• NEWS

    NEWS

    THE LATEST NEWS, DEVELOPMENTS AND ANNOUNCEMENTS AS THEY HAPPEN

    more
  • EVENTS

    EVENTS

    CONFERENCES, TRADE SHOWS, LIVE WEBCASTS, NEW LAUNCHES, SEMINARS AND TRAINING EVENTS

    more
  • COMPANIES

    COMPANIES

    PARTNERS, SOLUTIONS & SERVICE PROVIDERS, SUPPLIERS AND INDUSTRY ORGANIZATIONS

    more
  • RESOURCES

    RESOURCES

    WHITEPAPERS, MARKET REPORTS, RESEARCH, ON-DEMAND WEBINARS, VIDEOS AND INFOGRAPHICS

    more

NEWS

   

    home.aspx
  • PUB File That Drops Ammyy Targeted 2,700 Banks

    A campaign that began weeks ago and targeted approximately 2,700 Fortune 100 banking institutions in the US and around the world with a widespread botnet attack came to a sudden halt as of 15:37 EST o...


    READ MORE
    https://www.infosecurity-magazine.com/news/pub-file-that-drops-ammyy-targeted/5356
  • 36 states are using this hacking detection sensor to protect the midterm elections

    The US is beefing up voter system security in preparation for the 2018 elections. Most US states have employed Albert sensors, a technology that could detect hacking attempts and send alerts to federa...


    READ MORE
    https://www.cnet.com/news/36-states-are-using-this-hacking-detection-sensor-to-protect-the-midterm-elections/5357
  • NSA Insider Teaches Next-Gen IT Strategie

    Given the cybersecurity threats that present risks to individuals, organizations and government entities around the globe, cybersecurity professionals need to know how to defend against current and em...


    READ MORE
    https://www.infosecurity-magazine.com/news/nsa-insider-teaches-nextgen-it/5352
  • Credential-Stealing Financial Trojan Targets Banks

    Financial institutions have long been the target of cyberattack, and today researchers at Cyberbit announced they have discovered a new variant of Trickbot, a modular malware and well-known financial ...


    READ MORE
    https://www.infosecurity-magazine.com/news/credential-stealing-financial/5353
  • Cyber-Security Failure Brings Societal Risks: Black Hat Researchers

    The IT industry and connected device makers have to become more ambitious and strategic about building strong security into their software and hardware, say security researchers at the Black Hat 2018 ...


    READ MORE
    http://www.eweek.com/security/cyber-security-failure-brings-societal-risks-black-hat-researchers5348
  • DHS Using Red Team Approach to Improve National Cyber-Security

    Leaders of the Department of Homeland Security (DHS) National Cybersecurity Assessments and Technical Services (NCATS) explain at DEF CON about how conducting penetration testing against government an...


    READ MORE
    http://www.eweek.com/security/dhs-using-red-team-approach-to-improve-national-cyber-security5349
  • New Security Awareness Practitioner Certification

    Recognizing that the weak link in most security chains is human beings, the InfoSec Institute announced a new certification for security awareness practitioners. The Certified Security Awareness Pract...


    READ MORE
    https://www.infosecurity-magazine.com/news/new-security-awareness/5344
  • Risk of Fraud in Mobile Point-of-Sale Device Flaw

    At yesterday’s final day of Black Hat USA 2018, researchers from Positive Technologies demonstrated how attackers could exploit a flaw in mobile point-of-sale (mPOS) devices to charge fraudulent...


    READ MORE
    https://www.infosecurity-magazine.com/news/risk-of-fraud-in-mobile/5345
  • A New Guide to Implementing a Successful DLP Program

    With an ever-expanding attack surface, organizations are at greater risk of having sensitive data leaked, according to Information Security Forum (ISF), which announced the release of its new digest, ...


    READ MORE
    https://www.infosecurity-magazine.com/news/new-guide-to-implementing/5340

EVENTS

Conferences

Gartner Security & Risk Management Summit 2018

GARTNER SECURITY & RISK MANAGEMENT SUMMIT 2018

August 20-21, 2018
Make sure you have the latest insights on fast-moving IT trends such as IoT and AI, evolving security technologies and the ever-changing threat landscape. At Gartner Security & Risk Management Summit 2018, you’ll find comprehensive coverage of today’s top priorities for security and ...

