• NEWS

    NEWS

    THE LATEST NEWS, DEVELOPMENTS AND ANNOUNCEMENTS AS THEY HAPPEN

    more
  • EVENTS

    EVENTS

    CONFERENCES, TRADE SHOWS, LIVE WEBCASTS, NEW LAUNCHES, SEMINARS AND TRAINING EVENTS

    more
  • COMPANIES

    COMPANIES

    PARTNERS, SOLUTIONS & SERVICE PROVIDERS, SUPPLIERS AND INDUSTRY ORGANIZATIONS

    more
  • RESOURCES

    RESOURCES

    WHITEPAPERS, MARKET REPORTS, RESEARCH, ON-DEMAND WEBINARS, VIDEOS AND INFOGRAPHICS

    more

NEWS

   

    home.aspx
  • Bug Hunting Is Cybersecurity's Skill of the Future

    The vast majority of white hat hackers who reported that they were looking for jobs in cybersecurity said that their bug hunting experience helped them land a job, according to Bugcrowd’s 2018 I...


    READ MORE
    https://www.infosecurity-magazine.com/news/bug-hunting-is-cybersecuritys/5696
  • Microsoft, PayPal and Google Top the Brands Hit by Phishing

    Email phishing continues to be the most common method of attack, and according to new research from Comodo Cybersecurity Microsoft, PayPal and Google are the top three brands most targeted by phishing...


    READ MORE
    https://www.infosecurity-magazine.com/news/microsoft-paypal-google-top-the/5697
  • Campaign Targets Critical Russian Infrastructure

    In a campaign that has lasted at least three years, financially motivated attackers have been targeting Rosneft, a state-owned Russian oil company, according to new threat intelligence published by Cy...


    READ MORE
    https://www.infosecurity-magazine.com/news/campaign-targets-critical-russian/5698
  • Operation Sharpshooter Targets Nuke and Defense Firms

    Security researchers have discovered a major targeted attack campaign aimed at stealing info from scores of mainly English-speaking organizations around the world and using source code from the infamo...


    READ MORE
    https://www.infosecurity-magazine.com/news/operation-sharpshooter-targets/5699
  • Microsoft and Adobe Patch 100+ Bugs in December

    There’ll be plenty for system administrators to do right up to the end of the year with Microsoft’s latest patch update round featuring fixes for nine critical vulnerabilities including on...


    READ MORE
    https://www.infosecurity-magazine.com/news/microsoft-adobe-patch-100-bugs/5700
  • Amplification Bots Retweet Misinformation

    Amplification bots spread both information and misinformation across Twitter's social network through retweets, and according to new research from Duo Security, these bots not only affect how cont...


    READ MORE
    https://www.infosecurity-magazine.com/news/amplification-bots-retweet/5686
  • House Report Says Equifax Breach Was Preventable

    The US House of Representatives Committee on Oversight and Government Reform released its report on the Equifax breach. It found that the lack of modernized security controls combined with dozens of e...


    READ MORE
    https://www.infosecurity-magazine.com/news/house-report-says-equifax-breach/5687
  • Middle East Servers Targeted in Saipem Cyber-Attack

    Oil services company Saipem, based in Milan, Italy, was the victim of a cyber-attack that appears to be targeting servers in the Middle East, according to reports from Reuters. The attack targeted ser...


    READ MORE
    https://www.infosecurity-magazine.com/news/middle-east-servers-targeted-in/5688
  • Quarter of NHS Trusts Have No Security Pros

    New research has revealed a dearth of qualified cybersecurity staff in the NHS and low levels of spending on in-house training for employees. RedScan received Freedom of Information (FOI) responses fr...


    READ MORE
    https://www.infosecurity-magazine.com/news/quarter-of-nhs-trusts-have-no/5689

EVENTS

Conferences

CYBERTECH THE EVENT FOR THE CYBER INDUSTRY

CYBERTECH THE EVENT FOR THE CYBER INDUSTRY

January 28-30, 2019
Cybertech is the cyber industry’s foremost B2B networking platform conducting industry-related events all around the globe. From Tel Aviv and Rome, to Tokyo, Singapore, Panama, and more, our conferences and exhibitions serve as the go-to place to learn all about the latest technological innova...

