• NEWS

    NEWS

    THE LATEST NEWS, DEVELOPMENTS AND ANNOUNCEMENTS AS THEY HAPPEN

    more
  • EVENTS

    EVENTS

    CONFERENCES, TRADE SHOWS, LIVE WEBCASTS, NEW LAUNCHES, SEMINARS AND TRAINING EVENTS

    more
  • COMPANIES

    COMPANIES

    PARTNERS, SOLUTIONS & SERVICE PROVIDERS, SUPPLIERS AND INDUSTRY ORGANIZATIONS

    more
  • RESOURCES

    RESOURCES

    WHITEPAPERS, MARKET REPORTS, RESEARCH, ON-DEMAND WEBINARS, VIDEOS AND INFOGRAPHICS

    more

NEWS

   

    home.aspx
  • Hackers Say Windows 8 and 10 Easiest Entry Points

    According to a newly released survey conducted at Black Hat 2018, 50% of hackers said that Windows 8 and Windows 10 have been the easiest attack vectors to exploit this year. Thycotic surveyed more th...


    READ MORE
    https://www.infosecurity-magazine.com/news/hackers-say-windows-8-10-easiest/5417
  • Legislation Introduced to Solve Cyber Work Shortage

    US lawmakers have introduced a bipartisan bill in the House of Representatives to address the cybersecurity workforce shortage. The Cyber Ready Workforce Act (H.R.6791) was introduced by U.S. Reps. Da...


    READ MORE
    https://www.securitymagazine.com/articles/89424-legislation-introduced-to-solve-cyber-work-shortage5418
  • Bill for Financial Services Breach Notification Passed

    A bill to standardized the data security and breach notification process for financial institutions has been approved by the House Financial Services Committee, despite pleas not to undermine the powe...


    READ MORE
    https://www.infosecurity-magazine.com/news/financial-services-breach/5412
  • Campaign Targets Nonresidents with Fake IRS Email

    While the fall might seem like a peculiar time to receive emails from the Internal Revenue Service (IRS), researchers at Fortinet have discovered a phishing campaign claiming to be from the IRS but re...


    READ MORE
    https://www.infosecurity-magazine.com/news/campaign-targets-nonresident-email/5413
  • Juniper Brings Contrail to the Edge, Works Closely With Red Hat

    Juniper Networks’ new Contrail Edge Cloud packs functionality into a small footprint to bring cloud capabilities and virtualization to the edge network. “Edge” according to Juniper i...


    READ MORE
    https://www.sdxcentral.com/articles/news/juniper-brings-contrail-to-the-edge-works-closely-with-red-hat/2018/09/5414
  • Collaborative NIST Project to Manage Privacy Risk

    Protecting individual privacy as the internet of things (IOT) continues to expand is increasingly challenging. To help meet those challenges, the US Department of Commerce’s National Institute o...


    READ MORE
    https://www.infosecurity-magazine.com/news/collaborative-nist-project-to/5408
  • Little Security Input in IoT Deployment Decisions

    A recent survey of global IT and security decision-makers found that companies are exposing themselves to greater risks by excluding IT security teams from discussions on internet of things (IoT) depl...


    READ MORE
    https://www.infosecurity-magazine.com/news/low-security-input-in-iot/5409
  • Premera Blue Cross Accused of Destroying Computer

    A motion has been filed on behalf of the plaintiffs in a class action lawsuit against Premera Blue Cross insurance. Filed on August 30, 2018, in the US District Court in Portland, Oregon, the motion a...


    READ MORE
    https://www.infosecurity-magazine.com/news/premera-blue-cross-accused-of/5404
  • Multiple Vulnerabilities Found in Opsview Monitor

    SecureAuth Core Security today published a vulnerability disclosure in conjunction with enterprise systems monitoring software provider Opsview. The publication of the disclosure is related to five vu...


