• NEWS

    NEWS

    THE LATEST NEWS, DEVELOPMENTS AND ANNOUNCEMENTS AS THEY HAPPEN

    more
  • EVENTS

    EVENTS

    CONFERENCES, TRADE SHOWS, LIVE WEBCASTS, NEW LAUNCHES, SEMINARS AND TRAINING EVENTS

    more
  • COMPANIES

    COMPANIES

    PARTNERS, SOLUTIONS & SERVICE PROVIDERS, SUPPLIERS AND INDUSTRY ORGANIZATIONS

    more
  • RESOURCES

    RESOURCES

    WHITEPAPERS, MARKET REPORTS, RESEARCH, ON-DEMAND WEBINARS, VIDEOS AND INFOGRAPHICS

    more

NEWS

   

    home.aspx
  • Hackers Win Big by Gambling on Identity Spoofing

    In analyzing global cybercrime patterns ThreatMetrix found that identity spoofing, fueled by stolen identity data, is the most prevalent attack vector for the gaming and gambling industry. Additionall...


    READ MORE
    https://www.infosecurity-magazine.com/news/hackers-win-big-by-gambling-on/5478
  • Google+ Updated for Enterprise Users as Consumer Version Shuts Down

    Google+ had a major vulnerability, but it wasn't a breach and Google+ isn't entirely dead (yet) either. If you're not a regular user of the Google Plus+ networking service, you're not ...


    READ MORE
    http://www.eweek.com/security/google-updated-for-enterprise-users-as-consumer-version-shuts-down5479
  • Palo Alto Networks Uncovers Flash Updater Cryptojacking Campaign

    In addition to getting a legitimate Flash Player update, victims of a new campaign uncovered by Palo Alto Networks' Unit 42 also got the XMRig cryptocurrency mining software. The scourge that is u...


    READ MORE
    http://www.eweek.com/security/palo-alto-networks-uncovers-flash-updater-cryptojacking-campaign5474
  • FICO, Chamber of Commerce release tool to score businesses on cybersecurity

    FICO and the U.S. Chamber of Commerce released a new tool Thursday to score how strong businesses' protections are when it comes to cybersecurity. The tool, called the Assessment of Business Cyber...


    READ MORE
    https://thehill.com/policy/cybersecurity/411039-fico-chamber-of-commerce-release-tool-to-score-businesses-on5475
  • ISC2Congress: The Promise of Blockchain

    Blockchain is revolutionizing the global economy, according to Nitin Uttreja and Ashish Dwivedi of CA Technologies. In their session, How Blockchain Is Revolutionizing Cybersecurity, Uttreja and Dwive...


    READ MORE
    https://www.infosecurity-magazine.com/news/isc2congress-the-promise-of/5470
  • Why CISOs Fumble with Understanding Security Needs

    A set of new polls conducted within the IT industry shows that spending on IT security is slightly up, but that plans for future spending are for initiatives that are actually symptoms of a larger pro...


    READ MORE
    http://www.eweek.com/security/why-cisos-fumble-with-understanding-security-needs5471
  • ISC2Congress Threats to Enterprises Just Starting

    As the threat landscape continues to evolve, many who are overwhelmed today may not have the time to think about whether they are prepared for the threats of tomorrow. Those who attended Viruses, Troj...


    READ MORE
    https://www.infosecurity-magazine.com/news/isc2congress-threats-to/5466
  • Symantec Brings Workload Assurance Security to the Cloud

    Symantec announced a series of new and improved products and services on Oct. 9, all designed to help advance the state of security in the cloud. Among the new offerings announced by Symantec is Cloud...


    READ MORE
    http://www.eweek.com/security/symantec-brings-workload-assurance-security-to-the-cloud5467
  • ISC2Congress Will Gamers Build a Secure Future?

    Director of game research and development for the Institute for the Future, Jane McGonigal, opened her luncheon keynote at the 2018 Security Congress with what she considered exciting news by announci...


    READ MORE
    https://www.infosecurity-magazine.com/news/isc2congress-will-gamers-build-a/5461

EVENTS

Conferences

FT Cyber Security Summit

FT CYBER SECURITY SUMMIT

October 15-16, 2018
The FT Cyber Security Summit returns to London in October, exploring the increasingly complex threat landscape faced by companies globally. Using brand new and bespoke interactive formats, we will assess the risks faced by the world's most prominent organisations, and pinpoint the solutions they...

