• NEWS

    NEWS

    THE LATEST NEWS, DEVELOPMENTS AND ANNOUNCEMENTS AS THEY HAPPEN

    more
  • EVENTS

    EVENTS

    CONFERENCES, TRADE SHOWS, LIVE WEBCASTS, NEW LAUNCHES, SEMINARS AND TRAINING EVENTS

    more
  • COMPANIES

    COMPANIES

    PARTNERS, SOLUTIONS & SERVICE PROVIDERS, SUPPLIERS AND INDUSTRY ORGANIZATIONS

    more
  • RESOURCES

    RESOURCES

    WHITEPAPERS, MARKET REPORTS, RESEARCH, ON-DEMAND WEBINARS, VIDEOS AND INFOGRAPHICS

    more

NEWS

   

    home.aspx
  • Female Certified Security Pros Still Earn 8% Less

    A new study out this week from InfoSec Institute found that female certified cybersecurity practitioners earn as much as 18% less than their male counterparts. "While the data showed the gender p...


    READ MORE
    https://www.infosecurity-magazine.com/news/certified-women-security-pros/5266
  • Windows Malware Carries Valid Digital Signatures

    Researchers from Masaryk University in the Czech Republic and Maryland Cybersecurity Center (MCC) monitored suspicious organizations and identified four that sold Microsoft Authenticode certificates t...


    READ MORE
    https://www.infosecurity-magazine.com/news/windows-malware-carries-valid/5267
  • Startup Hopzero Launches Distance-Based Packet Security Service

    Designed to thwart cyber-security breaches in large enterprise data centers, Hopzero provides a new layer of security protection to complement access-based security solutions. Most IT people don&rsquo...


    READ MORE
    http://www.eweek.com/security/startup-hopzero-launches-distance-based-packet-security-service5262
  • DHS, SecureLogix develop TDoS attack defense

    The U.S. Department of Homeland Security and vendor SecureLogix are making 'rapid progress' in developing a TDoS attack defense. The technology is expected in the coming months. The U.S. Depar...


    READ MORE
    https://searchunifiedcommunications.techtarget.com/news/252444608/DHS-SecureLogix-develop-TDoS-attack-defense5263
  • Centrify Sets Out on New Course with Single Financial Backer

    Company converges identity-as-a-service and privileged identity solutions into a unified Next-Gen Access platform for Zero Trust Security. Centrify, an established star in the enterprise security soft...


    READ MORE
    http://www.eweek.com/security/centrify-sets-out-on-new-course-with-single-financial-backer5258
  • Apple Releases macOS 10.13.6 and iOS 11.4.1 Security Updates

    Apple improves iOS security with USB Restricted Mode and hardens macOS against a new class of meltdown and spectre CPU vulnerabilities. Apple released a series of updates for its desktop and mobile op...


    READ MORE
    http://www.eweek.com/security/apple-releases-macos-10.13.6-and-ios-11.4.1-security-updates5259
  • Metro's Cybersecurity Audit Kept Classified

    Officials at Washington D.C.’s Metro, the Metropolitan Area Transit Authority, said that while they are not publicly sharing the results of a recent internal cybersecurity audit, they intend to ...


    READ MORE
    https://www.infosecurity-magazine.com/news/metros-cybersecurity-audit-kept/5254
  • Unauthorized Party Accessed DomainFactory Data

    After a person in their user forum reportedly claimed that they had accessed DomainFactory customer data, the company confirmed that it had been breached by an unauthorized outsider. On 6 July, a syst...


    READ MORE
    https://www.infosecurity-magazine.com/news/unauthorized-party-accessed/5255
  • Malware Delivers Cryptor or Miner, Trojan's Choice

    A long-existing Trojan family still functioning today has spawned new malicious samples of malware, which infects its victims with either a cryptor or a miner, according to Kaspersky Lab. Distributed ...


    READ MORE
    https://www.infosecurity-magazine.com/news/malware-delivers-cryptor-or-miner/5250

EVENTS

Conferences

Cyber Security Summit & Exhibition Seattle

CYBER SECURITY SUMMIT & EXHIBITION SEATTLE

July 19-19, 2018
Cyber Security Summit & Exhibition Seattle is a 1 day event being held on 18th July 2018 at the Seattle, USA. This event showcases products like intellectual property, government data, financial information, social media & SEO poisoning, infrastructure & digital espionage along with hact...

