NEWS

   

    home.aspx
  • Hacker Leaks More Than 500,000 Telnet Credentials

    As reported by ZDNet, a hacker who seems to be a DDoS-for-hire (DDoS booter) service operator, has published a massive list of 515,000 Telnet credentials consisting passwords of servers, home routers,...


    READ MORE
    https://www.cisomag.com/hacker-leaks-more-than-500000-telnet-credentials/7088
  • How Do We Ensure the Security of What Comes After the 5G Revolution?

    2020 will see huge investments in 5G networks  Greensill estimated that the 5G rollout throughout the global supply chain will top $2.7 trillion by the end of the year. That’s not a number ...


    READ MORE
    https://securityintelligence.com/articles/how-do-we-ensure-the-security-of-what-comes-after-the-5g-revolution/7086
  • Texas School District Loses $2.3m in Phishing Raid

    A Texas school district has found out the hard way that phishing attacks remain a serious financial threat to organizations of all shapes and sizes, losing an estimated $2.3m in a recent scam. Manor ...


    READ MORE
    https://www.infosecurity-magazine.com/news/texas-school-district-23-million/7083
  • NJ Cybersecurity and Communications Integration Cell Predicts New Cyber Threat Landscape in 2020

    The New Jersey Cybersecurity and Communications Integration Cell (NJCCIC) has revealed its predictions for the cyber threat landscape in 2020. According to a post, the NJCCIC says we are likely to see...


    READ MORE
    https://www.securitymagazine.com/articles/91522-the-nj-cybersecurity-and-communications-integration-cell-predicts-new-cyber-threat-landscape-in-20207079
  • Cyber Security Mistakes To Avoid in 2020

    Time and again, the cybersecurity community keeps warning users about basic security practices. Yet, the criminals still succeed in targeting a large number of people almost every day due to some comm...


    READ MORE
    https://latesthackingnews.com/2020/01/08/cyber-security-mistakes-to-avoid-in-2020/7077
  • WHY YOUR SMART HOME NEEDS CYBER SECURITY

    The technological advancement took a boom with the invention of the internet. Heavy mobile phones were gradually replaced by smartphones, e-libraries took the place of traditional libraries, big compu...


    READ MORE
    https://www.analyticsinsight.net/why-your-smart-home-needs-cyber-security/7074
  • Travelex forced to take down website after cyber-attack

    The foreign currency specialist Travelex has been forced to take its websites offline following a cyber-attack. The group said it immediately took down its online systems to protect data and prevent t...


    READ MORE
    https://www.theguardian.com/technology/2020/jan/02/travelex-forced-to-take-down-website-after-cyber-attack7067
  • Cyber security firm got its start in Rapid City

    The employees at Black Hills Information Security get paid to break into companies for a living; their focus on security and penetration testing and validation of security controls involves cyber acti...


    READ MORE
    https://rapidcityjournal.com/business/cyber-security-firm-got-its-start-in-rapid-city/article_69319476-6896-5c38-a849-84f7ada22e55.html7066
  • Ransomware attacks on municipal institutions rise by over 60 per cent worldwide: research

    Cyber security firm Kaspersky’s researchers have finally released their annual security bulletin titled ‘Story of the Year 2019’. In the report the researchers focused on the rising ...


    READ MORE
    https://www.asianage.com/technology/in-other-news/251219/ransomware-attacks-on-municipal-institutions-rise-by-over-60-per-cent-worldwide-research.html7063

EVENTS

Conferences

DACH STRATEGYFORUM CYBER AND INFORMATION SECURITY

DACH STRATEGYFORUM CYBER AND INFORMATION SECURITY

January 28-29, 2020
IN DISCUSSION. Protecting your business through ai and automation. The impact of geopolitics on your security strategy. From guardian to companion of digitization - developing the ciso's role. Developing employee awareness or is trust your best defence? Do we need the cloud and how to use it saf...

Phoenix Cyber Security Conference

PHOENIX CYBER SECURITY CONFERENCE

January 29-29, 2020
Phoenix Cyber Security Conference brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce. Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber A...