Cyber Security Summit Phoenix

CYBER SECURITY SUMMIT PHOENIX

October 16-16, 2018
The inaugural Cyber Security Summit: Phoenix connects C-Suite & Senior Executives responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. Admission is $350 each, giving you access to all Interactive ...

Cybersecurity Nexus (CSX) 2018 North America Conference

CYBERSECURITY NEXUS (CSX) 2018 NORTH AMERICA CONFERENCE

October 15-17, 2018
CSX 2018 enables you to: Stay on top of the latest cyber security trends, further your cyber career, and make new connections with professionals around the world. Join a global conversation with professionals facing the same challenges as you at the nexus—where all things cyber security meet.

Fort Gordon Cyber Security and Technology Day

FORT GORDON CYBER SECURITY AND TECHNOLOGY DAY

October 17-17, 2018
Fort Gordon Cyber Security and Technology Day is a 1 day event being held on 17th oct 2018 in Augusta, United States Of America. This event showcases product from Industrial Products industry. This event showcases products like Cyber Security Cloud Computing Military Booster Amplifiers Big Data Anal...

14th Annual SecureWorld Dallas

14TH ANNUAL SECUREWORLD DALLAS

October 10-11, 2018
Conference Agenda. Data Breach Digest – Perspective is Reality. Data breaches are complex affairs. Response activities are proportionately complex involving various stakeholders with slightly different perspective. This presentation covers the 2017 “Data Breach Digest – Perspective...

IN A WORLD OF PREDATORS, CYBER DEFENCE IS YOUR TOP PRIORITY

IN A WORLD OF PREDATORS, CYBER DEFENCE IS YOUR TOP PRIORITY

October 10-11, 2018
Master the skills to navigate the depths of the dark web and cyberthreats at Cloud & Cyber Security Expo 2018 – Asia’s fastest growing IT security show. A record-breaking 14,054* qualified enterprise and service providers buyers (BPA audited) walked through the doors of Marina Bay Sa...

SAP Customer Experience LIVE

SAP CUSTOMER EXPERIENCE LIVE

October 10-11, 2018
In a world of constant change and fierce competition, trust and service are more important than ever before. Every sector and region is under pressure from major global trends. Customers want meaningful, timely, and personalized engagements. Businesses want to drive profits and growth, but to do tha...

ATM & Cyber Security 2018

ATM & CYBER SECURITY 2018

October 09-10, 2018
ATM & Cyber Security 2018 is the world's leading conference focused on physical and logical ATM security. The 2017 event attracted a record 400 delegates, representing more than 150 organisations from over 40 countries worldwide.

 

Webinars

OCT 18, 2018 | 3:30 PM
SEEING BEYOND THE HYPE: THE POWER OF AI AND ML TO DETECT ADVANCED THREATS
In a recent Ponemon survey on cyber resilience, respondents reported that both the time to respond to attacks and the severity of the attacks have increased. They also reported that the number one barrier to cyber resilience is the "lack of investment in new cybersecurity technologies...
OCT 23, 2018
2018 APPLICATION SECURITY STATISTICS REPORT EXPLAINED
It’s not just a good theory. This year WhiteHat has partnered with strategic partners Coalfire and Now Secure on the 2018 Application Security Statistics Report. We analyzed data from more than 20,000 applications to provide a true state of application security report. According to t...
OCT 24, 2018 | 08:00 am
BUILDING CUSTOMER TRUST AND LOYALTY: GAINING A COMPETITIVE EDGE IN A HIGHLY REGULATED MARKET
One constant is that trust is paramount. Thanks to evolving customer mindsets surrounding issues such as cybersecurity and personal data, however, there is an opportunity for energy retailers to make compliance a business benefit. In an increasingly competitive energy retail market, demons...
OCT 25, 2018 | 2:00 PM
MAXIMIZE REVENUE WITH AI-POWERED SELLING
Empowering sales reps with the tools they need to be more effective, efficient, and intelligent is paramount in creating a better customer experience. Learn how companies are leveraging the simplicity, performance and embedded intelligence of SAP CPQ to increase revenue by offering the rig...
OCT 26, 2018 | 11:30 AM
PRIVILEGED ACCOUNT ATTACKS – ARE YOU READY?
Privileged accounts are a highly targeted attack vector, yet managing privileged credentials can be a major challenge. A recent study found that 60% of security professionals indicate that privileged access management (PAM) is a requirement to demonstrate compliance with regulations. Organ...
OCT 29, 2018 | 1 PM
SEEING RED: UNDERSTANDING RED TEAM SECURITY
As the number and scope of cyberattacks on corporate networks increase, organizations must remain vigilant as they try to stay one step ahead of the threats. Red teams can help organizations understand how well their networks, applications and security controls can withstand an attack. But...

