• NEWS

    NEWS

    THE LATEST NEWS, DEVELOPMENTS AND ANNOUNCEMENTS AS THEY HAPPEN

    more
  • EVENTS

    EVENTS

    CONFERENCES, TRADE SHOWS, LIVE WEBCASTS, NEW LAUNCHES, SEMINARS AND TRAINING EVENTS

    more
  • COMPANIES

    COMPANIES

    PARTNERS, SOLUTIONS & SERVICE PROVIDERS, SUPPLIERS AND INDUSTRY ORGANIZATIONS

    more
  • RESOURCES

    RESOURCES

    WHITEPAPERS, MARKET REPORTS, RESEARCH, ON-DEMAND WEBINARS, VIDEOS AND INFOGRAPHICS

    more

NEWS

   

    home.aspx
  • House Releases Cybersecurity Strategy Report

    The House Energy and Commerce Committee released the comprehensive Cybersecurity Strategy Report, in which it identified procedures to both address and prevent cybersecurity incidents. In the report, ...


    READ MORE
    https://www.infosecurity-magazine.com/news/house-releases-cybersecurity/5676
  • Privacy a Key Concern for Telecoms and Consumers

    Two recently published surveys about the telecom industry revealed that privacy as it relates to security and the internet of things (IoT) has become a top concern for both businesses and consumers. A...


    READ MORE
    https://www.infosecurity-magazine.com/news/privacy-key-concern-for-telecoms/5677
  • DanaBot Trojan Expands Beyond Banking

    Banking Trojan DanaBot has reportedly resurfaced with some new tricks. According to malware analysts at ESET, the Trojan has evolved beyond banking and is now being used to send spam directly to a vic...


    READ MORE
    https://www.infosecurity-magazine.com/news/danabot-trojan-expands-beyond/5678
  • Nearly 70% of UK Firms Hit by a Cyber-Attack in 2018

    Over two-thirds of UK firms have fallen victim to a cyber-attack over the past year, with many claiming they don’t get enough guidance from the government on how to combat threats, according to ...


    READ MORE
    https://www.infosecurity-magazine.com/news/nearly-70-of-uk-firms-hit-by-a/5679
  • Attacking from inside, cyber crooks rake in millions from banks

    Kaspersky Lab researchers revealed that cyber-crooks stole tens of millions of dollars by hacking Eastern European banks through direct connections to local networks. At least eight banks, dubbed coll...


    READ MORE
    https://www.csoonline.com/article/3327237/security/attacking-from-inside-cyber-crooks-rake-in-millions-from-banks.html5680
  • First neural network to protect infrastructure from cyber warfare

    Symantec has unveiled an Industrial Control System Protection (ICSP) Neural, the industry’s first neural network-integrated USB scanning station that helps organisations protect critical infrast...


    READ MORE
    https://www.defenceconnect.com.au/intel-cyber/3271-first-neural-network-to-protect-infrastructure-from-cyber-warfare5660
  • DarkVishnya Attacks Target Eastern European Banks

    A series of cyber-robbery attacks have been targeting financial organizations in Eastern Europe, according to new research from Kaspersky Lab. Researchers found that the series of attacks, dubbed Dark...


    READ MORE
    https://www.infosecurity-magazine.com/news/darkvishnya-attacks-target-eastern/5665
  • GDPR Implementation Slow but Improving

    According to the EU GDPR (General Data Protection Regulation) Implementation Review Survey conducted by IT Governance, six months after the GDPR went into effect, the majority of organizations are fai...


    READ MORE
    https://www.infosecurity-magazine.com/news/gdpr-implementation-slow-but/5666
  • Two-Fifths of Firms Have Suffered "BPC" Attacks

    Over two-fifths of organizations have fallen victim to a so-called Business Process Compromise (BPC) attack, despite widespread ignorance from senior execs about the threat, according to Trend Micro. ...


    READ MORE
    https://www.infosecurity-magazine.com/news/twofifths-of-firms-have-suffered/5667

EVENTS

Conferences

CYBER SECURITY EXCHANGE | US

CYBER SECURITY EXCHANGE | US

December 10-12, 2018
The cybersecurity landscape remains vulnerable to a wide range of physical and cyber threats. Sophisticated cyber criminals, nation states and some insiders take information and deliberately disrupt the delivery of services and information. True cyber resiliency requires a proactive synergy of peopl...

