• NEWS

    NEWS

    THE LATEST NEWS, DEVELOPMENTS AND ANNOUNCEMENTS AS THEY HAPPEN

    more
  • EVENTS

    EVENTS

    CONFERENCES, TRADE SHOWS, LIVE WEBCASTS, NEW LAUNCHES, SEMINARS AND TRAINING EVENTS

    more
  • COMPANIES

    COMPANIES

    PARTNERS, SOLUTIONS & SERVICE PROVIDERS, SUPPLIERS AND INDUSTRY ORGANIZATIONS

    more
  • RESOURCES

    RESOURCES

    WHITEPAPERS, MARKET REPORTS, RESEARCH, ON-DEMAND WEBINARS, VIDEOS AND INFOGRAPHICS

    more

NEWS

   

    home.aspx
  • InfosecNA18: NSA Weighs In on SOC Defense

    In his opening keynote presentation kicking off the second day of this year’s Infosecurity North America conference in New York, the technical director of cybersecurity threat operations center ...


    READ MORE
    https://www.infosecurity-magazine.com/news/infosecna18-nsa-weighs-in-on-soc/5558
  • Firefox Alerts Users When Visiting Breached Sites

    Mozilla has added a new feature to Firefox to alert users when they visit a website that has been part of a data breach in the past. Earlier this year, the Internet organization launched Firefox Monit...


    READ MORE
    https://www.securityweek.com/firefox-alerts-users-when-visiting-breached-sites5559
  • Report Shows Increase in Email Attacks Using .com File Extensions

    Leesburg, VA-based anti-phishing firm Cofense (formerly PhishMe) has discovered an uptick in the use of .com file extensions in phishing emails. The .com file extension designated executable files in ...


    READ MORE
    https://www.securityweek.com/report-shows-increase-email-attacks-using-com-file-extensions5560
  • InfosecNA18: Building a Security Awareness Program

    At the second annual Infosecurity North America conference at the Jacob Javits Convention Center in New York, Tom Brennan, US chairman, CREST International, moderated a panel called Securing the Workf...


    READ MORE
    https://www.infosecurity-magazine.com/news/infosecna18-building-a-security/5553
  • Apple iPhone Hacked at Mobile Pwn2Own 2018

    Once again, security researchers have demonstrated at a Pwn2Own event that fully patched mobile devices are at risk from zero-day vulnerabilities. At Mobile Pwn2Own 2018, held in Tokyo Nov 13-14, spon...


    READ MORE
    http://www.eweek.com/security/apple-iphone-hacked-at-mobile-pwn2own-20185554
  • Nordstrom Quick to Tell Employees of a Data Breach

    Nordstrom is the latest victim in a long line of data breaches suffered across the retail sector, according to The Seattle Times. The Seattle-based retailer suffered a data breach in which a wide rang...


    READ MORE
    https://www.infosecurity-magazine.com/news/nordstrom-quick-to-tell-employees/5547
  • Facebook Bug Let Websites Access Private User Data

    A security researcher at Imperva recently identified a vulnerability within Facebook that could have allowed other websites to extract private information about users and their contacts. Discovered by...


    READ MORE
    https://www.infosecurity-magazine.com/news/facebook-bug-let-websites-access/5548
  • Countries Back the Paris Call to Secure Cyberspace

    In an attempt to develop a set of shared principles for securing cyberspace, France’s president, Emmanuel Macron, launched the Paris Call for Trust and Security in Cyberspace at yesterday’...


    READ MORE
    https://www.infosecurity-magazine.com/news/states-back-the-paris-call-to/5549
  • Survey Shows Consumers Still Trust Brands but Want More Control over Data

    A Janrain survey shows that U.S. consumers still generally trust brands but welcome consent-based relationships following the recent spate of breaches and controversies affecting data privacy. U.S. co...


    READ MORE
    https://www.securitymagazine.com/articles/89580-survey-shows-consumers-still-trust-brands-but-want-more-control-over-data5552

EVENTS

Conferences

Enterprise Security & Risk Management Summit 2018

ENTERPRISE SECURITY & RISK MANAGEMENT SUMMIT 2018

November 21-21, 2018
Cyber security is fast becoming one of the most critical issues in the IT world. As an increasing number of businesses are going digital and with cyber criminals becoming far more prolific and dangerous, the need for steadfast cyber security solutions has never been so important.

