• NEWS

    NEWS

    THE LATEST NEWS, DEVELOPMENTS AND ANNOUNCEMENTS AS THEY HAPPEN

    more
  • EVENTS

    EVENTS

    CONFERENCES, TRADE SHOWS, LIVE WEBCASTS, NEW LAUNCHES, SEMINARS AND TRAINING EVENTS

    more
  • COMPANIES

    COMPANIES

    PARTNERS, SOLUTIONS & SERVICE PROVIDERS, SUPPLIERS AND INDUSTRY ORGANIZATIONS

    more
  • RESOURCES

    RESOURCES

    WHITEPAPERS, MARKET REPORTS, RESEARCH, ON-DEMAND WEBINARS, VIDEOS AND INFOGRAPHICS

    more

NEWS

   

    home.aspx
  • Formjacking Replaced Cryptojacking, Ransomware in 2018

    When returns on ransomware and cryptojacking started to decline, cyber-criminals had to get creative with alternative methods of making money, according to Symantec’s newly released Internet Sec...


    READ MORE
    https://www.infosecurity-magazine.com/news/formjacking-replaced-cryptojacking/6022
  • Value of Stolen Card and Amazon Account Details Rockets

    Researchers have seen large spikes in the value of certain stolen data being traded on the dark web, but log-ins for some accounts are selling for as little as $2. Top10VPN’s first Dark Web Mark...


    READ MORE
    https://www.infosecurity-magazine.com/news/value-stolen-card-amazon-account-1/6023
  • Aussie Heart Hospital Hit by Ransomware Blitz

    Thousands of patients have had their personal files encrypted by hackers after a Melbourne heart hospital was hit by ransomware. Melbourne Heart Group, which runs the specialist cardiology unit at the...


    READ MORE
    https://www.infosecurity-magazine.com/news/aussie-heart-hospital-hit-by-1/6024
  • Symantec Warns of Shifting Threat Landscape as Formjacking Risk Grows

    Cyber-security threats are not static and change from year to year as both attackers and defenders shift tactics. Symantec released its latest Internet Security Threat Report (ISTR) on Feb. 19, provid...


    READ MORE
    https://www.eweek.com/security/symantec-warns-of-shifting-threat-landscape-as-formjacking-risk-grows6025
  • Duo Security Digs Into Chrome Extension Security With CRXcavator

    Do you know if the Chrome browser extensions that are being used across your enterprise are a potential risk? That's a question that until today wasn't as easy to answer as it should have been...


    READ MORE
    https://www.eweek.com/security/duo-security-digs-into-chrome-extension-security-with-crxcavator6026
  • Oracle, KPMG Cloud Threat Report Finds Confidence and Fear

    Thirty-eight percent of security and IT professionals surveyed by Oracle and KPMG identified the ability to detect and react to security incidents in the cloud as their top security challenge. Unautho...


    READ MORE
    https://www.sdxcentral.com/articles/news/oracle-kpmg-cloud-threat-report-finds-confidence-and-fear/2019/02/6027
  • Tenable, Forescout Both Merge Their IT and OT Security Platforms

    Preventing damaging intrusions to increasingly comingled IT and operational technology (OT) domains is the goal of security product integrations announced this week by Tenable and Forescout Technologi...


    READ MORE
    https://www.sdxcentral.com/articles/news/tenable-forescout-both-merge-their-it-and-ot-security-platforms/2019/02/6028
  • Pulse Secure Adds Software-Defined Perimeter, Protects Hybrid IT

    Pulse Secure added software-defined perimeter technology to its portfolio, which puts zero-trust on-premises and multi-cloud security under a single umbrella. Software-defined perimeters use a “...


    READ MORE
    https://www.sdxcentral.com/articles/news/pulse-secure-adds-software-defined-perimeter-protects-hybrid-it/2019/02/6010
  • Ransomware Revenue Earning Does Not Match Infection Decline

    There has been a decline in ransomware infections, but that does not mean that earned revenue has reduced for cyber-criminals. According to the third instalment of the Check Point 2019 Security Report...


