NEWS

   

    home.aspx
  • Cyber threats to consider this Cyber Security Month

    October marks European Cyber Security Month – an awareness campaign aiming to promote the importance of information security and highlighting the simple steps that can be taken to protect data, ...


    READ MORE
    https://www.itproportal.com/features/cyber-threats-to-consider-this-cyber-security-month/6935
  • Long Island Cyber-Security Pros Fight Growing Threat of Hackers

    The secretary at a Long Island bank was pleased with what she had just done. She had received what she thought was an email from her boss, asking that she transfer $28,000 to a certain account. When t...


    READ MORE
    https://www.longislandpress.com/2019/10/15/long-island-cyber-security-pros-fight-growing-threat-of-hackers/6934
  • A hacker’s paradise? 5G and cyber security

    The rollout of fifth-generation mobile networks  which offer the potential for downloads speeds of up to 10 times faster than today’s  will change how we communicate, work and stream v...


    READ MORE
    https://www.ft.com/content/74edc076-ca6f-11e9-af46-b09e8bfe60c06922
  • Cyber Threats To The Maritime Sector

    Cyber threats in the maritime industry refer to the threats to computer systems and technology that can affect shipping-related operations. With the sector actively adopting various technologies to im...


    READ MORE
    https://cyware.com/news/cyber-threats-to-the-maritime-sector-20147d356925
  • New ISF Paper Attempts to Demystify AI in Information Security

    In a paper released today, the Information Security Forum is urging organizations to capitalize on the opportunities offered by artificial intelligence while taking sensible steps to reduce the risks ...


    READ MORE
    https://www.infosecurity-magazine.com/news/isf-artempts-to-demystify-ai/6920
  • California proposes regulations to enforce new privacy law

    California proposed new regulations Thursday that dictate how the state's tough new privacy law will be enforced. The law known as the California Consumer Privacy Act or CCPA, gives consumers more...


    READ MORE
    https://www.cnet.com/news/california-proposes-regulations-to-enforce-new-privacy-law/6921
  • Autonomous Cyber AI is Revolutionizing Cyber Defense

    As the near-constant stream of high-profile attacks suggests, the cyber-threat landscape is rapidly evolving with no sign of slowing. Cyber-attackers are not only moving faster, they are adding new an...


    READ MORE
    https://www.cisomag.com/autonomous-cyber-defense/6919
  • University to Create New Cybersecurity Approach Inspired by the Human Body

    Researchers at the University of Arizona are developing a fresh approach to cybersecurity modeled on the human central nervous system. The new method, which is being created as part of the Partnership...


    READ MORE
    https://www.infosecurity-magazine.com/news/cybersecurity-approach-inspired-by/6912
  • U.S. to Help Secure Baltic Energy Grid Against Cyber Attacks

    US Energy Secretary Rick Perry and his Lithuanian, Latvian and Estonian counterparts termed the agreement "a critical moment for the Baltic States in strengthening cybersecurity" in strategi...


    READ MORE
    https://www.securityweek.com/us-help-secure-baltic-energy-grid-against-cyber-attacks6911

EVENTS

Conferences

Driving the Future of Sales Enablement

DRIVING THE FUTURE OF SALES ENABLEMENT

October 16-18, 2019
In this session you will be taken on a journey that includes the sharing of strategies and tactics that were used to establish critical relationships resulting in new levels of executive collaboration and engagement that transformed one Sales Enablement organization from a relatively unknown entity ...

Zero Day Con - Securing CTRL

ZERO DAY CON - SECURING CTRL

October 22-22, 2019
It’s time to take back control of your cybersecurity. Zero Day Con will host a full day of expert level discussion on cutting edge security approaches to regain control over your systems, data, and information. Join Zero Day Con and Strategic Cyber Ventures in Washington, D.C. on October 22 to...

