NEWS

   

    home.aspx
  • IT & OT convergence brings new cyber risks to industrial sector

    IT and operational technology (OT) are on a journey to convergence, but that convergence must be managed with caution in order to manage cybersecurity risks that go with it. The risk towards industria...


    READ MORE
    https://securitybrief.com.au/story/it-ot-convergence-brings-new-cyber-risks-to-industrial-sector6727
  • UTSA launches open source software to secure the cloud for users

    The University of Texas at San Antonio (UTSA) has launched Galahad, an open source revolutionary user computer environment (UCE) for the Amazon Cloud. The technology, which is named after the Arthuria...


    READ MORE
    http://www.utsa.edu/today/2019/07/story/Galahad-Software.html6721
  • Alarm sounds over census cybersecurity concerns

    Lawmakers are raising concerns that the upcoming 2020 census, which people are expected to fill out primarily online for the first time, is opening the door to potential cyber vulnerabilities. These v...


    READ MORE
    https://thehill.com/policy/cybersecurity/453386-alarm-sounds-over-census-cybersecurity-concerns6726
  • A.I. has a bias problem and that can be a big challenge in cybersecurity

    Inherently biased artificial intelligence programs can pose serious problems for cybersecurity at a time when hackers are becoming more sophisticated in their attacks, experts told CNBC. Bias can occu...


    READ MORE
    https://www.cnbc.com/2019/07/17/ai-has-a-bias-problem-that-can-be-a-big-challenge-in-cybersecurity.html6728
  • Arizona selected for policy academy on cybersecurity ahead of elections

    The National Governors Association awarded Arizona the opportunity to participate in a cybersecurity policy academy ahead of the 2020 election. Arizona is one of six states that will receive training ...


    READ MORE
    https://ktar.com/story/2655326/arizona-selected-for-policy-academy-on-cybersecurity-ahead-of-elections/6714
  • UK Positioned 3rd in Wavestone Global Cybersecurity Index

    Wavestone, a global transformation consultancy firm, has launched the results of its largest global cybersecurity maturity study to date. In a rapidly moving marketplace, Wavestone set out to determin...


    READ MORE
    https://aithority.com/security/uk-positioned-3rd-in-wavestone-global-cybersecurity-index/6715
  • NCSC reports on second year of cyber defence at scale

    The UK’s National Cyber Security Centre releases a report on the second year of its Active Cyber Defence programme to demonstrate its effects in the public sector and wider UK cyber ecosystem. A...


    READ MORE
    https://www.computerweekly.com/news/252466756/NCSC-reports-on-second-year-of-cyber-defence-at-scale6722
  • BlackBerry launches new threat hunting solution

    BlackBerry has announced the introduction of CylanceGUARD, a managed detection and response (MDR) solution that leverages BlackBerry Cylance security experts and its industry-leading native AI platfor...


    READ MORE
    https://securitybrief.asia/story/blackberry-launches-new-threat-hunting-solution6707
  • Talent key to cyber-security, say experts

    Threats to cybersecurity continue to grow, and the global society needs bold ideas and innovations to address these challenges. [Photo/IC] Cultivation of cybersecurity talent will depend on collaborat...


    READ MORE
    http://www.chinadaily.com.cn/a/201907/15/WS5d2bd1dba3105895c2e7d5dd.html6708

EVENTS

Conferences

CyberArk IMPACT 2019 Chicago

CYBERARK IMPACT 2019 CHICAGO

July 16-19, 2019
Gain the hands-on experience to up your security game and build valued competencies – while helping your organization maximize its CyberArk investment. Twice as many training sessions mean more opportunities to hone your skills – and earn up to 30 CPE credits – to satisfy your CISS...

East Midlands Cyber Security Forum

EAST MIDLANDS CYBER SECURITY FORUM

July 23-23, 2019
In association with Lincolnshire Police and the University of Lincoln, join fellow business owners and entrepreneurs at an informative breakfast event with an array of guest speakers, who will advise on Cyber Security and how you can protect your business better against the threat of cyber crime.

