• NEWS

    NEWS

    THE LATEST NEWS, DEVELOPMENTS AND ANNOUNCEMENTS AS THEY HAPPEN

    more
  • EVENTS

    EVENTS

    CONFERENCES, TRADE SHOWS, LIVE WEBCASTS, NEW LAUNCHES, SEMINARS AND TRAINING EVENTS

    more
  • COMPANIES

    COMPANIES

    PARTNERS, SOLUTIONS & SERVICE PROVIDERS, SUPPLIERS AND INDUSTRY ORGANIZATIONS

    more
  • RESOURCES

    RESOURCES

    WHITEPAPERS, MARKET REPORTS, RESEARCH, ON-DEMAND WEBINARS, VIDEOS AND INFOGRAPHICS

    more

NEWS

   

    home.aspx
  • Orgs Slow to Advance IoT Security

    Despite the burgeoning IoT market, organizations made limited progress on IoT security in 2018, according to a new report from Gemalto. Though there is evidence of incremental improvements, security m...


    READ MORE
    https://www.infosecurity-magazine.com/news/orgs-slow-to-advance-iot-security/5827
  • City of Del Rio Hit by Ransomware Attack

    Another ransomware attack has made headlines with the city of Del Rio, Texas, announcing on January 10, 2019, that the servers at City Hall were disabled, according to a press release. “The firs...


    READ MORE
    https://www.infosecurity-magazine.com/news/city-of-del-rio-hit-by-ransomware/5828
  • UK Banks Finally Issue New Cards After Ticketmaster Breach

    Two major UK high street banks have started to send out replacement cards for some of their customers, nine months after one lender reported fraudulent activity to Ticketmaster. Customers of NatWest a...


    READ MORE
    https://www.infosecurity-magazine.com/news/uk-banks-new-cards-after/5829
  • Bug Bounties Aren't Silver Bullet for Better Security: Report

    Many organizations may find they’re better off hiring pen testers and in-house security researchers directly than running bug bounty programs, according to new MIT research. The New Solutions fo...


    READ MORE
    https://www.infosecurity-magazine.com/news/bug-bounties-silver-bullet-for/5830
  • Sonrai Security Emerges From Stealth With Cloud Data Control Service

    Startup Sonrai Security officially launched on Jan. 15, introducing its Cloud Data Control Service in an effort to improve security for enterprise data assets stored across multiple clouds. The Sonrai...


    READ MORE
    http://www.eweek.com/security/sonrai-security-emerges-from-stealth-with-cloud-data-control-service5831
  • Three Flaws in Schneider Electric Charging Stations

    Three different vulnerabilities in the Schneider Electric EVlink Parking electric vehicle charging station, which could have allowed an attacker to halt the charging process, have been patched, accord...


    READ MORE
    https://www.infosecurity-magazine.com/news/three-flaws-in-schneider-electric/5819
  • Crypto-Mining, Banking Trojans Top Malware Threats

    Crypto-mining malware has again topped the threat index, with Coinhive holding strong in the number one malware threat for the 13th consecutive month, according to the latest Global Threat Index for D...


    READ MORE
    https://www.infosecurity-magazine.com/news/crypto-mining-banking-trojans-top/5820
  • BSIA Publishes Guidelines to Reduce Exposure to Digital Sabotage

    The British Security Industry Association (BSIA) has published a summary of current guidelines to minimize the exposure to digital sabotage of network connected equipment, software and systems used in...


    READ MORE
    https://www.infosecurity-magazine.com/news/bsia-guidelines-digital-sabotage/5821
  • Researchers Reveal Play With Docker Security Vulnerability

    Security firm CyberArk reported on Jan. 14 that it discovered a security risk on the popular Play-with-Docker site that could have potentially enabled an attacker to get access to the host system'...


    READ MORE
    http://www.eweek.com/security/researchers-reveal-play-with-docker-security-vulnerability5822

EVENTS

Conferences

International Cybersecurity Forum

INTERNATIONAL CYBERSECURITY FORUM

January 22-23, 2019
The International Cybersecurity Forum is a platform aiming at promoting a pan-european vision of cybersecurity as well as to strengthen the fight against cybercrime. In line with the digital single market and data protection regulation, the FIC became THE reference event, bringing together all major...