13th Annual SecureWorld Bay Area

13TH ANNUAL SECUREWORLD BAY AREA

August 21-21, 2018
Cyber Risk Management is increasingly becoming more important and becoming a matter important enough for highest levels in companies. Recent changes like NIST Cyber Security Framework, EU PSD2 etc demonstrate increasing focus on risk by standards bodies and governments. Speaker shall draw upon his t...

Freedom to Connect Mind Versus Machine CLOUDSEC Australia 2018

FREEDOM TO CONNECT MIND VERSUS MACHINE CLOUDSEC AUSTRALIA 2018

August 28-28, 2018
The Internet of Things, cloud computing, and advancements in machine learning, artificial intelligence, and other computing technologies, make it easier for individuals and organisations to imagine a future where everyone and everything is free to connect with one another: secure, trusted, and unint...

Cyber Security Summit: Chicago

CYBER SECURITY SUMMIT: CHICAGO

August 29-29, 2018
The third annual Cyber Security Summit: Chicago connects C-Suite & Senior Executives responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. Admission is $350 each, giving you access to all Interacti...

The 2018 CyberTexas Conference

THE 2018 CYBERTEXAS CONFERENCE

August 14-15, 2018
The 2018 CyberTexas Conference will bring members of the CyberUSA community together with industry and government members of Texas to create long-term values for the cybersecurity ecosystem in San Antonio and the state of Texas. This conference is brought to you by the CyberTexas Foundation and the ...

The Diana Initiative

THE DIANA INITIATIVE

August 09-10, 2018
On Thursday August 9th and Friday 10th 2018, The Diana Initiative will host a two day conference celebrating diversity, women in InfoSec, and how to pursue a career in information security and technology. The Diana Initiative 2018 theme is “Hacker Family: Our Diversity Unifies Us.” Our m...

Sacramento Cyber Security Conference

SACRAMENTO CYBER SECURITY CONFERENCE

August 09-09, 2018
The Sacramento Cyber Security Conference, organized by the Data Connectors, LLC will take place on 9th August 2018 at the Doubletree Hotel Sacramento in Sacramento, United States Of America. The conference will cover areas like discussing current tech-security issues such as cloud security, email an...

Black Hat USA 2018

BLACK HAT USA 2018

August 04-09, 2018
Now in its 21st year, Black Hat USA is the world's leading information security event, providing attendees with the very latest in research, development and trends. Black Hat USA 2018 opens with four days of technical Trainings (August 4 – 7) followed by the two-day main conference (August...

 

Webinars

AUG 23, 2018 | 09:00 AM
Sponsored
NO ONE MARRIES A BAD FIRST DATE. IS SALES HAVING BAD FIRST CALLS?
There’s no recovery from a bad first impression both in dating and sales. Your sales reps need to sell better and smarter from the onset to ensure a good customer experience. Over the last few years, quota attainment has been declining, even as sales quotas have shrunk. Ask yourself,...
AUG 21, 2018 | 2:00 PM
UNDERSTANDING AND PREVENTING THE LATEST SOCIAL ENGINEERING ATTACKS
While hackers and cyber attackers are continually developing more sophisticated methods for penetrating enterprise systems, most of their exploits begin with a simple step: fooling users into breaking security policy. These "social engineering" attacks – including phishing,...
AUG 22, 2018
CYBERSECURITY AND HIPAA FOR BOARDS AND DIRECTORS
This webinar will discuss the importance of cyber security as a matter of preparedness based on a recent HHS Office for Civil Rights Notice and applicable legal obligations. This webinar will include a review recent trends, reported breach incidents and other real-life examples in the long...
AUG 22, 2018 | 1:00 PM
ENDGAME ENDS DOCUMENT-BASED PHISHING
According to the 2018 Verizon Data Breach Investigations Report, “… on average 4% of people in any given phishing campaign will click it...” Successful attacks are inevitable. Just this year we saw cyberattacks on the World Cup, PyeongChang Winter Olympics, financial, ch...
AUG 24, 2018 | 6:00 AM
SIEM: ENABLING THE INTELLIGENCE AROUND CYBER AND OPERATIONAL THREATS
Join LogPoint’ Friday webinar where you will learn how: LogPoint SIEM solution is tailored to solve the specific security management challenges of any organisation, whether the goal is compliance, application security monitoring, operational insight or protection from cyber-attacks. ...
AUG 28, 2018 | 1:00 PM
FIGHTING FILELESS MALWARE ATTACKS
With more than 60% of today’s attacks involving fileless techniques, early detection and response is more important than ever. New variants of fileless attacks are emerging daily, requiring new approaches to prevention. Join us as we explore the latest fileless attack techniques, how...