Cybersecurity Leadership Summit 2019 USA

CYBERSECURITY LEADERSHIP SUMMIT 2019 USA

February 11-11, 2019
Cybersecurity is about humans, skills, and knowledge. So is the KuppingerCole's Cybersecurity Leadership Summit in Washington, DC, USA (#CSLSUS19). Discussing face-to-face with your peers about trends, hypes and evolving threats, getting trained in thinking the unthinkable to be better prepared ...

4th annual Rail Cyber Security Summit 2019

4TH ANNUAL RAIL CYBER SECURITY SUMMIT 2019

February 19-20, 2019
Leveraging key insight from the Cyber Senate portfolio of vertical conferences from throughout 2016, 2017 and 2018, this year’s event will be dominated by the best global Technology and Information Security experts across the Rail supply chain, including executive leadership from Rolling Stock...

CYBERTECH LATIN AMERICA 2019

CYBERTECH LATIN AMERICA 2019

February 21-21, 2019
After its great success last year, we are at it again in full force for Cybertech LATAM! Taking place on February 21, 2019, mark your calendars for an insightful and invigorating event. Our conferences are divided into two main parts— (1) a major exhibition where attendees can enjoy the presen...

Ft. Lauderdale Cybersecurity Conference 2018

FT. LAUDERDALE CYBERSECURITY CONFERENCE 2018

December 13-13, 2018
The Changing Landscape of DDoS Attacks – Advanced DDoS Is Here – Are You Ready? Distributed Denial of Service (DDoS) attacks have entered a new era!  Historically DDoS attackers have used a “brute force” approach to making an online service unavailable by overwhelming yo...

CYBER SECURITY EXCHANGE | US

CYBER SECURITY EXCHANGE | US

December 10-12, 2018
The cybersecurity landscape remains vulnerable to a wide range of physical and cyber threats. Sophisticated cyber criminals, nation states and some insiders take information and deliberately disrupt the delivery of services and information. True cyber resiliency requires a proactive synergy of peopl...

INTERNATIONAL CONFERENCES ON CYBER SECURITY AND COMMUNICATION SYSTEMS

INTERNATIONAL CONFERENCES ON CYBER SECURITY AND COMMUNICATION SYSTEMS

December 10-12, 2018
The conferences on network security and communication engineering is meant to serve as a forum for exchanging new developments and research progresses between scholars, scientists and engineers all over the world and providing a unique opportunity to exchange information, to present the latest resul...

The 12th WISTP International Conference on Information Security Theory and Practice (WISTP

THE 12TH WISTP INTERNATIONAL CONFERENCE ON INFORMATION SECURITY THEORY AND PRACTICE (WISTP'2018)

December 10-11, 2018
Future ICT technologies, such as the concepts of Ambient Intelligence, Cyber-physical Systems, and Internet of Things provide a vision of the Information Society in which: a) people and physical systems are surrounded with intelligent interactive interfaces and objects, and b) environments are capab...

 

Webinars

DEC 18, 2018
ARTICULATE THE BUSINESS VALUE OF CYBERSECURITY
Effective strategies for obtaining and maintaining support for security initiatives. A practical model for communicating the value of a security program. Techniques for effective cost-benefit analyses for security project investments. Clearly articulating the business value of cybersecurit...
DEC 18, 2018 | 12:00 PM
ERP UNDER ATTACK - FIGHTING BACK AGAINST BREACHES
The Department of Homeland Security issued an alert citing "Malicious Cyber Activity Targeting ERP Applications" and various news outlets such as Reuters, the New York Times and CNBC picked up on the research raising awareness for organizations to stay vigilant. In this session, ...
DEC 19, 2018 | 2:00 PM
LEARN HOW CB DEFENSE PREVENTS TRADITIONAL ANTIVIRUS FROM LEAVING YOUR BUSINESS EXPOSED
The threat landscape is growing increasingly sophisticated; bypassing traditional antivirus. Organizations are constantly searching for effective security solutions to improve their security posture. CB Defense is Carbon Black’s next-generation AV solution. Join us to learn why legac...
JAN 08, 2019 | 1:00 PM
DEFEATING ATTACKERS WITH PREVENTIVE SECURITY
Today's security environment remains a cat-and-mouse game. Attackers create ever-sneakier attacks, and organizations scramble to plug holes, even as attackers move to the next one. This SANS webcast will look at microsegmentation—creating secure zones in and outside of their netw...

