlantic Information Security Conference and Exhibition is a 1 day event being held on 1st June 2018 at the The Universities at Shady Grove Conference Center in Rockville, USA. This event showcases products like cyber-security, critical information and infrastructure, technology, successful ...

General Cybersecurity Conference

GENERAL CYBERSECURITY CONFERENCE

June 02-02, 2018
Hak4Kidz is the first official youth based ethical hacking conference that is *not* a hackathon. Cipher disc badges There has been a tremendous amount of support from the community at events such as NolaCon, THOTCON, BrrCON, BSides Las Vegas, Def Con, and GrrCON in the form of purchasing the cipher ...

Boston Cyber Security Summit

BOSTON CYBER SECURITY SUMMIT

June 05-05, 2018
Boston Cyber Security Summit is a 1 day event being held on 5 June 2018 in Boston, United States Of America. This event showcases products like This educational and informational forum will focus on educating attendees on how to best protect highly vulnerable business applications and critical infra...

New York State Cyber Security Conference

NEW YORK STATE CYBER SECURITY CONFERENCE

June 05-06, 2018
The New York State Cyber Security Conference, organized by the Office of Information Technology Services will take place from 5th June to the 6th June 2018 at the Empire State Plaza in Albany, United States Of America. The conference will cover areas like lens on key sectors including finance, healt...

Ignite ’18 USA Anaheim

IGNITE ’18 USA ANAHEIM

May 21-24, 2018
As the world’s most disruptive security company, we want our users to get their hands on our disruptive technology as soon as possible. There’s no better place for this than at one of our annual Ignite network security and cybersecurity conferences. If you’re looking for the latest...

FS-ISAC ANNUAL SUMMIT

FS-ISAC ANNUAL SUMMIT

May 20-23, 2018
As Partners in the Information Security community, we are challenged with supporting our corporate strategies that look to leverage advancing technology and services that expand our perimeter boundaries and place a greater demand for protecting the information that our customers and fellow employees...

HACKMIAMI CONFERENCE 6

HACKMIAMI CONFERENCE 6

May 18-20, 2018
The HackMiami 2018 Hackers Conference seeks to bring together the brightest minds within the information security industry and the digital underground. This conference will showcase cutting edge tools, techniques, and methodologies that are at the forefront of the global
threatscape. The conf...

Philadelphia Cybersecurity Conference 2018

PHILADELPHIA CYBERSECURITY CONFERENCE 2018

May 17-17, 2018
Data Connectors will be hosting the Philadelphia Cybersecurity Conference on Thursday, May 17th. The event will start at 8:15 AM with a check-in and opening introductions before presentation sessions begin at 8:45. Between the educational sessions that go throughout the day, there will be time to vi...

 

Webinars

MAY 31, 2018
ANALYTICS-DRIVEN AUTOMATION FOR BETTER ATTACK SURFACE MANAGEMENT
Security automation includes a wide range of technologies, many of which can help shrink the attack surface by driving improvements in firewall and security policy management and vulnerability/threat management. However, whether you’re struggling with compliance and network changes, ...
JUN 05, 2018 | 1:00 pm
ORGANIZATIONAL DYNAMICS OF INFORMATION SECURITY
Positioning Information Security within the enterprise presents its own set of challenges. Our recent survey data from hundreds of senior security and IT leaders like you uncovered a number of systemic security challenges – from skills shortages to retention strategies; not to mentio...
JUN 05, 2018 | 1:00 PM
MALICIOUS INSIDERS: REAL DEFENSE FOR REAL BUSINESSES
Which one of your co-workers will it be? The disgruntled worker with oodles of access privileges? The jet-setting workaholic who will find a workaround for every security measure just so she can stay connected and keep working from anywhere, anytime? The eager-to-please front desk staff wh...
JUN 07, 2018
HOW CAN AN ISO 27001-COMPLIANT ISMS HELP LAW FIRMS ACHIEVE GDPR COMPLIANCE?
Law firms that have suffered data breaches have largely managed to keep out of the media spotlight – with the notable exception of the Panamanian firm Mossack Fonseca – but this will soon change. When the General Data Protection Regulation (GDPR) comes into force in May 2018, l...
JUN 14, 2018
PHISHING: TRENDS, ATTACKS AND DEFENSE STRATEGIES
Phishing: Trends, Attacks and Defense Strategies. REVOLUTIONIZE YOUR PHISHING/EMAIL DEFENSE. With over 1.2 million phishing threats detected in 2017 alone, enterprises are under constant attack.  While Ransomware has received the lion’s share of attention, everyday “beachh...
JUN 14, 2018 | 9:00 AM
GAINING BOARD ALIGNMENT ON CYBER-SECURITY
We know the Board has a key role to play in supporting better cyber-security but with so many pressing and competing issues, how can we raise cyber security up the Board’s agenda? Richard Holmes, VP Secure Systems Engineering, and Gianni Rino, Global Industry Lead for Retail and Cons...