AINS 2018 IEEE CONFERENCE ON APPLICATIONS, INFORMATION & NETWORK SECURITY

AINS 2018 IEEE CONFERENCE ON APPLICATIONS, INFORMATION & NETWORK SECURITY

November 21-22, 2018
5G promises to deliver enhanced mobile broadband (eMBB), massive machine type communication (mMTC), and ultra-reliable low latency communication (URLLC). To support mMTC and URLLC, 5G needs to carry out computations closer to subscribers at the “edge” instead of the cloud. This turns 5G ...

African Blockchain and Cyber Security Conference Tour 2018

AFRICAN BLOCKCHAIN AND CYBER SECURITY CONFERENCE TOUR 2018

November 05-24, 2018
The African Blockchain and Cyber Security Conference Tour 2018 create a platform for the exchange of knowledge and experience in the cyber security, blockchain, cryptocurrency universe with regulation topics. The conferences series will open its doors for banks, government organizations, universitie...

Los Angeles Cyber Security Summit

LOS ANGELES CYBER SECURITY SUMMIT

November 29-29, 2018
The Los Angeles Cyber Security Summit, organized by the Cyber Security Summit will take place on 29th November 2018 at the in Beverly Hills, United States. The conference has been designed for exclusively invited C-Suite & Senior Level Executives in need of innovative solutions to protect their ...

Central European Cybersecurity Conference 2018

CENTRAL EUROPEAN CYBERSECURITY CONFERENCE 2018

November 15-16, 2018
The second Central European Cybersecurity Conference – CECC 2018 aims at establishing a venue for the exchange of information on cybersecurity and its many aspects in central Europe. CECC 2018 encourages the dialogue between researchers of technical and social aspects of cybersecurity, both cr...

QuBit Sofia 2018

QUBIT SOFIA 2018

November 16-16, 2018
7 reasons why to attend QuBit Conference. To be informed about latest trends and threats in Cyber Security field and stay one step ahead by getting know how other handle their security. To attend highly educational presentations, visionary key-note speeches and technical case studies. To connect wit...

Cyber Security Summit & Expo

CYBER SECURITY SUMMIT & EXPO

November 15-15, 2018
The Cyber Security Summit & Expo is designed for those who are actively engaged in cyber security and cybercrime sectors, senior business leaders for whom cyber security is a business-critical issue and everyone in-between to network and openly discuss new: Cost effective methods of protecting y...

Pro Homeland Security Conference 2018

PRO HOMELAND SECURITY CONFERENCE 2018

November 15-15, 2018
The Homeland Security Conference focuses on bringing together representatives from the cyber security community, industry decision makers, governmental authorities and academics. This is reflected in our strong, international speakers list including some of the leading experts and professionals from...

 

Webinars

NOV 19, 2018
5 CRITICAL REASONS TO REPLACE AV
Traditional endpoint security can’t keep up with the ever-evolving threat landscape. It’s complicated, costly, and puts stress on already overworked security staff. In fact, 67% of security staff say that they’re too busy to keep up with their trainings. More and more, co...
NOV 27, 2018 | 11 AM
2018 BLACK HAT HACKER SURVEY REPORT: WHAT HACKERS REALLY THINK ABOUT YOUR CYBER DEFENSES
Curious about what hackers really think of your cyber defenses? Thycotic’s new 2018 Black Hat Conference survey conducted in Las Vegas in August reveals some disturbing answers. 75% hackers say companies fail at applying the principle of least privilege. 50% of hackers say they easil...
NOV 27, 2018 | 1:30 PM
CYBERCRIME 2.0: A NEW ERA FOR THE IDENTITY AND AUTHENTICATION CHALLENGE
You don't have to be a bank to serve customers online, and even if your customer accounts do not hold money, they still hold value - one that cybercriminals will take advantage of. As customers come to expect services to be available online as the standard, more businesses will have to...
NOV 27, 2018 | 3:00 PM
DESTRUCTIVE CYBERATTACKS ARE ON THE RISE
According to the world’s top incident response (IR) professionals, politically motivated cyberattacks from nation-state actors have contributed to an ominous increase in destructive attacks: attacks that are tailored to specific targets, cause system outages, and destroy data in ways...
NOV 29, 2018 | 8:00 AM
IDENTITY VERIFICATION & AUTHENTICATION MADE EASY
Astonishingly, a vast number of businesses still follow an “inside-out” approach when it comes to shaping the customer journey. They look at this from their internal perspective, “inside-out”, focusing on an approach that works well for them. However, to serve a cus...
NOV 29, 2018 | 10:00 AM
PROTECTING FINANCE MOBILE APPS AGAINST HACKERS & REDUCING FRAUD
Financial services firms are consistently working to make their mobile user experiences more cost-efficient and user-friendly. While security and fraud have always been important to financial institutions, mobile apps used by customers create a security challenge. Firms have no visibility ...

