• NEWS

    NEWS

    THE LATEST NEWS, DEVELOPMENTS AND ANNOUNCEMENTS AS THEY HAPPEN

    more
  • EVENTS

    EVENTS

    CONFERENCES, TRADE SHOWS, LIVE WEBCASTS, NEW LAUNCHES, SEMINARS AND TRAINING EVENTS

    more
  • COMPANIES

    COMPANIES

    PARTNERS, SOLUTIONS & SERVICE PROVIDERS, SUPPLIERS AND INDUSTRY ORGANIZATIONS

    more
  • RESOURCES

    RESOURCES

    WHITEPAPERS, MARKET REPORTS, RESEARCH, ON-DEMAND WEBINARS, VIDEOS AND INFOGRAPHICS

    more

NEWS

   

    home.aspx
  • Constant offensive cyberattacks approved by Pentagon

    The Pentagon reportedly approved the use of offensive cyberattacks by the U.S. Cyber Command, and one expert said enterprises should be ready to handle the 'return fire.' In a move with no pub...


    READ MORE
    https://searchsecurity.techtarget.com/news/252443412/Constant-offensive-cyberattacks-approved-by-Pentagon5202
  • Pulse Secure Appliances Available on Microsoft Azure

    The company's security-enhancing technology now enables customers to extend secure access to applications, data and other cloud-computing resources. Pulse Secure is bringing its security-enhancing...


    READ MORE
    http://www.eweek.com/security/pulse-secure-appliances-available-on-microsoft-azure5203
  • Google Home and Chromecast Expose Location Data

    One of the consequences of constant connectivity is that the connected devices people use are vulnerable to attacks, which can expose not only personal but also location data, as a researcher from cyb...


    READ MORE
    https://www.infosecurity-magazine.com/news/google-home-and-chromecast-cast/5198
  • IBM Warns That Spammers Once Again Taking Aim at FIFA World Cup

    As the 2018 FIFA World Cup kicks off, so too are spammers' efforts to trick unsuspecting users into clicking on malicious links and malvertising. Among the most popular sporting events in the worl...


    READ MORE
    http://www.eweek.com/security/ibm-warns-that-spammers-once-again-taking-aim-at-fifa-world-cup5199
  • Get Your Apps for Nothing, Your Malware for Free

    Adware is easy money for cyber-criminals who install malware in advertisements. Researchers have discovered a new piece of malware dubbed Zacinlo that specializes in advertising fraud. According to Bi...


    READ MORE
    https://www.infosecurity-magazine.com/news/get-your-apps-for-nothing-your/5194
  • Phishing Campaigns Target Sports Fans, Consumers

    Two phishing campaigns have been targeting consumers of both the FIFA World Cup and one of its longtime partners, Adidas. One campaign attempts to lure victims into clicking on a malicious link under ...


    READ MORE
    https://www.infosecurity-magazine.com/news/phishing-campaigns-target-sports/5195
  • Clarifai Tries to Clear Up News of Compromised Server

    While working on a project for the US Department of Defense, Clarifai, a New York–based AI startup had a server compromised. Multiple news outlets reported that Clarifai was working on the Defen...


    READ MORE
    https://www.infosecurity-magazine.com/news/is-clarifais-being-clear-about/5190
  • Apple Renews iOS 12 Data Security Arms Race With Law Enforcement

    When the new version of iOS is released sometime this summer, it will include a means of blocking attempt to unlock iPhones through their Lightening Ports, a method currently used by the FBI. Ever sin...


    READ MORE
    http://www.eweek.com/mobile/apple-renews-ios-12-data-security-arms-race-with-law-enforcement5191
  • NCSC urges action after Dixons Carphone breach

    The National Cyber Security Centre (NCSC) is urging UK business to improve data protection capabilities after Dixons Carphone revealed that millions of payment card and personal data records may have ...


    READ MORE
    https://www.computerweekly.com/news/252443076/NCSC-urges-action-after-Dixons-Carphone-breach5187

EVENTS

Conferences

4th Annual Cyber Security For Defense

4TH ANNUAL CYBER SECURITY FOR DEFENSE

June 25-27, 2018
Our Cyber Security for Defense series has proved to present the hottest and most critical topics within the Cyber Defense sector. Our three successful iterations have brought in a combined total of 600 attendees & speakers. As more Defense commands demand cyber security solutions to protect our ...