    READ MORE
    https://www.infosecurity-magazine.com/news/ransomware-revenue-infection-1-1-1-1/6011

EVENTS

Conferences

The 8th Annual Cyber Security and Data Security Forum

THE 8TH ANNUAL CYBER SECURITY AND DATA SECURITY FORUM

February 25-27, 2019
With the continuous increase of cyber crime in the Middle East and the new cyber attacks, organisations are facing challenges in securing their data and prevent from important information breach. The 8th Annual Cyber Security and Data Security Forum will focus on how to detect, prevent the cyber thr...

GLOBAL CYBER SECURITY SUMMIT

GLOBAL CYBER SECURITY SUMMIT

February 27-27, 2019
The Global Cyber Security Center (GCSEC) is a newly established not-for-profit organization created to advance cyber security in Italy, the region, and around the world. The Center, funded by Poste Italiane and other member companies, is based in Rome with a strong collaboration with Italian and Int...

NDSS Symposium 2019

NDSS SYMPOSIUM 2019

February 24-27, 2019
The Network and Distributed System Security Symposium (NDSS) fosters information exchange among researchers and practitioners of network and distributed system security. The target audience includes those interested in practical aspects of network and distributed system security, with a focus on act...

Cyber Attack Singapore Series 2019

CYBER ATTACK SINGAPORE SERIES 2019

February 28-28, 2019
As one of Asia Pacific region’s key technology hubs, highly-networked Singapore is vulnerable to cyber-attack attempts. Add in the widespread use of digital banking, eCommerce and mobile devices, and it becomes a low hanging fruit for hackers, just illustrates the recent Singapore’s heal...

CYBERTECH LATIN AMERICA 2019

CYBERTECH LATIN AMERICA 2019

February 21-21, 2019
After its great success last year, we are at it again in full force for Cybertech LATAM! Taking place on February 21, 2019, mark your calendars for an insightful and invigorating event. Our conferences are divided into two main parts— (1) a major exhibition where attendees can enjoy the presen...

Data Connectors Des Moines Cybersecurity Conference 2019

DATA CONNECTORS DES MOINES CYBERSECURITY CONFERENCE 2019

February 21-21, 2019
IP Pathways believes capital investments in technology should help businesses grow revenue, increase customer satisfaction, drive efficiencies, lower costs and create a competitive advantage. At IP Pathways, our mission is to be an expert provider of hybrid IT solutions by delivering world-class eng...

NordiX: Cyber Security for the Nordic Region

NORDIX: CYBER SECURITY FOR THE NORDIC REGION

February 20-21, 2019
NordiX, the leading summit dedicated to securing the Nordic region from cyber threats, will be in Copenhagen, 20th – 21st February 2019. This event unites Senior IT Security professionals from across industries to discuss a wide range of cyber challenges as they grow in sophistication, frequen...

Dallas Cyber Security Conference

DALLAS CYBER SECURITY CONFERENCE

February 21-21, 2019
FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce. Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks. Educating...

 

Webinars

FEB 26, 2019 | 12:00 pm
HOW TO BECOME A CERTIFIED ETHICAL HACKER
The Certified Ethical Hacker (CEH) is one of the most popular information security certifications. It verifies knowledge of tools and techniques used by malicious hackers, and it has become a foundation for careers in pentesting, vulnerability testing and other technical areas. Join Keatro...
FEB 26, 2019
CYBERSECURITY STARTS AT THE TOP (PPT)
Cybersecurity endeavors often fail, but there is a fix. Leadership knows cybersecurity is important but not how to create a culture of cybersecurity. Companies push the whole burden onto IT, when it requires buy-in and involvement from all departments. This presentation will help leaders u...
FEB 27, 2019 | 5:00 am
CLOUD SECURITY LEADER NETSKOPE TO HOST “PRIVACY IN THE CLOUD” WEBINAR
Today, many major organisations rely on cloud technology to support over 1,000 of their business applications, many of which are built within organisations without explicit approval – a phenomenon known as ‘shadow IT’. The problem of organisational misalignment is exacerb...
FEB 27, 2019 | 1:00 pm
CLOSING THE THREAT INTELLIGENCE EFFECTIVENESS GAP
In a recently released Ponemon Institute report, "The Value of Threat Intelligence: Annual Study of North American & United Kingdom Companies," the importance of threat intelligence in achieving a strong cybersecurity posture is rated as very high at 85%, but only 41% of resp...
FEB 27, 2019 | 1:00 PM
HOW TO HACK AND THEN DEFEND THE ENDPOINT
Endpoint security controls are an integral layer in required for effectively protection against malware and other sophisticated cyberattacks. Although the cyberthreat landscape and hackers’ tactics are constantly evolving, basic IT security principles remain largely unchanged– ...
FEB 27, 2019 | 1:00 p.m,
USING AI MACHINE LEARNING IN CYBERSECURITY
AI and machine learning have proven to be valuable technologies when it comes to detecting threats at time zero and across various vectors.  But there is a time and place for its usage. Join me during my monthly threat webinar and live Q&A session to learn: How you can help improv...