TRY FALCON PREVENT™ START YOUR 15-DAY FREE TRIAL
Sponsored
CrowdStrike is the leader in cloud-delivered next-generation endpoint protection. CrowdStrike has revolutionized endpoint protection by being the first and only company to unify next-generation antivirus, endpoint detection and response (EDR),and a 24/7 managed hunting service — all ...
TODAY’S TOP SECURITY CONCERNS: ARE YOUR ERP APPLICATIONS READY?
Sponsored
In recent 451 Research studies, enterprises continue to report three primary security concerns. These challenges affect overall cybersecurity strategies as well as an organization’s business-critical application security: The maintenance of security hygiene is not just an ongoing issue for...
PANEL: FRAUD INVESTIGATIONS - HOW TO WORK EFFECTIVELY WITH LAW ENFORCEMENT, GOVERNMENT & LITIGATORS
Public-sector organizations need to better understand the driving forces, priorities and procedures within the organizations they "protect." But equally as important is that the private-sector organizations reciprocate and understand the how, what and why of the law enforcement/public body...
SUPPLY CHAIN SECURITY - THE FIRST AND WEAKEST LINK IN THE CHAIN?
Do you have a supply chain or just vendors? Do any or all of them present a breach potential? We apply massive resources to hardening perimeters and preventing infiltration of our information security systems, but what if our adversaries have a built-in presence and already have a foothold...
THE LEGAL ISSUES OF USING BIG DATA TO COMBAT FRAUD
More and more, instances of fraud are taking place in a digital context. A robust cyber security strategy therefore is essential. This insightful session will share an overview of the key regulatory steps that an organisation should take in order to achieve cyber security compliance as wel...
2015 FACES OF FRAUD - LONDON
As recent incidents prove: Retail point-of-sale breaches are on the rise, creating greater payment card fraud headaches for banking institutions. How does the impact of these crimes compare to that of account takeover, check fraud, insider crimes and the emerging realms of virtual and mobi...

RESOURCES

To be fair, its method of assessing the security of operating systems is somewhat bunk. It sets a figure based on the number of vulnerabilities found rather than the importance of those vulnerabilitie...

Given the evolving way Web and Cloud applications are used— and the constantly shifting threat landscape organizations must confront—proxy architecture is more important than ever in terms...

Current challenges. According to the ACSC Threat Report 2017, cybercrime is a prevalent threat for Australia. It enables criminals to generate large profits with a low risk of identification and preve...

Cyber risks pose unique threats to financial stability that are not well understood or managed, despite growing investment in research and dependence by financial institutions, consumers, and governme...

This White Paper offers an overview of ETSI's work on security in Information and Communications Technologies (ICT). Each section introduces a specific technology and outlines ETSI's involveme...

Sony, Target, Westinghouse, Home Depot, U.S. Steel, Neiman Marcus, and the National Security Agency (NSA). The security breaches suffered by these and many other organizations, including most recently...

The ever-changing threat landscape requires more robust security risk management programs that can defend against the unknown. This survey assesses how healthcare entities are doing with regulatory co...

Threat intelligence is rapidly becoming an ever-higher business priority. There is a general awareness of the need to ‘do’ threat intelligence, and vendors are falling over themselves to o...

Decades ago, a group of merchants created a concept of general average—which is when all parties in a maritime venture share in losses resulting from a sacrifice of cargo in an emergency. What t...