NEWS

   

    home.aspx
  • Cybersecurity in 2020: IoT Medical Devices, Ransomware, Legacy OS

    The healthcare sector in 2019 has taken some massive blows when it comes to cybersecurity, big hacks, and third-party vendor breaches. The American Medical Collection Agency data breach dominated the ...


    READ MORE
    https://healthitsecurity.com/news/cybersecurity-in-2020-iot-medical-devices-ransomware-legacy-os7049
  • Abundance of cybersecurity tools puts enterprises at risk

    New research from the enterprise security firm ReliaQuest has revealed that a rapid increase in the number of security tools used by enterprises is limiting their return on investment while also incre...


    READ MORE
    https://www.techradar.com/news/abundance-of-cybersecurity-tools-puts-enterprises-at-risk7047
  • Amid Pensacola cyber attack, expert warns more hacks on the way

    As Pensacola, Florida, battles a cyber attack that shut down much of the city’s network, one expert says more state and local governments are at risk as their systems remain vulnerable.“It...


    READ MORE
    https://www.foxbusiness.com/money/pensacola-cyber-attack-expert-warns-more-hacks-on-the-way7044
  • Cybersecurity for Building Automation Systems

    Rapid adoption of IoT-based systems with the promise of significantly reducing operational costs is driving rapid growth in the building and facility automation marketplace. The purpose of these syste...


    READ MORE
    https://securityboulevard.com/2019/12/cybersecurity-for-building-automation-systems/7048
  • Your NAS Devices are under Threat From Ransomware, Say Researchers

    The number of ransomware attacks has shot up, with such incidents being reported quite often, especially in sectors such as healthcare and government agencies. Now, security experts are saying that ra...


    READ MORE
    https://cyware.com/news/your-nas-devices-are-under-threat-from-ransomware-say-researchers-21cee0637043
  • 2020 is when cybersecurity gets even weirder, so get ready

    Tech analyst Forrester predicts that deepfakes could end up costing businesses a lot of money next year: as much as $250m. That might happen in a couple of ways. There's the risk to your share pri...


    READ MORE
    https://www.zdnet.com/article/2020-is-when-cybersecurity-gets-even-weirder-so-get-ready/7039
  • Security Experts Track the New Buer Loader

    On August 28, 2019, security experts spotted a campaign that involved malicious email messages pretending to be email replies to earlier messages. These emails had Microsoft Word attachments that down...


    READ MORE
    https://cyware.com/news/security-experts-track-the-new-buer-loader-f2d8ff5b7041
  • US Family Loses Life Savings in Money Mule Email Scam

    The Federal Bureau of Investigation has issued a warning after a family from Oregon lost their life savings in a business email compromise scam involving money mules. Aaron Cole and his wife decided t...


    READ MORE
    https://www.infosecurity-magazine.com/news/us-family-lose-life-savings-in/7037
  • Security Experts On Report Highlights Nation-State Cyberthreats Facing SMBs In 2020

    Cybersecurity firm AppRiver released its Q4 Cyberthreat Index for Business Survey, highlighting the threats facing small- and medium-sized businesses (SMBs) as we transition into 2020. The survey feat...


    READ MORE
    https://www.informationsecuritybuzz.com/expert-comments/security-experts-on-report-highlights-nation-state-cyberthreats-facing-smbs-in-2020/7038

EVENTS

Conferences

DACH STRATEGYFORUM CYBER AND INFORMATION SECURITY

DACH STRATEGYFORUM CYBER AND INFORMATION SECURITY

January 28-29, 2020
IN DISCUSSION. Protecting your business through ai and automation. The impact of geopolitics on your security strategy. From guardian to companion of digitization - developing the ciso's role. Developing employee awareness or is trust your best defence? Do we need the cloud and how to use it saf...

Phoenix Cyber Security Conference

PHOENIX CYBER SECURITY CONFERENCE

January 29-29, 2020
Phoenix Cyber Security Conference brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce. Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber A...