PANEL: FRAUD INVESTIGATIONS - HOW TO WORK EFFECTIVELY WITH LAW ENFORCEMENT, GOVERNMENT & LITIGATORS
Public-sector organizations need to better understand the driving forces, priorities and procedures within the organizations they "protect." But equally as important is that the private-sector organizations reciprocate and understand the how, what and why of the law enforcement/public body...
SUPPLY CHAIN SECURITY - THE FIRST AND WEAKEST LINK IN THE CHAIN?
Do you have a supply chain or just vendors? Do any or all of them present a breach potential? We apply massive resources to hardening perimeters and preventing infiltration of our information security systems, but what if our adversaries have a built-in presence and already have a foothold...
THE LEGAL ISSUES OF USING BIG DATA TO COMBAT FRAUD
More and more, instances of fraud are taking place in a digital context. A robust cyber security strategy therefore is essential. This insightful session will share an overview of the key regulatory steps that an organisation should take in order to achieve cyber security compliance as wel...
2015 FACES OF FRAUD - LONDON
As recent incidents prove: Retail point-of-sale breaches are on the rise, creating greater payment card fraud headaches for banking institutions. How does the impact of these crimes compare to that of account takeover, check fraud, insider crimes and the emerging realms of virtual and mobi...
CEO'S ROLE IN THE FIGHT AGAINST FRAUD
In today's era of digital fraud, CEOs need to have a thorough understanding of threats and risks as well as the urgency of properly assessing and responding to incidents. It is not IF but WHEN your organisation will suffer a security breach. Without this understanding and an ability to...
BUSINESS EMAIL MASQUERADING: HOW HACKERS ARE FOOLING EMPLOYEES TO COMMIT FRAUD
In the past year, so-called business email compromise attacks, also known as "masquerading" and "executive impersonation," have emerged as one of the greatest wire fraud worries. These schemes threaten to overshadow what was previously seen from commercial account takeover incidents.

RESOURCES

To be fair, its method of assessing the security of operating systems is somewhat bunk. It sets a figure based on the number of vulnerabilities found rather than the importance of those vulnerabilitie...

Given the evolving way Web and Cloud applications are used— and the constantly shifting threat landscape organizations must confront—proxy architecture is more important than ever in terms...

Current challenges. According to the ACSC Threat Report 2017, cybercrime is a prevalent threat for Australia. It enables criminals to generate large profits with a low risk of identification and preve...

Cyber risks pose unique threats to financial stability that are not well understood or managed, despite growing investment in research and dependence by financial institutions, consumers, and governme...

This White Paper offers an overview of ETSI's work on security in Information and Communications Technologies (ICT). Each section introduces a specific technology and outlines ETSI's involveme...

Sony, Target, Westinghouse, Home Depot, U.S. Steel, Neiman Marcus, and the National Security Agency (NSA). The security breaches suffered by these and many other organizations, including most recently...

The ever-changing threat landscape requires more robust security risk management programs that can defend against the unknown. This survey assesses how healthcare entities are doing with regulatory co...

Threat intelligence is rapidly becoming an ever-higher business priority. There is a general awareness of the need to ‘do’ threat intelligence, and vendors are falling over themselves to o...

Decades ago, a group of merchants created a concept of general average—which is when all parties in a maritime venture share in losses resulting from a sacrifice of cargo in an emergency. What t...