Cyber Security Summit 2018

CYBER SECURITY SUMMIT 2018

July 18-20, 2018
Join us for Opal Group’s Cyber Security Summit – set in Newport, RI, this premier event will gather C-Level & Senior Executives responsible for defending their companies’ critical infrastructures together with technology providers & distinguished information security expert...

CYBER SECURITY SUMMIT BRAZIL BROUGHT TO YOU BY CYBERED TALKS

CYBER SECURITY SUMMIT BRAZIL BROUGHT TO YOU BY CYBERED TALKS

July 27-28, 2018
From ransomware to business email compromise to DDoS for extortion, it’s already been a busy year for Brazilian cybersecurity leaders – and 2018 is barely half over. Do you wish to arm yourself with strategies and solutions to tackle the rest of the year? Then register now for the Cybers...

The 2018 International Conference on Security and Management (SAM

THE 2018 INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT (SAM'18)

July 30-02, 2018
Welcome to the 2018 International Conference on Security and Management (SAM'18). It is the 16th annual comprehensive security conference dealing with all aspects of security. It is a leading international opportunity for computer and network security professionals and users to investigate innov...

FRAUD & BREACH PREVENTION SUMMIT: SAN FRANCISCO

FRAUD & BREACH PREVENTION SUMMIT: SAN FRANCISCO

July 10-11, 2018
From Meltdown and Spectre to GDPR to the Facebook/Cambridge Analytica privacy furor, it’s already been a busy year for security and fraud leaders – and 2018 is barely half over. Want to arm yourself with strategies and solutions to tackle the rest of the year? Then register now for ISMG&...

Cyber Security Future 2018

CYBER SECURITY FUTURE 2018

July 10-10, 2018
The UK’s digital economy is thriving: tech companies have created 3.5 million new jobs in the UK and four out of five people in the bought something online in the past year - a higher figure than in any other country. Citizens, business and academia all derive huge benefits from the connectivi...

Malware and Reverse Engineering Conference (MRE)

MALWARE AND REVERSE ENGINEERING CONFERENCE (MRE)

July 02-03, 2018
Following the success of the previously held workshops in 2013, 2014, 2015, 2016 and 2017 we are pleased to announce that the Malware Reverse Engineering Conference will be held in Melbourne in July (2-3rd), 2018. MRE-2018 is a bridge between industry, law enforcement and academia, with a strong foc...

DC / Metro Cyber Security Summit

DC / METRO CYBER SECURITY SUMMIT

June 28-28, 2018
The DC / Metro Cyber Security Summit, organized by the Cyber Security Summit will take place on 28th June 2018 at The Ritz-Carlton, Tyson's Corner in McLean, United States Of America. The conference will connect C-Suite & Senior Executives responsible for protecting their companies’ cr...

 

Webinars

JUL 17, 2018
UEM IS THE NEW MDM
Heading into the next decade, IT & Security leaders are actively rethinking their mobile security strategies to account for all types of endpoints. According to Forrester, by 2020 : 96% will   increase   the amount of endpoint data collected. 54% will have unified e...
JUL 17, 2018 | 1:00 PM
MALWARE & FILELESS MALWARE: HOW IT'S CREATED, HOW IT SPREADS, AND WHAT TO DO ABOUT IT
Malware has come a long way since the early days of computer viruses.  During this Dark Reading webinar you will hear from experts as they provide an in-depth look at the latest innovations in malware; as well as in “fileless malware,” which forgo the use of malicious payl...
JUL 17, 2018
CYBERSECURITY THREATS AND COMPLIANCE
Cybersecurity threats are evolving and creating significant risks to companies. The FBI estimates that ransomware will generate at least $1 billion for criminals. Businesses stand to lose at least $400 billion each year from hacks. Each year there is an average of 1.5 million cyber-attacks...
JUL 17, 2018 | 11 AM
THE 4 CURRENT THREATS ENTERPRISES CAN’T IGNORE
The changing digital landscape of data and devices is creating a perfect storm of opportunity for cybercriminals. Enterprises today are prime targets, as more users access more data using more—and more varied—devices. In particular, enterprises today must contend with issues in...
JUL 18, 2018
NICE WEBINAR: STATE GOVERNMENTS PURSUING NEW TACTICS IN THE WAR FOR A SKILLED CYBERSECURITY WORKFORCE
Building the nation’s cybersecurity workforce is not the responsibility of one, but of many, as the acts of cyber warfare continue to threaten our networks, operational systems, databases containing sensitive information, and other critical resources. Cybersecurity challenges that im...
JUL 18, 2018 | 2:00pm
SIX COMMON CONTROLS UNITE AND STRENGTHEN OT/IT SECURITY
Join experts from Tenable at 2pm ET, July 18, 2018 for insights, advice and guidance about selecting and implementing basic controls to more effectively secure converged OT/IT environments. In one hour you’ll: Understand which foundational controls must be implemented first and why. ...