Cybernetix.world 2020

CYBERNETIX.WORLD 2020

February 04-05, 2020
The image of our future is changing rapidly. The technological advancements of the last decade offer unique opportunities for business growth and make the inclusion of societies which are left behind possible. But, it also presents society with security and ethical challenges. We witness the rise of...

The award-winning 9th Annual European Information Security Summit

THE AWARD-WINNING 9TH ANNUAL EUROPEAN INFORMATION SECURITY SUMMIT

February 12-13, 2020
The European Information Security Summit is now the largest and most comprehensive cyber security summit in Europe. It features parallel streams focusing on Culture & Education, Data & Technology, and the Threat Landscape – giving you three conferences in one. In addition, TEISS also f...

2019 Annual Computer Security Applications Conference

2019 ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE

December 09-13, 2019
ACSAC brings together cutting-edge researchers, with a broad cross-section of security professionals drawn from academia, industry, and government, gathered to present and discuss the latest security results and topics. With peer reviewed technical papers, invited talks, panels, national interest di...

The 8th Annual Cyber Security and Data Security Forum

THE 8TH ANNUAL CYBER SECURITY AND DATA SECURITY FORUM

December 10-12, 2019
With the continuous increase of cyber crime in the Middle East and the new cyber attacks, organisations are facing challenges in securing their data and prevent from important information breach. The 8th Annual Cyber Security and Data Security Forum will focus on how to detect, prevent the cyber thr...

World Congress on Internet Security (WorldCIS-2019)

WORLD CONGRESS ON INTERNET SECURITY (WORLDCIS-2019)

December 09-11, 2019
The WorldCIS-2019 is an international forum dedicated to the advancement of the theory and practical implementation of security on the Internet and Computer Networks. The inability to properly secure the Internet, computer networks, protecting the Internet against emerging threats and vulnerabilitie...

SiriusDecisions 2019 Technology Exchange

SIRIUSDECISIONS 2019 TECHNOLOGY EXCHANGE

December 09-11, 2019
The drive for growth never ceases for b-to-b organizations, and more than ever technology is at the centre of enabling that progress. Gone are the days however when a disparate, disconnected set of platforms strewn across sales, marketing an product can serve the organization effectively. An aligned...

 

Webinars

JAN 15, 2020 | 10:00 AM CST-11:00 CST
Sponsored
BUILDING CLOUD INTERCONNECT FABRICS TO MOVE UP THE VALUE CHAIN
Enterprises planning for a hybrid multi-cloud future are looking to multi-tenant data centers (MTDCs) for colocation and hosted private cloud services, and MTDC providers are innovating to make their facilities more attractive and move up the value chain for increased profitability. For ma...
DEC 17, 2019 | 3:00 PM
SMART BUILDING CYBERSECURITY AS A SERVICE
The advent of IoT technologies is accelerating the collection of data, enabling greater insights into how buildings operate. Comprehensively interpreting data can highlight possible failure points, identify where opportunities may lay to improve the indoor environment, reduce absenteeism, ...
DEC 17, 2019 | 11:00 AM
PRIORITIES AND PREDICTION
2019 saw more breaches than the previous year – 54% more to be exact. Experts estimate cybersecurity risks and threats will increase in 2020 as hackers continue to follow the path of least resistance: abusing privileged credentials to access sensitive systems and data.
DEC 18, 2019 | 11:00 AM
2020'S TOP CYBERSECURITY CHALLENGES
The increasing move from local databases to cloud allows for more opportunities for human error and hacker ingenuity to result in breaches. Your cell phone is the next frontier in cyber crime. Techniques to infect mobile devices are becoming more common.
DEC 18, 2019 | 11:30 PM
SECURING ONLINE PAYMENT AND WEB BANKING PLATFORMS
Industry-wide breakthroughs like open banking have prompted a digital banking race, with a growing wave of Neobanks and traditional banks fighting for their share of the retail banking market. However, organizations are placing important logic in unsafe environments (the client-side). Expo...
DEC 18, 2019 | 7:00 PM
HOW TO THINK LIKE A HACKER?
Computer security is a very unique field. Unlike other fields in which the challenge is to overcome the scale of a problem or the complexity of an algorithm, in computer security the challenge is the wit of another human being who is trying to carry out an attack in order to compromise and...