PANEL: FRAUD INVESTIGATIONS - HOW TO WORK EFFECTIVELY WITH LAW ENFORCEMENT, GOVERNMENT & LITIGATORS
Public-sector organizations need to better understand the driving forces, priorities and procedures within the organizations they "protect." But equally as important is that the private-sector organizations reciprocate and understand the how, what and why of the law enforcement/public body...
SUPPLY CHAIN SECURITY - THE FIRST AND WEAKEST LINK IN THE CHAIN?
Do you have a supply chain or just vendors? Do any or all of them present a breach potential? We apply massive resources to hardening perimeters and preventing infiltration of our information security systems, but what if our adversaries have a built-in presence and already have a foothold...
THE LEGAL ISSUES OF USING BIG DATA TO COMBAT FRAUD
More and more, instances of fraud are taking place in a digital context. A robust cyber security strategy therefore is essential. This insightful session will share an overview of the key regulatory steps that an organisation should take in order to achieve cyber security compliance as wel...
2015 FACES OF FRAUD - LONDON
As recent incidents prove: Retail point-of-sale breaches are on the rise, creating greater payment card fraud headaches for banking institutions. How does the impact of these crimes compare to that of account takeover, check fraud, insider crimes and the emerging realms of virtual and mobi...
CEO'S ROLE IN THE FIGHT AGAINST FRAUD
In today's era of digital fraud, CEOs need to have a thorough understanding of threats and risks as well as the urgency of properly assessing and responding to incidents. It is not IF but WHEN your organisation will suffer a security breach. Without this understanding and an ability to...
BUSINESS EMAIL MASQUERADING: HOW HACKERS ARE FOOLING EMPLOYEES TO COMMIT FRAUD
In the past year, so-called business email compromise attacks, also known as "masquerading" and "executive impersonation," have emerged as one of the greatest wire fraud worries. These schemes threaten to overshadow what was previously seen from commercial account takeover incidents.

RESOURCES

To be fair, its method of assessing the security of operating systems is somewhat bunk. It sets a figure based on the number of vulnerabilities found rather than the importance of those vulnerabilitie...

Given the evolving way Web and Cloud applications are used— and the constantly shifting threat landscape organizations must confront—proxy architecture is more important than ever in terms...

Current challenges. According to the ACSC Threat Report 2017, cybercrime is a prevalent threat for Australia. It enables criminals to generate large profits with a low risk of identification and preve...

This White Paper offers an overview of ETSI's work on security in Information and Communications Technologies (ICT). Each section introduces a specific technology and outlines ETSI's involveme...

Sony, Target, Westinghouse, Home Depot, U.S. Steel, Neiman Marcus, and the National Security Agency (NSA). The security breaches suffered by these and many other organizations, including most recently...

The ever-changing threat landscape requires more robust security risk management programs that can defend against the unknown. This survey assesses how healthcare entities are doing with regulatory co...

Threat intelligence is rapidly becoming an ever-higher business priority. There is a general awareness of the need to ‘do’ threat intelligence, and vendors are falling over themselves to o...

Enterprise Chief Security Officers (CSOs) face a myriad of challenges in protecting their organizations’ most confidential business documents as they flow inside and outside of the firm. In addi...

Decades ago, a group of merchants created a concept of general average—which is when all parties in a maritime venture share in losses resulting from a sacrifice of cargo in an emergency. What t...