DC / Metro Cyber Security Summit

DC / METRO CYBER SECURITY SUMMIT

June 28-28, 2018
The DC / Metro Cyber Security Summit, organized by the Cyber Security Summit will take place on 28th June 2018 at The Ritz-Carlton, Tyson's Corner in McLean, United States Of America. The conference will connect C-Suite & Senior Executives responsible for protecting their companies’ cr...

FT Managing Cyber Risk in Critical Infrastructure

FT MANAGING CYBER RISK IN CRITICAL INFRASTRUCTURE

June 28-28, 2018
The FT Managing Cyber Risk in Critical Infrastructure will focus on cybersecurity as a vital aspect of national security. Senior managers and security experts from some of the world’s biggest companies will be joined by government ministers and officials, software developers, consultants, lawy...

Malware and Reverse Engineering Conference (MRE)

MALWARE AND REVERSE ENGINEERING CONFERENCE (MRE)

July 02-03, 2018
Following the success of the previously held workshops in 2013, 2014, 2015, 2016 and 2017 we are pleased to announce that the Malware Reverse Engineering Conference will be held in Melbourne in July (2-3rd), 2018. MRE-2018 is a bridge between industry, law enforcement and academia, with a strong foc...

2018 Minneapolis Cybersecurity Conference

2018 MINNEAPOLIS CYBERSECURITY CONFERENCE

June 21-21, 2018
Data Connectors will be hosting the Minneapolis Cybersecurity Conference on Thursday, June 21st. The event will start at 8:15 AM with a check-in and opening introductions before presentation sessions begin at 8:45. Between the educational sessions that go throughout the day, there will be time to vi...

IANS 2018 Minneapolis Information Security Forum

IANS 2018 MINNEAPOLIS INFORMATION SECURITY FORUM

June 19-20, 2018
IANS 2018 Minneapolis Information Security Forum delivers an immersive curriculum with over 30+ sessions led by esteemed IANS Faculty, global information security thought leaders and solution providers. Attend the two-day Forum to gain actionable technical solutions and leadership insights focused o...

Gartner Symposium/ITxpo 2018

GARTNER SYMPOSIUM/ITXPO 2018

October 14-18, 2018
Explore the strategic trends and technologies that are shaping the future of IT and business at Gartner Symposium/ITxpo 2018. Thousands of CIOs and senior IT executives will come together in Orlando to discuss key topics including data & analytics, artificial intelligence, machine learning, cult...

Network Security Essentials

NETWORK SECURITY ESSENTIALS

June 11-13, 2018
The Network Security Essentials, organized by the MIS Training Institute will take place from 11 to 13 June 2018 at the MicroTek Computer Lab NY in New York, United States Of America. The conference will cover areas like securing and auditing network applications, interconnection devices, and remote...

 

Webinars

JUN 27, 2018
CAN BIGGER SECURITY BUDGETS SAVE BUSINESSES FROM COSTLY CLOUD BREACHES?
Nearly 1.5 million dollars. That’s how much an average data breach in the cloud costs enterprises, according to the Global IT Security Risks Survey 2018. Second only to targeted attacks, breaches affecting IaaS are among the costliest faced by businesses today. But what can be done a...
JUN 27, 2018
WHY CYBERCRIMINALS ATTACK
No matter what industry you’re in, the spectrum of cyber attackers who are targeting you is growing. Financially-motivated cybercriminals, nation-state-sponsored intelligence gatherers, politically-motivated hackers, and even your competitors are among those who might be testing your...
JUN 28, 2018
THE TIME FOR INTENT-BASED SECURITY IS HERE
In the world of cloud, microsegmentation and DevOps, firewall rules quickly become obsolete and unwieldly. The time for intent-based network security (IBNS) is here. The key to IBNS is defining a desired security state and leveraging automation to turn security intent into actual security ...
JUL 10, 2018 | 2:00–3:00 p.m.
CYBERSECURE MY BUSINESS™ WEBINAR – CYBERSECURITY INSURANCE
Small and medium-sized businesses (SMBs) remain prime targets for cybercriminals, and because of that, cyber insurance has become a popular topic among the SMB community. When should a small business get a separate cyber insurance policy? What should SMBs look for in cyber insurance polici...
JUL 11, 2018
PONEMON INSTITUTE AND IBM REVEAL KEY FINDINGS FROM “ARTIFICIAL INTELLIGENCE IN CYBERSECURITY” STUDY
Join us on Wednesday, July, 11th, as security experts Dr. Larry Ponemon and Neil Jones reveal key findings from the forthcoming “2018 Artificial Intelligence (AI) in Cybersecurity” Study. In this session, you’ll learn how organizations like yours utilize AI to prevent, de...
JUL 12, 2018 | 11:00 AM — 12:00 PM
YOU BOUGHT IT, NOW TURN IT ON! ACTIVATING MAAS360 IDENTITY MANAGEMENT
You may have rolled out an enterprise app catalog and are keeping track of the devices on your network with MDM, EMM or unified endpoint management (UEM) tools – but if your users are still manually entering different usernames and passwords to sign on to enterprise apps, you’r...