International Conference on Cyber Security (ICCS 2019)

INTERNATIONAL CONFERENCE ON CYBER SECURITY (ICCS 2019)

July 22-25, 2019
The Federal Bureau of Investigation and Fordham University will host the Eighth International Conference on Cyber Security (ICCS 2019) on July 22-25, 2019, in New York City. ICCS is held every eighteen months. It is an unparalleled opportunity for global leaders in cyberthreat analysis, operations, ...

DISA/Joint Service Provider (JSP) Cybersecurity Forum at the Pentagon

DISA/JOINT SERVICE PROVIDER (JSP) CYBERSECURITY FORUM AT THE PENTAGON

July 25-25, 2019
At Joint-IT Service Provider Cyber Security Forum attendees will examine the agencies' cybersecurity readiness, learn better security practices, complete trainings and look for technologies that can connect and protect warfighters in cyberspace. Can you help DISA/JSP, Modernize the technical inf...

DC METRO 2019

DC METRO 2019

July 16-16, 2019
The sixth annual DC Metro Cyber Security Summit connects C-Suite & Senior Executives responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. Admission is $350 each, giving you access to all Interacti...

Cyber Security Summit 2019

CYBER SECURITY SUMMIT 2019

July 10-12, 2019
Opal’s Cyber Security Summit brings together professionals with varied viewpoints on cybersecurity issues to hear from experts, learn about trends and discuss actionable solutions. The intention of this event is to support the continuing evolution of cyber defenses for businesses and organizat...

The 24th Australasian Conference on Information Security and Privacy

THE 24TH AUSTRALASIAN CONFERENCE ON INFORMATION SECURITY AND PRIVACY

July 03-05, 2019
The 24th Australasian Conference on Information Security and Privacy (ACISP) will be held in Christchurch New Zealand on 3-5 July 2019, organized by the University of Canterbury. ACISP has established a key forum for international researchers and industry experts to present and discuss the latest re...

THE ANNUAL EUROPEAN LEGAL SECURITY FORUM

THE ANNUAL EUROPEAN LEGAL SECURITY FORUM

July 02-02, 2019
With an emphasis on cyber protection, critical response and risk mitigation, the European Legal Security Forum 2019 will present over 30 leading experts from the world of cyber security who will deliver ‘insider’ knowledge to identify gaps within existing security whilst offering expert ...

 

Webinars

JUL 18, 2019 | 12:30 PM
PREVENT CYBER ATTACKS AT GOVERNMENT AGENCIES
Preventing attacks against government agency networks can be a costly and resource-intensive endeavor, but the cost of a successful breach can be far worse by impacting critical infrastructure and undermining public trust. BlackBerry® Cylance® solutions are built using artificial i...
JUL 23, 2019 | 2:00 p.m
CYBERSECURITY RESPONSE PROGRAM – WHAT TO EXPECT WHEN YOU’RE EXPECTING (A BREACH)
Most cybersecurity experts agree that it’s not a matter of if you'll experience a cyber incident, but when. This makes incident response planning a critical component of any cybersecurity defense. Learn the benefits of stress testing your institution's response program to pre...
JUL 24, 2019 | 2:00 p.m.
ABSOLUTE ZERO TRUST SECURITY WITH CHECK POINT INFINITY
With cyber-threats existing both inside and outside the perimeter, security professionals across the industry are rebuilding their strategies around a Zero Trust approach. While using disparate technologies might add complexities and risk, Check Point offers a practical and holistic approa...
JUL 24, 2019
PHISHER: IDENTIFY AND RESPOND TO EMAIL THREATS FASTER
Your users are likely already reporting potentially dangerous emails in some fashion within your organization. The increase of this email traffic can present a new problem! With only approximately 1 in 10 user-reported emails being verified as actually malicious, how do you handle the real...
JUL 25, 2019
THE CHANGING FACE OF DATA THREATS AND DATA SECURITY ACROSS EUROPE
Digital transformation is fundamentally changing business operations and challenges throughout Europe – and is putting the crown jewels of any organisation - their sensitive data - at risk. Traditional market leaders are driven by the opportunity for greater efficiency, flexibility a...
JUL 25, 2019 | 1 p.m.
YOU'RE COMPROMISING YOUR COMPANY'S SECURITY. HERE'S HOW
In today’s world, all the security devices and software that are deployed can be bypassed via one small issue—the users. Learning what we’re exposing and how it’s exposed can help you and everyone within your organization understand how to better protect themselves,...