TRY FALCON PREVENT™ START YOUR 15-DAY FREE TRIAL
Sponsored
CrowdStrike is the leader in cloud-delivered next-generation endpoint protection. CrowdStrike has revolutionized endpoint protection by being the first and only company to unify next-generation antivirus, endpoint detection and response (EDR),and a 24/7 managed hunting service — all ...
TODAY’S TOP SECURITY CONCERNS: ARE YOUR ERP APPLICATIONS READY?
Sponsored
In recent 451 Research studies, enterprises continue to report three primary security concerns. These challenges affect overall cybersecurity strategies as well as an organization’s business-critical application security: The maintenance of security hygiene is not just an ongoing issue for...
BUSINESS AND RISK BASED FRAMEWORK DEPLOYMENT
A complete defense cannot be deployed overnight. There are multiple people, process and technology components to consider and implement. In the closing session, we will help identify where and how resources can be focused to have the biggest immediate risk reduction, discuss lessons learne...
PANEL: FRAUD INVESTIGATIONS - HOW TO WORK EFFECTIVELY WITH LAW ENFORCEMENT, GOVERNMENT & LITIGATORS
Public-sector organizations need to better understand the driving forces, priorities and procedures within the organizations they "protect." But equally as important is that the private-sector organizations reciprocate and understand the how, what and why of the law enforcement/public body...
SUPPLY CHAIN SECURITY - THE FIRST AND WEAKEST LINK IN THE CHAIN?
Do you have a supply chain or just vendors? Do any or all of them present a breach potential? We apply massive resources to hardening perimeters and preventing infiltration of our information security systems, but what if our adversaries have a built-in presence and already have a foothold...
THE LEGAL ISSUES OF USING BIG DATA TO COMBAT FRAUD
More and more, instances of fraud are taking place in a digital context. A robust cyber security strategy therefore is essential. This insightful session will share an overview of the key regulatory steps that an organisation should take in order to achieve cyber security compliance as wel...

RESOURCES

To be fair, its method of assessing the security of operating systems is somewhat bunk. It sets a figure based on the number of vulnerabilities found rather than the importance of those vulnerabilitie...

Given the evolving way Web and Cloud applications are used— and the constantly shifting threat landscape organizations must confront—proxy architecture is more important than ever in terms...

Current challenges. According to the ACSC Threat Report 2017, cybercrime is a prevalent threat for Australia. It enables criminals to generate large profits with a low risk of identification and preve...

Cyber risks pose unique threats to financial stability that are not well understood or managed, despite growing investment in research and dependence by financial institutions, consumers, and governme...

This White Paper offers an overview of ETSI's work on security in Information and Communications Technologies (ICT). Each section introduces a specific technology and outlines ETSI's involveme...

Sony, Target, Westinghouse, Home Depot, U.S. Steel, Neiman Marcus, and the National Security Agency (NSA). The security breaches suffered by these and many other organizations, including most recently...

The ever-changing threat landscape requires more robust security risk management programs that can defend against the unknown. This survey assesses how healthcare entities are doing with regulatory co...

Threat intelligence is rapidly becoming an ever-higher business priority. There is a general awareness of the need to ‘do’ threat intelligence, and vendors are falling over themselves to o...

Decades ago, a group of merchants created a concept of general average—which is when all parties in a maritime venture share in losses resulting from a sacrifice of cargo in an emergency. What t...