NEWS

   

EVENTS

Conferences

CYBERSECURITY SUMMIT PORTUGAL

CYBERSECURITY SUMMIT PORTUGAL

October 15-15, 2019
CyberEdTalks, is a division of the global events arm of Information Security Media Groups (ISMG). The CyberEdTalks brand hosts summits around the world in markets that have been determined to be underserved, providing much needed content and education to information security professionals. Content p...

OSMOSIS 2019 Conference

OSMOSIS 2019 CONFERENCE

October 13-15, 2019
Founded in 2015, the OSMOSIS Institute began hosting the annual OSMOSIS Conference to educate, inform and protect investigators and analysts within the cyber security industry. Developed by OSINT (Open Source Intelligence) investigators for the legal, law enforcement, investigative, business and acc...

Cybersecurity Compliance and Data Protection Practice Summit 2019

CYBERSECURITY COMPLIANCE AND DATA PROTECTION PRACTICE SUMMIT 2019

October 14-15, 2019
China Cybersecurity Law (CCL) , Cyber Security Protection Scheme 2.0, Information Security Technology — Personal Information Security Specification and General Data Protection Regulation (GDPR) are very important compliance for the companies operating in China. These new laws bring many regula...

SiriusDecisions Summit APAC

SIRIUSDECISIONS SUMMIT APAC

October 15-16, 2019
SiriusDecisions Summit APAC is the must attend event for our community of sales, marketing and product innovators and trendsetters that drive growth in the most well-respected high-performing companies in the market today. We will showcase our theme; Achieving High Performance by Aligning the B-to-B...

Hacker Halted

HACKER HALTED

October 10-11, 2019
Though we like to have fun and play-act like the pirates in, “Pirates of the Caribbean,” or the “Dread pirate Roberts” in “The Princess Bride,” in reality piracy has been troublesome and deadly since the dawn of civilization. Traveling the Roman roads in sandals w...

SiriusDecisions Summit Europe

SIRIUSDECISIONS SUMMIT EUROPE

October 10-11, 2019
SiriusDecisions Summit Europe is the must attend event for our community of sales, marketing and product innovators and trendsetters that drive growth in the most well-respected high-performing companies in the market today. We will showcase our theme; Achieving High Performance by Aligning the B-to...

CyberNext Summit 2019

CYBERNEXT SUMMIT 2019

October 08-10, 2019
Cybersecurity is shifting toward more distributed and dynamic models. Decentralized security infrastructure brings its challenges and opportunities. CyberNext Summit (#CNS19) summit will focus on the capabilities needed to achieve security in such a distributed environment, especially in the context...

ManuSec: Cyber Security for Critical Manufacturing

MANUSEC: CYBER SECURITY FOR CRITICAL MANUFACTURING

October 08-09, 2019
As the manufacturing sector continues to embrace innovation in technology, it exposes itself to a widening array of cyber threats. To properly face cyber risk in the 21st century, organisations must fully engage all levels from the executive board down, to collaborate and establish best practice pol...

 

Webinars

OCT 22, 2019 | 12:00 PM CST-01:00 AM
Sponsored
THE RESURGENCE OF ASSET MANAGEMENT
Although admittedly not the most exciting part of cybersecurity, asset management is having a moment and becoming a priority for CISOs and security teams. In this webinar, 451 Research Analyst Fernando Montenegro and Axonius CMO Nathan Burke will look at why asset management is still a cha...
OCT 15, 2019 | 6:00 am
HOW VULNERABILITY MANAGEMENT HELPS YOU PREVENT DATA BREACHES AND COMPLY WITH THE GDPR
Unpatched software vulnerabilities are the number one reason behind data breaches and other IT security issues. Most companies, however, are still struggling to keep up with scanning and patching in an environment with dozens of applications, hundreds of devices and over 16,000 new vulnera...
OCT 17, 2019
HOW TO RESPOND VS. REACT IN THE CYBERSECURITY WORLD
Unwind with us before the Diwali break and listen in as three of the ServiceNow India team speak about what is currently happening in the India market and how our Security and IT products are interacting with this. Security orchestration, automation, and response is a way for teams to prio...
OCT 23, 2019 | 2:00 am
TOP 4 CYBER THREATS ATTACKING SMALL AND MID-SIZE BUSINESSES WEBINAR
Are your businesses smartphones, laptops and tablets secure? Cyber-attacks on Small and Mid-size business smartphones, laptops and tablets are on the rise. 61% of cyber-attacks targeted small and midsize businesses. 60% of those companies went out of business within six months of the attac...
OCT 23, 2019 | 1:00 PM
GLOBAL THREATS ON THE RISE: A RUNDOWN ON RANSOMWARE
Ransomware isn’t newin fact it’s over 30 years old. Attacks date back as far as 1989 and have been the most pervasive cyber threat since 2005, with a dramatic spike in recent years. The resulting costs to targeted businesses are soaring. In fact, according to the 2018 Verizon D...
OCT 24, 2019 | 6:30 AM
GOODBYE LEGACY TECHNOLOGIES. HELLO ZERO TRUST NETWORK ACCESS
The promise of cloud and mobility is to provide access to key services quickly and from anywhere at any time from any device. Security teams must embrace technologies that enable this to ensure business productivity. VPNs place users on the network and the DMZ mistakenly expose apps to the...

