NEWS

   

    home.aspx
  • Cybersecurity experts gather at ASTRI forum

    The Hong Kong Applied Science and Technology Research Institute (ASTRI) organised the ‘Cybersecurity Forum: The Next-Gen Defence against Cyber-Threats on the second day of the Internet Economy S...


    READ MORE
    https://www.opengovasia.com/cybersecurity-experts-gather-at-astri-forum/6380
  • Singapore Responds to Recent Cybersecurity Attacks

    During a visit to San Francisco, Singapore foreign affairs minister Vivian Balakrishnan commented that the country cannot "go back to pen and paper. If people lose confidence in the integrity and...


    READ MORE
    https://www.infosecurity-magazine.com/news/singapore-responds-to-recent-1/6386
  • Password 123456 Used by 23.2 Million Users Worldwide

    The National Cyber Security Centre (NCSC) expects 42% of Britain online users to lose money due to fraud, according to its first UK Cyber Survey. Released over the Easter weekend (April 21, 2019), the...


    READ MORE
    https://www.infosecurity-magazine.com/news/password-123456-used-by-23-million/6387
  • How to Avoid the New DNS Hijacking Attacks

    DNS Hijacking has been around for a while. Initially it began as a way for the bad guys to take you to a fake website so that your credit card info could be stolen, or so that you could be loaded with...


    READ MORE
    https://www.eweek.com/security/how-to-avoid-the-new-dns-hijacking-attacks6388
  • Cloud Security Spending Set to Grow, Forrester Forecasts

    As demand and adoption of the cloud continues to grow, there is a corresponding growth in organizations spending more on technologies to help secure cloud workloads, according to analyst firm Forreste...


    READ MORE
    https://www.eweek.com/security/cloud-security-spending-set-to-grow-forrester-forecasts6389
  • How Google Is Using Content Security Policy to Mitigate Web Flaws

    Cross Site Scripting, commonly referred to as XSS, is among the most pervasive flaws on the web today. With an XSS flaw, an attacker is potentially able to inject a script on a site from another domai...


    READ MORE
    https://www.eweek.com/security/how-google-is-using-content-security-policy-to-mitigate-web-flaws6390
  • Popular jQuery JavaScript library impacted by prototype pollution flaw

    Three years after its last major security bug, the jQuery JavaScript library --used on 74 percent of all internet sites-- has received another security patch this week. This security update addresses ...


    READ MORE
    https://www.zdnet.com/article/popular-jquery-javascript-library-impacted-by-prototype-pollution-flaw/6376
  • Cyber-Attack Knocks the Weather Channel Off the Air

    The Weather Channel, based in Atlanta, Georgia, has been hit with a cyber-attack that knocked it off the air for 90 minutes. On April 18, 2019, the organization took to its Twitter channel to confirm ...


    READ MORE
    https://www.infosecurity-magazine.com/news/cyber-attack-knocks-the-weather/6378
  • Google to Block Logins From Embedded Browsers to Prevent Phishing

    Google on Thursday announced that it will soon block login attempts from embedded browser frameworks in an effort to prevent man-in-the-middle (MitM) phishing attacks. The tech giant says phishing att...


    READ MORE
    https://www.securityweek.com/google-block-logins-embedded-browsers-prevent-phishing6379

EVENTS

Conferences

SecureWorld Toronto

SECUREWORLD TORONTO

April 24-24, 2019
SecureWorld is a consistently high-quality event which has topics of interest to security practitioners as well as business executives and staff concerned about securing our data. I always find interesting and topical content that I bring back to share with my colleagues.

2019 INFORMATION SECURITY FORUM

2019 INFORMATION SECURITY FORUM

April 23-24, 2019
The 19th annual Information Security Forum will be held on April 23-24, 2019 at the Palmer Events Center in Austin, Texas and is hosted by the Texas Department of Information Resources (DIR) and managed by the Office of the Chief Information Security Officer (OCISO).