GETTING STARTED WITH WEB APPLICATION SECURITY
Sponsored
Chances are, at any given moment, your organization's web applications are under attack (if not already exploited). Attackers see web applications as the front door: just one vulnerability allows them entry - perhaps to the database supporting the web application or maybe to your busin...
BUSINESS EMAIL MASQUERADING: HOW HACKERS ARE FOOLING EMPLOYEES TO COMMIT FRAUD
In the past year, so-called business email compromise attacks, also known as "masquerading" and "executive impersonation," have emerged as one of the greatest wire fraud worries. These schemes threaten to overshadow what was previously seen from commercial account takeover incidents.
TOP TRENDS AND TAKE-AWAYS FOR CYBERSECURITY
Cybersecurity continues to be one of the top concerns of organizations, even more so as complexity and threats increase. What are the key trends in 2015 for cybersecurity, and what steps can leaders take to prepare? What is the current state of cybersecurity threat and response? What are t...
A COMPREHENSIVE GUIDE TO CONNECTEDNESS WITH TRUST, SECURITY AND ETHICS IN THE DIGITAL BUSINESS
Trust is the foundation of all personal and business transactions. But who can you trust in digital business, with its endless connections and constantly shifting configurations? Trust is hard enough when it's personal, but how do you trust and be trusted when dealing with a multitude ...
WHAT EVERY CIO SHOULD KNOW ABOUT SECURITY, RISK AND VALUE
Although cybersecurity climbs back up the priority list and engaging risk is central to your success in digital business, the risk conversation is changing between you and non-IT executives. You have to balance the need to protect and the need to run your business. Integrating risk and cor...
ONE SIMPLE WAY TO GET YOUR CEO TO EMBRACE RISK MANAGEMENT
Most CEOs or other senior business executives cringe at the thought of having to meet with risk management professionals. By their very nature, CEOs are hard-wired to seek out growth opportunities that will add value to their companies. However, risk management professionals are tasked wit...

RESOURCES

To be fair, its method of assessing the security of operating systems is somewhat bunk. It sets a figure based on the number of vulnerabilities found rather than the importance of those vulnerabilitie...

Given the evolving way Web and Cloud applications are used— and the constantly shifting threat landscape organizations must confront—proxy architecture is more important than ever in terms...

This White Paper offers an overview of ETSI's work on security in Information and Communications Technologies (ICT). Each section introduces a specific technology and outlines ETSI's involveme...

Sony, Target, Westinghouse, Home Depot, U.S. Steel, Neiman Marcus, and the National Security Agency (NSA). The security breaches suffered by these and many other organizations, including most recently...

The ever-changing threat landscape requires more robust security risk management programs that can defend against the unknown. This survey assesses how healthcare entities are doing with regulatory co...

Threat intelligence is rapidly becoming an ever-higher business priority. There is a general awareness of the need to ‘do’ threat intelligence, and vendors are falling over themselves to o...

Enterprise Chief Security Officers (CSOs) face a myriad of challenges in protecting their organizations’ most confidential business documents as they flow inside and outside of the firm. In addi...

Decades ago, a group of merchants created a concept of general average—which is when all parties in a maritime venture share in losses resulting from a sacrifice of cargo in an emergency. What t...

Enterprises increasingly rely upon third-party software and services to handle business-critical processes and operations. Whether on-premises or in the cloud, these solutions must provide a level of ...