TRY FALCON PREVENT™ START YOUR 15-DAY FREE TRIAL
Sponsored
CrowdStrike is the leader in cloud-delivered next-generation endpoint protection. CrowdStrike has revolutionized endpoint protection by being the first and only company to unify next-generation antivirus, endpoint detection and response (EDR),and a 24/7 managed hunting service — all ...
TODAY’S TOP SECURITY CONCERNS: ARE YOUR ERP APPLICATIONS READY?
Sponsored
In recent 451 Research studies, enterprises continue to report three primary security concerns. These challenges affect overall cybersecurity strategies as well as an organization’s business-critical application security: The maintenance of security hygiene is not just an ongoing issue for...
SHAPING THE FINANCIAL ECOSYSTEM WITH SECURE APIS
Sponsored
Have you noticed that many of the leading banks and insurance companies have developer portals with APIs? In this webinar, we’ll discuss how customers’ needs for financial freedom are shaping the financial ecosystem, leading to an explosion of open APIs and a more integrated customer exper...
IMPACT OF YOUR BUSINESS CONTINUITY PROGRAM ON CYBER RESILIENCY
Sponsored
Business Continuity Awareness Week 2018 - Impact of your business continuity program on Cyber Resiliency. Every division inside IBM has a fully functional Business Continuity program focused on identifying what's critical to IBM's internal operations and making sure these business processe...
LEARNING AT THE SPEED OF BUSINESS
Sponsored
Join Ian Stevens, North America L&D Lead at Publicis Sapient will share his team's successful learning programs that prepared Sapient's consultants to be leaders in digital transformation. Watch now to walk away with: A proven "push-pull" blended learning program How to tie learning with h...
LEARNING AT THE SPEED OF BUSINESS
Sponsored
Join Ian Stevens, North America L&D Lead at Publicis Sapient will share his team's successful learning programs that prepared Sapient's consultants to be leaders in digital transformation. Watch now to walk away with: A proven "push-pull" blended learning program How to tie learning with h...

RESOURCES

To be fair, its method of assessing the security of operating systems is somewhat bunk. It sets a figure based on the number of vulnerabilities found rather than the importance of those vulnerabilitie...

Given the evolving way Web and Cloud applications are used— and the constantly shifting threat landscape organizations must confront—proxy architecture is more important than ever in terms...

Current challenges. According to the ACSC Threat Report 2017, cybercrime is a prevalent threat for Australia. It enables criminals to generate large profits with a low risk of identification and preve...

Cyber risks pose unique threats to financial stability that are not well understood or managed, despite growing investment in research and dependence by financial institutions, consumers, and governme...

This White Paper offers an overview of ETSI's work on security in Information and Communications Technologies (ICT). Each section introduces a specific technology and outlines ETSI's involveme...

Sony, Target, Westinghouse, Home Depot, U.S. Steel, Neiman Marcus, and the National Security Agency (NSA). The security breaches suffered by these and many other organizations, including most recently...

The ever-changing threat landscape requires more robust security risk management programs that can defend against the unknown. This survey assesses how healthcare entities are doing with regulatory co...

Threat intelligence is rapidly becoming an ever-higher business priority. There is a general awareness of the need to ‘do’ threat intelligence, and vendors are falling over themselves to o...

Decades ago, a group of merchants created a concept of general average—which is when all parties in a maritime venture share in losses resulting from a sacrifice of cargo in an emergency. What t...