INTERNATIONAL CONFERENCES ON CYBER SECURITY AND COMMUNICATION SYSTEMS

INTERNATIONAL CONFERENCES ON CYBER SECURITY AND COMMUNICATION SYSTEMS

December 10-12, 2018
The conferences on network security and communication engineering is meant to serve as a forum for exchanging new developments and research progresses between scholars, scientists and engineers all over the world and providing a unique opportunity to exchange information, to present the latest resul...

CYBERTECH THE EVENT FOR THE CYBER INDUSTRY

CYBERTECH THE EVENT FOR THE CYBER INDUSTRY

January 28-30, 2019
Cybertech is the cyber industry’s foremost B2B networking platform conducting industry-related events all around the globe. From Tel Aviv and Rome, to Tokyo, Singapore, Panama, and more, our conferences and exhibitions serve as the go-to place to learn all about the latest technological innova...

Cybersecurity Leadership Summit 2019 USA

CYBERSECURITY LEADERSHIP SUMMIT 2019 USA

February 11-11, 2019
Cybersecurity is about humans, skills, and knowledge. So is the KuppingerCole's Cybersecurity Leadership Summit in Washington, DC, USA (#CSLSUS19). Discussing face-to-face with your peers about trends, hypes and evolving threats, getting trained in thinking the unthinkable to be better prepared ...

2018 Annual Computer Security Applications Conference

2018 ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE

December 03-07, 2018
ACSAC brings together cutting-edge researchers, with a broad cross-section of security professionals drawn from academia, industry, and government, gathered to present and discuss the latest security results and topics. With peer reviewed technical papers, invited talks, panels, national interest di...

Cyber Security Indonesia conference 2018

CYBER SECURITY INDONESIA CONFERENCE 2018

December 05-07, 2018
Indonesia is at the epicenter of the world’s cyber vulnerability, being globally recognized as the world’s largest source of cyber-attacks. Poorly secured servers in Indonesia are being used not only to strike at domestic targets, but also as a launch pad for targets across the globe. Th...

Cyber Security Conference & Expo

CYBER SECURITY CONFERENCE & EXPO

December 06-06, 2018
The Cyber Security Conference & Expo, organized by the Data Connectors LLC will take place on 6th Dec 2018 at the Ronald Reagan Building and International Trade Center in Washington, United States Of America. The conference will cover areas like from mobile devices and social media to virtualiza...

Black Hat EUROPE 2018

BLACK HAT EUROPE 2018

December 03-06, 2018
Black Hat provides attendees with the very latest in research, development, and trends in Information Security. Here the brightest professionals and researchers in the industry will come together for a total of four days—two or four days of deeply technical hands-on Trainings, followed by two ...

 

Webinars

DEC 11, 2018 | 3:00 pm
TRENDS IN CYBER ATTACKS AND BREACHES
The changing threat landscape reality and the frequency, sophistication and targeted nature of adversaries requires an evolution of security operational practices to a combination of prevention, detection and response of cyberattacks.
DEC 11, 2018 | 3:30 PM
5 ENDPOINT PROTECTION BEST PRACTICES
Today’s threat landscape and motivation by adversaries have resulted in more sophisticated and automated attacks. Nearly every attack relies on compromising an endpoint. Although most organizations have deployed endpoint protection, infections are still commona different approach is ...
DEC 11, 2018 | 11:00 A.M.
2019 CYBER SECURITY THREAT PREDICTIONS
2019 is around the corner, are you ready for the cyber security threats that come with it? The current threat forecast looks grim for consumers and businesses. Join this webinar featuring guest Forrester to bring you the Cyber Security Threat Predictions for 2019. Hosted by: Check Point Th...
DEC 12, 2018 | 12:00 PM
INSIDER THREATS AND THEIR IMPACT ON 911
Protecting our 9-1-1 Emergency Communication Centers (ECCs) from cyber-attacks involves more than just technology. Your staff's actions are a key part of your cyber-health, and can be a critical asset if they are properly trained. Unfortunately, whether accidental or intentional, your ...
DEC 12, 2018 | 12:00 pm
ASSESSING CYBERSECURITY RISK ACROSS THE PORTFOLIO
The private equity world has started to recognize the value in cybersecurity. Threats such as ransomware and phishing scams can have an adverse effect on the bottom line, so ensuring that cybersecurity risk is adequately addressed is imperative. This session will outline a practical approa...
DEC 12, 2018
MALWARE, SECURITY ANALYTICS, AND CYBERSECURITY IN 2019
There were 5.99 billion malware attacks in the first half of 2018 – the City of Atlanta spent $2.6M to recover from a SamSam ransomware attack in May, Under Armour reported a data breach that affected 150 million users, and cryptomining malware is just getting started.