The 14th International Conference on System Safety and Cyber Security

THE 14TH INTERNATIONAL CONFERENCE ON SYSTEM SAFETY AND CYBER SECURITY

October 21-22, 2019
We invite you to join us at SSCS 2019 - the only event of its kind where both safety and security engineers can meet, network and share best practice between the two disciplines. Sessions at this year’s conference will focus on integrating safety and cyber security, implementing and adopting s...

Xactly Unleashed Europe is the ultimate sales performance management (SPM)

XACTLY UNLEASHED EUROPE IS THE ULTIMATE SALES PERFORMANCE MANAGEMENT (SPM)

October 21-22, 2019
Xactly Unleashed Europe is the ultimate sales performance management (SPM) summit. Designed to arm organisations with the strategy, best practices, and technology needed to unleash their team's potential and inspire the highest level of performance--this year's European conference will featu...

SiriusDecisions Summit APAC

SIRIUSDECISIONS SUMMIT APAC

October 15-16, 2019
SiriusDecisions Summit APAC is the must attend event for our community of sales, marketing and product innovators and trendsetters that drive growth in the most well-respected high-performing companies in the market today. We will showcase our theme; Achieving High Performance by Aligning the B-to-B...

CYBERSECURITY SUMMIT PORTUGAL

CYBERSECURITY SUMMIT PORTUGAL

October 15-15, 2019
CyberEdTalks, is a division of the global events arm of Information Security Media Groups (ISMG). The CyberEdTalks brand hosts summits around the world in markets that have been determined to be underserved, providing much needed content and education to information security professionals. Content p...

OSMOSIS 2019 Conference

OSMOSIS 2019 CONFERENCE

October 13-15, 2019
Founded in 2015, the OSMOSIS Institute began hosting the annual OSMOSIS Conference to educate, inform and protect investigators and analysts within the cyber security industry. Developed by OSINT (Open Source Intelligence) investigators for the legal, law enforcement, investigative, business and acc...

Cybersecurity Compliance and Data Protection Practice Summit 2019

CYBERSECURITY COMPLIANCE AND DATA PROTECTION PRACTICE SUMMIT 2019

October 14-15, 2019
China Cybersecurity Law (CCL) , Cyber Security Protection Scheme 2.0, Information Security Technology — Personal Information Security Specification and General Data Protection Regulation (GDPR) are very important compliance for the companies operating in China. These new laws bring many regula...

 

Webinars

OCT 22, 2019 | 12:00 PM CST-01:00 AM
Sponsored
THE RESURGENCE OF ASSET MANAGEMENT
Although admittedly not the most exciting part of cybersecurity, asset management is having a moment and becoming a priority for CISOs and security teams. In this webinar, 451 Research Analyst Fernando Montenegro and Axonius CMO Nathan Burke will look at why asset management is still a cha...
OCT 17, 2019
HOW TO RESPOND VS. REACT IN THE CYBERSECURITY WORLD
Unwind with us before the Diwali break and listen in as three of the ServiceNow India team speak about what is currently happening in the India market and how our Security and IT products are interacting with this. Security orchestration, automation, and response is a way for teams to prio...
OCT 21, 2019 | 2:00 PM
ESET WEBINAR: SMART BUILDINGS - ARE THEY THE NEXT CYBERSECURITY RISK?
Smart building technology brings many benefits to overall building operations. Smart building technology itself is transforming as lower-cost devices reduce the expense of automating and connecting the very fabric of the building. The expense is often offset through energy and efficiency c...
OCT 23, 2019 | 2:00 am
TOP 4 CYBER THREATS ATTACKING SMALL AND MID-SIZE BUSINESSES WEBINAR
Are your businesses smartphones, laptops and tablets secure? Cyber-attacks on Small and Mid-size business smartphones, laptops and tablets are on the rise. 61% of cyber-attacks targeted small and midsize businesses. 60% of those companies went out of business within six months of the attac...
OCT 23, 2019 | 1:00 PM
GLOBAL THREATS ON THE RISE: A RUNDOWN ON RANSOMWARE
Ransomware isn’t newin fact it’s over 30 years old. Attacks date back as far as 1989 and have been the most pervasive cyber threat since 2005, with a dramatic spike in recent years. The resulting costs to targeted businesses are soaring. In fact, according to the 2018 Verizon D...
OCT 23, 2019 | 8:00 AM
MR. REALITY OR MR. ROBOT?
Mr. Robot, both a TV series and an underground group of hackers, recruit Elliot (in the TV series) a brilliant but highly unstable young cyber security engineer and vigilante hacker try to take down the world’s largest conglomerate and the corrupt corporation he works for. With the s...