The Future of Cyber Security Manchester

THE FUTURE OF CYBER SECURITY MANCHESTER

January 24-24, 2019
Cyber security at the top of the agenda as the attack landscape widens. Cyber-attacks are diversifying, putting businesses at increasing risk. In 2017, multiple ransomware attacks such as the Wannacry cryptoworm that hit the NHS demanded bitcoins in exchange for the release of data. This is now evol...

CYBERTECH THE EVENT FOR THE CYBER INDUSTRY

CYBERTECH THE EVENT FOR THE CYBER INDUSTRY

January 28-30, 2019
Cybertech is the cyber industry’s foremost B2B networking platform conducting industry-related events all around the globe. From Tel Aviv and Rome, to Tokyo, Singapore, Panama, and more, our conferences and exhibitions serve as the go-to place to learn all about the latest technological innova...

DACH STRATEGYFORUM CYBER AND INFORMATION SECURITY

DACH STRATEGYFORUM CYBER AND INFORMATION SECURITY

January 29-30, 2019
Highlighting the convergence of IT and OT, the move to DevSecOps, as well as the blockchain revolution, StrategyForum Cyber and Information Security is a must-attend cyber security event in the region. Meet CISOs and Information Security Executives from the largest organizations to showcase your sol...

Ft. Lauderdale Cybersecurity Conference 2018

FT. LAUDERDALE CYBERSECURITY CONFERENCE 2018

December 13-13, 2018
The Changing Landscape of DDoS Attacks – Advanced DDoS Is Here – Are You Ready? Distributed Denial of Service (DDoS) attacks have entered a new era!  Historically DDoS attackers have used a “brute force” approach to making an online service unavailable by overwhelming yo...

CYBER SECURITY EXCHANGE | US

CYBER SECURITY EXCHANGE | US

December 10-12, 2018
The cybersecurity landscape remains vulnerable to a wide range of physical and cyber threats. Sophisticated cyber criminals, nation states and some insiders take information and deliberately disrupt the delivery of services and information. True cyber resiliency requires a proactive synergy of peopl...

INTERNATIONAL CONFERENCES ON CYBER SECURITY AND COMMUNICATION SYSTEMS

INTERNATIONAL CONFERENCES ON CYBER SECURITY AND COMMUNICATION SYSTEMS

December 10-12, 2018
The conferences on network security and communication engineering is meant to serve as a forum for exchanging new developments and research progresses between scholars, scientists and engineers all over the world and providing a unique opportunity to exchange information, to present the latest resul...

The 12th WISTP International Conference on Information Security Theory and Practice (WISTP

THE 12TH WISTP INTERNATIONAL CONFERENCE ON INFORMATION SECURITY THEORY AND PRACTICE (WISTP'2018)

December 10-11, 2018
Future ICT technologies, such as the concepts of Ambient Intelligence, Cyber-physical Systems, and Internet of Things provide a vision of the Information Society in which: a) people and physical systems are surrounded with intelligent interactive interfaces and objects, and b) environments are capab...

 

Webinars

JAN 23, 2019
HOW TO MAXIMIZE CYBERSECURITY RISK RATINGS IN 2019
If you are a security or risk leader, you know that even with a formal third-party risk program in place, you are not effectively keeping track of all of your third parties. But there is something you can do, and that is to get help from a cybersecurity risk rating solution provider. Accor...
JAN 23, 2019 | 1 PM,
TOP 10 CLOUD SECURITY CONSIDERATIONS FOR 2019
Compliance and security requirements, across industries including Government, Education, Healthcare and Financial Services, are making Continuous Threat Monitoring an imperative for cloud-hosted applications and data. Organizations must meet Continuous Monitoring requirements for cybersecu...
JAN 29, 2019
UNDERESTIMATED RISK & OVERESTIMATED SECURITY: WHEN ALL YOU DO IS REACT, IT MAY BE TOO LATE
For decades, IT professionals have been fighting malware, hackers, and other threats. Data protection, confidentiality, integrity and availability have long been threatened not only by amateur hackers, but by profit-oriented, well-organised criminals. Victims can usually only react because...
JAN 29, 2019
PRIVILEGED ACCOUNT MANAGEMENT
High-privileged access is known to be one of the most sensitive and critical aspects of IT security. The task of Privileged Account Management can be quite overwhelming for organizations big or small. Privileged accounts are high-access, non-human accounts, such as local or domain administ...
JAN 29, 2019
DELL / INFOCYTE – THREAT HUNTING 101 WEBINAR
Join Dell and members of Infocyte’s Product, Leadership, and Customer Success team to learn more about proactive cybersecurity and how Infocyte HUNT helps security teams discover, hunt, and respond to cyber threats. Threat Hunting 101 — what it is, how it works, and why it&rsqu...
JAN 31, 2019
HEALTHCARE PRIVACY AND CYBERSECURITY: OUTLOOK FOR 2019
Join John Nye, Sr. Director of Cybersecurity Research & Communications, and David Holtzman, VP of Compliance Strategies, for our webinar, “Healthcare Privacy and Cybersecurity: Outlook for 2019,” on Thursday, January 31st (from 12:00 pm to 1:00 pm CST). The two will discuss...