TRY FALCON PREVENT™ START YOUR 15-DAY FREE TRIAL
Sponsored
CrowdStrike is the leader in cloud-delivered next-generation endpoint protection. CrowdStrike has revolutionized endpoint protection by being the first and only company to unify next-generation antivirus, endpoint detection and response (EDR),and a 24/7 managed hunting service — all ...
TODAY’S TOP SECURITY CONCERNS: ARE YOUR ERP APPLICATIONS READY?
Sponsored
In recent 451 Research studies, enterprises continue to report three primary security concerns. These challenges affect overall cybersecurity strategies as well as an organization’s business-critical application security: The maintenance of security hygiene is not just an ongoing issue for...
SHAPING THE FINANCIAL ECOSYSTEM WITH SECURE APIS
Sponsored
Have you noticed that many of the leading banks and insurance companies have developer portals with APIs? In this webinar, we’ll discuss how customers’ needs for financial freedom are shaping the financial ecosystem, leading to an explosion of open APIs and a more integrated customer exper...
IMPACT OF YOUR BUSINESS CONTINUITY PROGRAM ON CYBER RESILIENCY
Sponsored
Business Continuity Awareness Week 2018 - Impact of your business continuity program on Cyber Resiliency. Every division inside IBM has a fully functional Business Continuity program focused on identifying what's critical to IBM's internal operations and making sure these business processe...
LEARNING AT THE SPEED OF BUSINESS
Sponsored
Join Ian Stevens, North America L&D Lead at Publicis Sapient will share his team's successful learning programs that prepared Sapient's consultants to be leaders in digital transformation. Watch now to walk away with: A proven "push-pull" blended learning program How to tie learning with h...
LEARNING AT THE SPEED OF BUSINESS
Sponsored
Join Ian Stevens, North America L&D Lead at Publicis Sapient will share his team's successful learning programs that prepared Sapient's consultants to be leaders in digital transformation. Watch now to walk away with: A proven "push-pull" blended learning program How to tie learning with h...

RESOURCES

To be fair, its method of assessing the security of operating systems is somewhat bunk. It sets a figure based on the number of vulnerabilities found rather than the importance of those vulnerabilitie...

Given the evolving way Web and Cloud applications are used— and the constantly shifting threat landscape organizations must confront—proxy architecture is more important than ever in terms...

Current challenges. According to the ACSC Threat Report 2017, cybercrime is a prevalent threat for Australia. It enables criminals to generate large profits with a low risk of identification and preve...

Cyber risks pose unique threats to financial stability that are not well understood or managed, despite growing investment in research and dependence by financial institutions, consumers, and governme...

This White Paper offers an overview of ETSI's work on security in Information and Communications Technologies (ICT). Each section introduces a specific technology and outlines ETSI's involveme...

Sony, Target, Westinghouse, Home Depot, U.S. Steel, Neiman Marcus, and the National Security Agency (NSA). The security breaches suffered by these and many other organizations, including most recently...

The ever-changing threat landscape requires more robust security risk management programs that can defend against the unknown. This survey assesses how healthcare entities are doing with regulatory co...

Threat intelligence is rapidly becoming an ever-higher business priority. There is a general awareness of the need to ‘do’ threat intelligence, and vendors are falling over themselves to o...

Decades ago, a group of merchants created a concept of general average—which is when all parties in a maritime venture share in losses resulting from a sacrifice of cargo in an emergency. What t...