TRY FALCON PREVENT™ START YOUR 15-DAY FREE TRIAL
Sponsored
CrowdStrike is the leader in cloud-delivered next-generation endpoint protection. CrowdStrike has revolutionized endpoint protection by being the first and only company to unify next-generation antivirus, endpoint detection and response (EDR),and a 24/7 managed hunting service — all ...
TODAY’S TOP SECURITY CONCERNS: ARE YOUR ERP APPLICATIONS READY?
Sponsored
In recent 451 Research studies, enterprises continue to report three primary security concerns. These challenges affect overall cybersecurity strategies as well as an organization’s business-critical application security: The maintenance of security hygiene is not just an ongoing issue for...
SHAPING THE FINANCIAL ECOSYSTEM WITH SECURE APIS
Sponsored
Have you noticed that many of the leading banks and insurance companies have developer portals with APIs? In this webinar, we’ll discuss how customers’ needs for financial freedom are shaping the financial ecosystem, leading to an explosion of open APIs and a more integrated customer exper...
IMPACT OF YOUR BUSINESS CONTINUITY PROGRAM ON CYBER RESILIENCY
Sponsored
Business Continuity Awareness Week 2018 - Impact of your business continuity program on Cyber Resiliency. Every division inside IBM has a fully functional Business Continuity program focused on identifying what's critical to IBM's internal operations and making sure these business processe...
LEARNING AT THE SPEED OF BUSINESS
Sponsored
Join Ian Stevens, North America L&D Lead at Publicis Sapient will share his team's successful learning programs that prepared Sapient's consultants to be leaders in digital transformation. Watch now to walk away with: A proven "push-pull" blended learning program How to tie learning with h...
LEARNING AT THE SPEED OF BUSINESS
Sponsored
Join Ian Stevens, North America L&D Lead at Publicis Sapient will share his team's successful learning programs that prepared Sapient's consultants to be leaders in digital transformation. Watch now to walk away with: A proven "push-pull" blended learning program How to tie learning with h...

RESOURCES

To be fair, its method of assessing the security of operating systems is somewhat bunk. It sets a figure based on the number of vulnerabilities found rather than the importance of those vulnerabilitie...

Given the evolving way Web and Cloud applications are used— and the constantly shifting threat landscape organizations must confront—proxy architecture is more important than ever in terms...

Current challenges. According to the ACSC Threat Report 2017, cybercrime is a prevalent threat for Australia. It enables criminals to generate large profits with a low risk of identification and preve...

Cyber risks pose unique threats to financial stability that are not well understood or managed, despite growing investment in research and dependence by financial institutions, consumers, and governme...

This White Paper offers an overview of ETSI's work on security in Information and Communications Technologies (ICT). Each section introduces a specific technology and outlines ETSI's involveme...

Sony, Target, Westinghouse, Home Depot, U.S. Steel, Neiman Marcus, and the National Security Agency (NSA). The security breaches suffered by these and many other organizations, including most recently...

The ever-changing threat landscape requires more robust security risk management programs that can defend against the unknown. This survey assesses how healthcare entities are doing with regulatory co...

Threat intelligence is rapidly becoming an ever-higher business priority. There is a general awareness of the need to ‘do’ threat intelligence, and vendors are falling over themselves to o...

Decades ago, a group of merchants created a concept of general average—which is when all parties in a maritime venture share in losses resulting from a sacrifice of cargo in an emergency. What t...