    READ MORE
    https://www.infosecurity-magazine.com/news/multiple-vulnerabilities-found-in/5405

EVENTS

Conferences

Consumer Identity World USA 2018

CONSUMER IDENTITY WORLD USA 2018

September 19-21, 2018
Find the perfect Consumer Identity & Access Management (CIAM) Strategy for your Connected Customer. Balancing User Experience, Privacy, and Security. The Consumer Identity World Tour is the place where you get input for your perfect CIAM Strategy. Learn more about Privacy by Design, Consent Life...

Georgia Digital Government Summit

GEORGIA DIGITAL GOVERNMENT SUMMIT

September 20-21, 2018
Government Technology’s passion is helping spread best practices and spurring innovation in the public sector. The Georgia Digital Government Summit is designed to do just that. The summit has an advisory board that gathers public sector and private sector leaders to create an agenda designed ...

Cyber Security in e-payment Conference 2018

CYBER SECURITY IN E-PAYMENT CONFERENCE 2018

September 21-21, 2018
With the development of information technology, it is more simple and convenient to use online payment. Online commerce also helps business to reach wider market. However, risks and frauds are associated with online payments. In address to the trend in online payment, we are going to provide a platf...

Arab Security Conference 2018

ARAB SECURITY CONFERENCE 2018

September 23-24, 2018
Arab Security Conference is an annual cyber security conference held in Cairo, Egypt. Hosted by Arab Security Consultants and ISEC, firms operating in the field of Information security in Egypt and The Middle East. It strives to raise Cyber Security Awareness in the Arab world. The Mission Of The Co...

SINET GLOBAL CYBERSECURITY INNOVATION SUMMIT

SINET GLOBAL CYBERSECURITY INNOVATION SUMMIT

September 18-19, 2018
SINET – London creates a forum to build and maintain international relationships required to foster vital information sharing, broad awareness and the adoption of innovative Cybersecurity technologies.

5th Annual Industrial Control Cybersecurity USA conference

5TH ANNUAL INDUSTRIAL CONTROL CYBERSECURITY USA CONFERENCE

September 18-19, 2018
Protecting essential services and control systems networks are imperative and in many cases neglected in relation to embedded systems in modern architecture. The proliferation and advancement of operational technologies and the Internet of Things, the convergence of IT and OT have enhanced operation...

3rd Annual Cyber Security Connect East

3RD ANNUAL CYBER SECURITY CONNECT EAST

September 18-18, 2018
Global cyber-attacks are quickly becoming part of anticipated business costs. Companies no longer believe they can safeguard their organizations from an attack. The focus is now on how to quickly and efficiently react and recover from the breadth of malware, phishing, hacktivism, DDoS attacks, cyber...

SAN FRANCISCO BAY AREA (CYBERSECURITY)

SAN FRANCISCO BAY AREA (CYBERSECURITY)

September 13-13, 2018
The San Francisco Bay Area Cyber Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and...

 

Webinars

SEP 27, 2018 | 1:00 PM — 2:00 PM
GET A ‘HOME COURT’ ADVANTAGE TO PROTECT YOUR APPLICATIONS
Sophisticated threats continue to rise in numbers and scale, generating more security alerts than organizations can feasibly respond to with their limited time and resources. With the rapid adoption of hybrid cloud solutions, there are now even more gaps in end-to-end visibility and contro...
SEP 27, 2018
AI AND CYBERSECURITY - APPLYING MACHINE LEARNING TO UTILITY CYBER DEFENCE
How can utilities preserve the reliability and performance of their operational technology and simultaneously, protect these assets? Increasing integration of IT and operational technology (OT) alongside broader digitization has lead to evolving cyber threats to mission-critical infrastruc...
OCT 08, 2018 | 1:00 PM
ENTRUST DATA CARD: DERIVED CREDENTIALS FOR HIGHLY-REGULATED INDUSTRIES
IBM MaaS360 with Watson unified endpoint management (UEM) now integrates with Entrust Datacard derived credentials to provide strong authentication for anytime, anywhere access to enterprise mobile applications, resources and data. Securing your users’ mobile devices is crucial, and ...
OCT 09, 2018 | 2:00 - 3:00 p.m.
CYBERSECURE MY BUSINESS™ WEBINAR – SMALL BUSINESS SCAMS: WHAT TO LOOK OUT FOR AND HOW TO PROTECT YOUR SMALL BUSINESS FROM THEM
Join NCSA and our partners for National Cyber Security Awareness Month, where we’ll be discussing small business scams, and how small business owners and employees can identify them and protect themselves against such scams.
DEC 11, 2018 | 3:00 pm
TRENDS IN CYBER ATTACKS AND BREACHES
The changing threat landscape reality and the frequency, sophistication and targeted nature of adversaries requires an evolution of security operational practices to a combination of prevention, detection and response of cyberattacks.