Cyber Security & Cloud Expo Global 2019

CYBER SECURITY & CLOUD EXPO GLOBAL 2019

April 25-26, 2019
The Cyber Security & Cloud Expo Global 2019 will host two days of top-level discussion around cyber security and cloud, and the impact they are having on industries including government, energy, financial services, healthcare and more. Arriving in the Olympia Grand, London on the 25-26 April 201...

ICS CYBER SECURITY

ICS CYBER SECURITY

April 29-01, 2019
As the most established Industrial Control Systems Cyber Security Event in Europe, the ICS cyber security conference brings together leading practitioners, operators and decision makers form across Europe to share a wealth of  practical experience in implementing cyber security in organisations...

2019 Industrial Control Systems (ICS) Cyber Security Conference

2019 INDUSTRIAL CONTROL SYSTEMS (ICS) CYBER SECURITY CONFERENCE

April 16-18, 2019
As the largest and longest-running cyber security-focused conference for the industrial control systems sector, the event caters to the energy, utility, chemical, transportation, manufacturing, and other industrial and critical infrastructure organizations, including the military. The conference wil...

(ISC)² Secure Summit EMEA

(ISC)² SECURE SUMMIT EMEA

April 15-16, 2019
(ISC)² is delighted to announce an exciting new format for the (ISC)2 Secure Summit EMEA. The 2019 Secure Summit will be a unique experience, hosted 15-16 April at The World Forum, the largest international conference venue in The Hague, Netherlands. This two-day event will welcome hundreds of ...

QuBit Conference Sofia 2019

QUBIT CONFERENCE SOFIA 2019

November 14-14, 2019
Attending a conference is an effective way how to educate yourself, promote your company and meet new partners and fellows. The cybersecurity market offers plenty of opportunities to join various events, workshops, conferences and trade shows. Here are 5 Reasons You Should Attend QuBit Conference in...

ForenSecure: CyberSecurity & Forensics Conference & Expo

FORENSECURE: CYBERSECURITY & FORENSICS CONFERENCE & EXPO

April 11-12, 2019
We invite your participation as a sponsor/exhibitor, speaker, or attendee of ForenSecure’18: IT Forensics and Security Conference and Expo at Illinois Institute of Technology. This is an industry-focused technical conference (not an academic conference) with multiple tracks. It attracts 200+ p...

 

Webinars

MAY 14, 2019 | 10:00 AM CST-11:00 AM CST
Sponsored
PAVING THE PATH FOR DIGITAL TRANSFORMATION WITH OPEN SOURCE INFRASTRUCTURE
Digital transformation is critical to remain relevant, ensuring your business can continue to compete without disruption. Open Source software tools and infrastructure are key to a successful transformation strategy and advantages including agility, efficiency and responsiveness. Open sour...
APR 23, 2019 | 6:30 am
HOW TO SHIFT SECURITY PRACTICES FROM MONITORING TO OBSERVABILITY
Is 'Observability' just a disingenuous rebrand of 'monitoring'? Is it monitoring on steroids? Or, is it the new way to find out "why" (and not just "if") your system, IT or application isn't working as expected? Today we see that traditional monitori...
APR 23, 2019 | 11:00 PM
SOC PROCESSES ARE BROKEN: WHY WE DON'T CATCH CRITICAL THREATS
SOC processes are broken, analysts are feeling the cybersecurity job fatigue, and enterprises are still at risk. SOC leaders often struggle to understand how to make their teams more effective and end up spending their budget on point solutions that add to the problem of data overload. How...
APR 24, 2019 | 02:00 PM
IDENTIFY AND RESPOND TO EMAIL THREATS FASTER WITH PHISHER
Your users are likely already reporting potentially dangerous emails in some fashion within your organization. The increase of this email traffic can present a new problem! With only approximately 1 in 10 user-reported emails being verified as actually malicious, how do you handle the real...
APR 24, 2019 | 11:00 AM
THE MOBILE SECURITY DEADLY SIN OF SHARING EXECUTIVES’ LOCATIONS, CALENDAR, AND/OR CONTACTS
Most organizations now realize that mobile devices are an unprotected endpoint with access to, or containing all of the information of a traditional endpoint. And while there are some overlaps in what you protect, the way you solve the traditional endpoint security problem is completely di...
APR 24, 2019
OPTIMIZE YOUR SECURITY OPERATIONS CENTER WITH AI
Keeping your organization safe from attackers is a hard job. It's our job to make it easier for you. Our mission is to develop the best technology and user experience to help customers accurately identify threats and save valuable investigation time when every second counts. In this li...