TRY FALCON PREVENT™ START YOUR 15-DAY FREE TRIAL
Sponsored
CrowdStrike is the leader in cloud-delivered next-generation endpoint protection. CrowdStrike has revolutionized endpoint protection by being the first and only company to unify next-generation antivirus, endpoint detection and response (EDR),and a 24/7 managed hunting service — all ...
TODAY’S TOP SECURITY CONCERNS: ARE YOUR ERP APPLICATIONS READY?
Sponsored
In recent 451 Research studies, enterprises continue to report three primary security concerns. These challenges affect overall cybersecurity strategies as well as an organization’s business-critical application security: The maintenance of security hygiene is not just an ongoing issue for...
PANEL: FRAUD INVESTIGATIONS - HOW TO WORK EFFECTIVELY WITH LAW ENFORCEMENT, GOVERNMENT & LITIGATORS
Public-sector organizations need to better understand the driving forces, priorities and procedures within the organizations they "protect." But equally as important is that the private-sector organizations reciprocate and understand the how, what and why of the law enforcement/public body...
SUPPLY CHAIN SECURITY - THE FIRST AND WEAKEST LINK IN THE CHAIN?
Do you have a supply chain or just vendors? Do any or all of them present a breach potential? We apply massive resources to hardening perimeters and preventing infiltration of our information security systems, but what if our adversaries have a built-in presence and already have a foothold...
THE LEGAL ISSUES OF USING BIG DATA TO COMBAT FRAUD
More and more, instances of fraud are taking place in a digital context. A robust cyber security strategy therefore is essential. This insightful session will share an overview of the key regulatory steps that an organisation should take in order to achieve cyber security compliance as wel...
2015 FACES OF FRAUD - LONDON
As recent incidents prove: Retail point-of-sale breaches are on the rise, creating greater payment card fraud headaches for banking institutions. How does the impact of these crimes compare to that of account takeover, check fraud, insider crimes and the emerging realms of virtual and mobi...

RESOURCES

To be fair, its method of assessing the security of operating systems is somewhat bunk. It sets a figure based on the number of vulnerabilities found rather than the importance of those vulnerabilitie...

Given the evolving way Web and Cloud applications are used— and the constantly shifting threat landscape organizations must confront—proxy architecture is more important than ever in terms...

Current challenges. According to the ACSC Threat Report 2017, cybercrime is a prevalent threat for Australia. It enables criminals to generate large profits with a low risk of identification and preve...

Cyber risks pose unique threats to financial stability that are not well understood or managed, despite growing investment in research and dependence by financial institutions, consumers, and governme...

This White Paper offers an overview of ETSI's work on security in Information and Communications Technologies (ICT). Each section introduces a specific technology and outlines ETSI's involveme...

Sony, Target, Westinghouse, Home Depot, U.S. Steel, Neiman Marcus, and the National Security Agency (NSA). The security breaches suffered by these and many other organizations, including most recently...

The ever-changing threat landscape requires more robust security risk management programs that can defend against the unknown. This survey assesses how healthcare entities are doing with regulatory co...

Threat intelligence is rapidly becoming an ever-higher business priority. There is a general awareness of the need to ‘do’ threat intelligence, and vendors are falling over themselves to o...

Decades ago, a group of merchants created a concept of general average—which is when all parties in a maritime venture share in losses resulting from a sacrifice of cargo in an emergency. What t...