TRY FALCON PREVENT™ START YOUR 15-DAY FREE TRIAL
Sponsored
CrowdStrike is the leader in cloud-delivered next-generation endpoint protection. CrowdStrike has revolutionized endpoint protection by being the first and only company to unify next-generation antivirus, endpoint detection and response (EDR),and a 24/7 managed hunting service — all ...
TODAY’S TOP SECURITY CONCERNS: ARE YOUR ERP APPLICATIONS READY?
Sponsored
In recent 451 Research studies, enterprises continue to report three primary security concerns. These challenges affect overall cybersecurity strategies as well as an organization’s business-critical application security: The maintenance of security hygiene is not just an ongoing issue for...
PANEL: FRAUD INVESTIGATIONS - HOW TO WORK EFFECTIVELY WITH LAW ENFORCEMENT, GOVERNMENT & LITIGATORS
Public-sector organizations need to better understand the driving forces, priorities and procedures within the organizations they "protect." But equally as important is that the private-sector organizations reciprocate and understand the how, what and why of the law enforcement/public body...
SUPPLY CHAIN SECURITY - THE FIRST AND WEAKEST LINK IN THE CHAIN?
Do you have a supply chain or just vendors? Do any or all of them present a breach potential? We apply massive resources to hardening perimeters and preventing infiltration of our information security systems, but what if our adversaries have a built-in presence and already have a foothold...
THE LEGAL ISSUES OF USING BIG DATA TO COMBAT FRAUD
More and more, instances of fraud are taking place in a digital context. A robust cyber security strategy therefore is essential. This insightful session will share an overview of the key regulatory steps that an organisation should take in order to achieve cyber security compliance as wel...
2015 FACES OF FRAUD - LONDON
As recent incidents prove: Retail point-of-sale breaches are on the rise, creating greater payment card fraud headaches for banking institutions. How does the impact of these crimes compare to that of account takeover, check fraud, insider crimes and the emerging realms of virtual and mobi...

RESOURCES

To be fair, its method of assessing the security of operating systems is somewhat bunk. It sets a figure based on the number of vulnerabilities found rather than the importance of those vulnerabilitie...

Given the evolving way Web and Cloud applications are used— and the constantly shifting threat landscape organizations must confront—proxy architecture is more important than ever in terms...

Current challenges. According to the ACSC Threat Report 2017, cybercrime is a prevalent threat for Australia. It enables criminals to generate large profits with a low risk of identification and preve...

Cyber risks pose unique threats to financial stability that are not well understood or managed, despite growing investment in research and dependence by financial institutions, consumers, and governme...

This White Paper offers an overview of ETSI's work on security in Information and Communications Technologies (ICT). Each section introduces a specific technology and outlines ETSI's involveme...

Sony, Target, Westinghouse, Home Depot, U.S. Steel, Neiman Marcus, and the National Security Agency (NSA). The security breaches suffered by these and many other organizations, including most recently...

The ever-changing threat landscape requires more robust security risk management programs that can defend against the unknown. This survey assesses how healthcare entities are doing with regulatory co...

Threat intelligence is rapidly becoming an ever-higher business priority. There is a general awareness of the need to ‘do’ threat intelligence, and vendors are falling over themselves to o...

Decades ago, a group of merchants created a concept of general average—which is when all parties in a maritime venture share in losses resulting from a sacrifice of cargo in an emergency. What t...