TRY FALCON PREVENT™ START YOUR 15-DAY FREE TRIAL
Sponsored
CrowdStrike is the leader in cloud-delivered next-generation endpoint protection. CrowdStrike has revolutionized endpoint protection by being the first and only company to unify next-generation antivirus, endpoint detection and response (EDR),and a 24/7 managed hunting service — all ...
TODAY’S TOP SECURITY CONCERNS: ARE YOUR ERP APPLICATIONS READY?
Sponsored
In recent 451 Research studies, enterprises continue to report three primary security concerns. These challenges affect overall cybersecurity strategies as well as an organization’s business-critical application security: The maintenance of security hygiene is not just an ongoing issue for...
SHAPING THE FINANCIAL ECOSYSTEM WITH SECURE APIS
Sponsored
Have you noticed that many of the leading banks and insurance companies have developer portals with APIs? In this webinar, we’ll discuss how customers’ needs for financial freedom are shaping the financial ecosystem, leading to an explosion of open APIs and a more integrated customer exper...
BUSINESS AND RISK BASED FRAMEWORK DEPLOYMENT
A complete defense cannot be deployed overnight. There are multiple people, process and technology components to consider and implement. In the closing session, we will help identify where and how resources can be focused to have the biggest immediate risk reduction, discuss lessons learne...
PANEL: FRAUD INVESTIGATIONS - HOW TO WORK EFFECTIVELY WITH LAW ENFORCEMENT, GOVERNMENT & LITIGATORS
Public-sector organizations need to better understand the driving forces, priorities and procedures within the organizations they "protect." But equally as important is that the private-sector organizations reciprocate and understand the how, what and why of the law enforcement/public body...
SUPPLY CHAIN SECURITY - THE FIRST AND WEAKEST LINK IN THE CHAIN?
Do you have a supply chain or just vendors? Do any or all of them present a breach potential? We apply massive resources to hardening perimeters and preventing infiltration of our information security systems, but what if our adversaries have a built-in presence and already have a foothold...

RESOURCES

To be fair, its method of assessing the security of operating systems is somewhat bunk. It sets a figure based on the number of vulnerabilities found rather than the importance of those vulnerabilitie...

Given the evolving way Web and Cloud applications are used— and the constantly shifting threat landscape organizations must confront—proxy architecture is more important than ever in terms...

Current challenges. According to the ACSC Threat Report 2017, cybercrime is a prevalent threat for Australia. It enables criminals to generate large profits with a low risk of identification and preve...

Cyber risks pose unique threats to financial stability that are not well understood or managed, despite growing investment in research and dependence by financial institutions, consumers, and governme...

This White Paper offers an overview of ETSI's work on security in Information and Communications Technologies (ICT). Each section introduces a specific technology and outlines ETSI's involveme...

Sony, Target, Westinghouse, Home Depot, U.S. Steel, Neiman Marcus, and the National Security Agency (NSA). The security breaches suffered by these and many other organizations, including most recently...

The ever-changing threat landscape requires more robust security risk management programs that can defend against the unknown. This survey assesses how healthcare entities are doing with regulatory co...

Threat intelligence is rapidly becoming an ever-higher business priority. There is a general awareness of the need to ‘do’ threat intelligence, and vendors are falling over themselves to o...

Decades ago, a group of merchants created a concept of general average—which is when all parties in a maritime venture share in losses resulting from a sacrifice of cargo in an emergency. What t...