TRY FALCON PREVENT™ START YOUR 15-DAY FREE TRIAL
Sponsored
CrowdStrike is the leader in cloud-delivered next-generation endpoint protection. CrowdStrike has revolutionized endpoint protection by being the first and only company to unify next-generation antivirus, endpoint detection and response (EDR),and a 24/7 managed hunting service — all ...
TODAY’S TOP SECURITY CONCERNS: ARE YOUR ERP APPLICATIONS READY?
Sponsored
In recent 451 Research studies, enterprises continue to report three primary security concerns. These challenges affect overall cybersecurity strategies as well as an organization’s business-critical application security: The maintenance of security hygiene is not just an ongoing issue for...
SHAPING THE FINANCIAL ECOSYSTEM WITH SECURE APIS
Sponsored
Have you noticed that many of the leading banks and insurance companies have developer portals with APIs? In this webinar, we’ll discuss how customers’ needs for financial freedom are shaping the financial ecosystem, leading to an explosion of open APIs and a more integrated customer exper...
IMPACT OF YOUR BUSINESS CONTINUITY PROGRAM ON CYBER RESILIENCY
Sponsored
Business Continuity Awareness Week 2018 - Impact of your business continuity program on Cyber Resiliency. Every division inside IBM has a fully functional Business Continuity program focused on identifying what's critical to IBM's internal operations and making sure these business processe...
LEARNING AT THE SPEED OF BUSINESS
Sponsored
Join Ian Stevens, North America L&D Lead at Publicis Sapient will share his team's successful learning programs that prepared Sapient's consultants to be leaders in digital transformation. Watch now to walk away with: A proven "push-pull" blended learning program How to tie learning with h...
LEARNING AT THE SPEED OF BUSINESS
Sponsored
Join Ian Stevens, North America L&D Lead at Publicis Sapient will share his team's successful learning programs that prepared Sapient's consultants to be leaders in digital transformation. Watch now to walk away with: A proven "push-pull" blended learning program How to tie learning with h...

RESOURCES

To be fair, its method of assessing the security of operating systems is somewhat bunk. It sets a figure based on the number of vulnerabilities found rather than the importance of those vulnerabilitie...

Given the evolving way Web and Cloud applications are used— and the constantly shifting threat landscape organizations must confront—proxy architecture is more important than ever in terms...

Current challenges. According to the ACSC Threat Report 2017, cybercrime is a prevalent threat for Australia. It enables criminals to generate large profits with a low risk of identification and preve...

Cyber risks pose unique threats to financial stability that are not well understood or managed, despite growing investment in research and dependence by financial institutions, consumers, and governme...

This White Paper offers an overview of ETSI's work on security in Information and Communications Technologies (ICT). Each section introduces a specific technology and outlines ETSI's involveme...

Sony, Target, Westinghouse, Home Depot, U.S. Steel, Neiman Marcus, and the National Security Agency (NSA). The security breaches suffered by these and many other organizations, including most recently...

The ever-changing threat landscape requires more robust security risk management programs that can defend against the unknown. This survey assesses how healthcare entities are doing with regulatory co...

Threat intelligence is rapidly becoming an ever-higher business priority. There is a general awareness of the need to ‘do’ threat intelligence, and vendors are falling over themselves to o...

Decades ago, a group of merchants created a concept of general average—which is when all parties in a maritime venture share in losses resulting from a sacrifice of cargo in an emergency. What t...