TRY FALCON PREVENT™ START YOUR 15-DAY FREE TRIAL
Sponsored
CrowdStrike is the leader in cloud-delivered next-generation endpoint protection. CrowdStrike has revolutionized endpoint protection by being the first and only company to unify next-generation antivirus, endpoint detection and response (EDR),and a 24/7 managed hunting service — all ...
TODAY’S TOP SECURITY CONCERNS: ARE YOUR ERP APPLICATIONS READY?
Sponsored
In recent 451 Research studies, enterprises continue to report three primary security concerns. These challenges affect overall cybersecurity strategies as well as an organization’s business-critical application security: The maintenance of security hygiene is not just an ongoing issue for...
PANEL: FRAUD INVESTIGATIONS - HOW TO WORK EFFECTIVELY WITH LAW ENFORCEMENT, GOVERNMENT & LITIGATORS
Public-sector organizations need to better understand the driving forces, priorities and procedures within the organizations they "protect." But equally as important is that the private-sector organizations reciprocate and understand the how, what and why of the law enforcement/public body...
SUPPLY CHAIN SECURITY - THE FIRST AND WEAKEST LINK IN THE CHAIN?
Do you have a supply chain or just vendors? Do any or all of them present a breach potential? We apply massive resources to hardening perimeters and preventing infiltration of our information security systems, but what if our adversaries have a built-in presence and already have a foothold...
THE LEGAL ISSUES OF USING BIG DATA TO COMBAT FRAUD
More and more, instances of fraud are taking place in a digital context. A robust cyber security strategy therefore is essential. This insightful session will share an overview of the key regulatory steps that an organisation should take in order to achieve cyber security compliance as wel...
2015 FACES OF FRAUD - LONDON
As recent incidents prove: Retail point-of-sale breaches are on the rise, creating greater payment card fraud headaches for banking institutions. How does the impact of these crimes compare to that of account takeover, check fraud, insider crimes and the emerging realms of virtual and mobi...

RESOURCES

To be fair, its method of assessing the security of operating systems is somewhat bunk. It sets a figure based on the number of vulnerabilities found rather than the importance of those vulnerabilitie...

Given the evolving way Web and Cloud applications are used— and the constantly shifting threat landscape organizations must confront—proxy architecture is more important than ever in terms...

Current challenges. According to the ACSC Threat Report 2017, cybercrime is a prevalent threat for Australia. It enables criminals to generate large profits with a low risk of identification and preve...

Cyber risks pose unique threats to financial stability that are not well understood or managed, despite growing investment in research and dependence by financial institutions, consumers, and governme...

This White Paper offers an overview of ETSI's work on security in Information and Communications Technologies (ICT). Each section introduces a specific technology and outlines ETSI's involveme...

Sony, Target, Westinghouse, Home Depot, U.S. Steel, Neiman Marcus, and the National Security Agency (NSA). The security breaches suffered by these and many other organizations, including most recently...

The ever-changing threat landscape requires more robust security risk management programs that can defend against the unknown. This survey assesses how healthcare entities are doing with regulatory co...

Threat intelligence is rapidly becoming an ever-higher business priority. There is a general awareness of the need to ‘do’ threat intelligence, and vendors are falling over themselves to o...

Decades ago, a group of merchants created a concept of general average—which is when all parties in a maritime venture share in losses resulting from a sacrifice of cargo in an emergency. What t...