GETTING STARTED WITH WEB APPLICATION SECURITY
Sponsored
Chances are, at any given moment, your organization's web applications are under attack (if not already exploited). Attackers see web applications as the front door: just one vulnerability allows them entry - perhaps to the database supporting the web application or maybe to your busin...
BUSINESS EMAIL MASQUERADING: HOW HACKERS ARE FOOLING EMPLOYEES TO COMMIT FRAUD
In the past year, so-called business email compromise attacks, also known as "masquerading" and "executive impersonation," have emerged as one of the greatest wire fraud worries. These schemes threaten to overshadow what was previously seen from commercial account takeover incidents.
TOP TRENDS AND TAKE-AWAYS FOR CYBERSECURITY
Cybersecurity continues to be one of the top concerns of organizations, even more so as complexity and threats increase. What are the key trends in 2015 for cybersecurity, and what steps can leaders take to prepare? What is the current state of cybersecurity threat and response? What are t...
A COMPREHENSIVE GUIDE TO CONNECTEDNESS WITH TRUST, SECURITY AND ETHICS IN THE DIGITAL BUSINESS
Trust is the foundation of all personal and business transactions. But who can you trust in digital business, with its endless connections and constantly shifting configurations? Trust is hard enough when it's personal, but how do you trust and be trusted when dealing with a multitude ...
WHAT EVERY CIO SHOULD KNOW ABOUT SECURITY, RISK AND VALUE
Although cybersecurity climbs back up the priority list and engaging risk is central to your success in digital business, the risk conversation is changing between you and non-IT executives. You have to balance the need to protect and the need to run your business. Integrating risk and cor...
ONE SIMPLE WAY TO GET YOUR CEO TO EMBRACE RISK MANAGEMENT
Most CEOs or other senior business executives cringe at the thought of having to meet with risk management professionals. By their very nature, CEOs are hard-wired to seek out growth opportunities that will add value to their companies. However, risk management professionals are tasked wit...

RESOURCES

To be fair, its method of assessing the security of operating systems is somewhat bunk. It sets a figure based on the number of vulnerabilities found rather than the importance of those vulnerabilitie...

Given the evolving way Web and Cloud applications are used— and the constantly shifting threat landscape organizations must confront—proxy architecture is more important than ever in terms...

This White Paper offers an overview of ETSI's work on security in Information and Communications Technologies (ICT). Each section introduces a specific technology and outlines ETSI's involveme...

Sony, Target, Westinghouse, Home Depot, U.S. Steel, Neiman Marcus, and the National Security Agency (NSA). The security breaches suffered by these and many other organizations, including most recently...

The ever-changing threat landscape requires more robust security risk management programs that can defend against the unknown. This survey assesses how healthcare entities are doing with regulatory co...

Threat intelligence is rapidly becoming an ever-higher business priority. There is a general awareness of the need to ‘do’ threat intelligence, and vendors are falling over themselves to o...

Enterprise Chief Security Officers (CSOs) face a myriad of challenges in protecting their organizations’ most confidential business documents as they flow inside and outside of the firm. In addi...

Decades ago, a group of merchants created a concept of general average—which is when all parties in a maritime venture share in losses resulting from a sacrifice of cargo in an emergency. What t...

Enterprises increasingly rely upon third-party software and services to handle business-critical processes and operations. Whether on-premises or in the cloud, these solutions must provide a level of ...