PANEL: FRAUD INVESTIGATIONS - HOW TO WORK EFFECTIVELY WITH LAW ENFORCEMENT, GOVERNMENT & LITIGATORS
Public-sector organizations need to better understand the driving forces, priorities and procedures within the organizations they "protect." But equally as important is that the private-sector organizations reciprocate and understand the how, what and why of the law enforcement/public body...
SUPPLY CHAIN SECURITY - THE FIRST AND WEAKEST LINK IN THE CHAIN?
Do you have a supply chain or just vendors? Do any or all of them present a breach potential? We apply massive resources to hardening perimeters and preventing infiltration of our information security systems, but what if our adversaries have a built-in presence and already have a foothold...
THE LEGAL ISSUES OF USING BIG DATA TO COMBAT FRAUD
More and more, instances of fraud are taking place in a digital context. A robust cyber security strategy therefore is essential. This insightful session will share an overview of the key regulatory steps that an organisation should take in order to achieve cyber security compliance as wel...
2015 FACES OF FRAUD - LONDON
As recent incidents prove: Retail point-of-sale breaches are on the rise, creating greater payment card fraud headaches for banking institutions. How does the impact of these crimes compare to that of account takeover, check fraud, insider crimes and the emerging realms of virtual and mobi...
CEO'S ROLE IN THE FIGHT AGAINST FRAUD
In today's era of digital fraud, CEOs need to have a thorough understanding of threats and risks as well as the urgency of properly assessing and responding to incidents. It is not IF but WHEN your organisation will suffer a security breach. Without this understanding and an ability to...
BUSINESS EMAIL MASQUERADING: HOW HACKERS ARE FOOLING EMPLOYEES TO COMMIT FRAUD
In the past year, so-called business email compromise attacks, also known as "masquerading" and "executive impersonation," have emerged as one of the greatest wire fraud worries. These schemes threaten to overshadow what was previously seen from commercial account takeover incidents.

RESOURCES

To be fair, its method of assessing the security of operating systems is somewhat bunk. It sets a figure based on the number of vulnerabilities found rather than the importance of those vulnerabilitie...

Given the evolving way Web and Cloud applications are used— and the constantly shifting threat landscape organizations must confront—proxy architecture is more important than ever in terms...

Current challenges. According to the ACSC Threat Report 2017, cybercrime is a prevalent threat for Australia. It enables criminals to generate large profits with a low risk of identification and preve...

This White Paper offers an overview of ETSI's work on security in Information and Communications Technologies (ICT). Each section introduces a specific technology and outlines ETSI's involveme...

Sony, Target, Westinghouse, Home Depot, U.S. Steel, Neiman Marcus, and the National Security Agency (NSA). The security breaches suffered by these and many other organizations, including most recently...

The ever-changing threat landscape requires more robust security risk management programs that can defend against the unknown. This survey assesses how healthcare entities are doing with regulatory co...

Threat intelligence is rapidly becoming an ever-higher business priority. There is a general awareness of the need to ‘do’ threat intelligence, and vendors are falling over themselves to o...

Enterprise Chief Security Officers (CSOs) face a myriad of challenges in protecting their organizations’ most confidential business documents as they flow inside and outside of the firm. In addi...

Decades ago, a group of merchants created a concept of general average—which is when all parties in a maritime venture share in losses resulting from a sacrifice of cargo in an emergency. What t...