GETTING STARTED WITH WEB APPLICATION SECURITY
Sponsored
Chances are, at any given moment, your organization's web applications are under attack (if not already exploited). Attackers see web applications as the front door: just one vulnerability allows them entry - perhaps to the database supporting the web application or maybe to your busin...
BUSINESS EMAIL MASQUERADING: HOW HACKERS ARE FOOLING EMPLOYEES TO COMMIT FRAUD
In the past year, so-called business email compromise attacks, also known as "masquerading" and "executive impersonation," have emerged as one of the greatest wire fraud worries. These schemes threaten to overshadow what was previously seen from commercial account takeover incidents.
TOP TRENDS AND TAKE-AWAYS FOR CYBERSECURITY
Cybersecurity continues to be one of the top concerns of organizations, even more so as complexity and threats increase. What are the key trends in 2015 for cybersecurity, and what steps can leaders take to prepare? What is the current state of cybersecurity threat and response? What are t...
A COMPREHENSIVE GUIDE TO CONNECTEDNESS WITH TRUST, SECURITY AND ETHICS IN THE DIGITAL BUSINESS
Trust is the foundation of all personal and business transactions. But who can you trust in digital business, with its endless connections and constantly shifting configurations? Trust is hard enough when it's personal, but how do you trust and be trusted when dealing with a multitude ...
WHAT EVERY CIO SHOULD KNOW ABOUT SECURITY, RISK AND VALUE
Although cybersecurity climbs back up the priority list and engaging risk is central to your success in digital business, the risk conversation is changing between you and non-IT executives. You have to balance the need to protect and the need to run your business. Integrating risk and cor...
ONE SIMPLE WAY TO GET YOUR CEO TO EMBRACE RISK MANAGEMENT
Most CEOs or other senior business executives cringe at the thought of having to meet with risk management professionals. By their very nature, CEOs are hard-wired to seek out growth opportunities that will add value to their companies. However, risk management professionals are tasked wit...

RESOURCES

To be fair, its method of assessing the security of operating systems is somewhat bunk. It sets a figure based on the number of vulnerabilities found rather than the importance of those vulnerabilitie...

Given the evolving way Web and Cloud applications are used— and the constantly shifting threat landscape organizations must confront—proxy architecture is more important than ever in terms...

This White Paper offers an overview of ETSI's work on security in Information and Communications Technologies (ICT). Each section introduces a specific technology and outlines ETSI's involveme...

Sony, Target, Westinghouse, Home Depot, U.S. Steel, Neiman Marcus, and the National Security Agency (NSA). The security breaches suffered by these and many other organizations, including most recently...

The ever-changing threat landscape requires more robust security risk management programs that can defend against the unknown. This survey assesses how healthcare entities are doing with regulatory co...

Threat intelligence is rapidly becoming an ever-higher business priority. There is a general awareness of the need to ‘do’ threat intelligence, and vendors are falling over themselves to o...

Enterprise Chief Security Officers (CSOs) face a myriad of challenges in protecting their organizations’ most confidential business documents as they flow inside and outside of the firm. In addi...

Decades ago, a group of merchants created a concept of general average—which is when all parties in a maritime venture share in losses resulting from a sacrifice of cargo in an emergency. What t...

Enterprises increasingly rely upon third-party software and services to handle business-critical processes and operations. Whether on-premises or in the cloud, these solutions must provide a level of ...