Cybernetix.world 2020

CYBERNETIX.WORLD 2020

February 04-05, 2020
The image of our future is changing rapidly. The technological advancements of the last decade offer unique opportunities for business growth and make the inclusion of societies which are left behind possible. But, it also presents society with security and ethical challenges. We witness the rise of...

The award-winning 9th Annual European Information Security Summit

THE AWARD-WINNING 9TH ANNUAL EUROPEAN INFORMATION SECURITY SUMMIT

February 12-13, 2020
The European Information Security Summit is now the largest and most comprehensive cyber security summit in Europe. It features parallel streams focusing on Culture & Education, Data & Technology, and the Threat Landscape – giving you three conferences in one. In addition, TEISS also f...

SANS Threat Hunting London Summit & Training 2020

SANS THREAT HUNTING LONDON SUMMIT & TRAINING 2020

January 13-19, 2020
We encouraged you to attend this event even if you are just a beginner because you will surely learn a lot from their courses. We know some of the SANS instructors and they are really good and can provide essential information/knowledge. Hear from the experts and learn how to become an elite threat ...

2019 Annual Computer Security Applications Conference

2019 ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE

December 09-13, 2019
ACSAC brings together cutting-edge researchers, with a broad cross-section of security professionals drawn from academia, industry, and government, gathered to present and discuss the latest security results and topics. With peer reviewed technical papers, invited talks, panels, national interest di...

The 8th Annual Cyber Security and Data Security Forum

THE 8TH ANNUAL CYBER SECURITY AND DATA SECURITY FORUM

December 10-12, 2019
With the continuous increase of cyber crime in the Middle East and the new cyber attacks, organisations are facing challenges in securing their data and prevent from important information breach. The 8th Annual Cyber Security and Data Security Forum will focus on how to detect, prevent the cyber thr...

World Congress on Internet Security (WorldCIS-2019)

WORLD CONGRESS ON INTERNET SECURITY (WORLDCIS-2019)

December 09-11, 2019
The WorldCIS-2019 is an international forum dedicated to the advancement of the theory and practical implementation of security on the Internet and Computer Networks. The inability to properly secure the Internet, computer networks, protecting the Internet against emerging threats and vulnerabilitie...

 

Webinars

JAN 29, 2020 | 1:00 PM
SPENDS AND TRENDS: RESULTS OF THE SANS 2020 CYBERSECURITY SPENDING SURVEY
CISOs and security operations managers need information on the areas of security in which their peers plan to increase or decrease their investment. Boards of directors often lack essential benchmarking data when CISOs present security status and strategic plans to them. This survey explor...
JAN 29, 2020 | 11:30 PM
THE ROLE OF SCHOOL LEADERSHIP IN MITIGATING CYBERSECURITY RISK
Independent schools reported a 90% increase in negative impacts as a result of cybersecurity incidents between 2017 and 2018. While the IT department can be an important ally, this work must be managed by senior leadership and should be part of a broader risk management strategy. Hear abou...
JAN 29, 2020 | 11:00 AM
2019-2020 DDOS THREAT INTELLIGENCE; KNOW WHAT’S COMING
DDoS attacks are evolving both in frequency and volume. Staying ahead of the evolving threat landscape requires preemptive intel and visibility into today’s threats attack vectors. Join us for an informative webinar about the upcoming threat landscape, what we have seen, what you wil...
JAN 30, 2020 | 3:30 PM
SPENDS AND TRENDS: SANS 2020 CYBERSECURITY SPENDING SURVEY PANEL DISCUSSION
This webcast will more closely examine the results of the SANS 2020 Cybersecurity Spending Survey. A panel of sponsor representatives, led by survey author Barbara Filkins and survey advisor John Pescatore, will explore themes that emerged during the survey. Register for this webcast to be...
JAN 30, 2020 | 8:30 AM
SANS AUTOMATION & ORCHESTRATION SOLUTIONS
Security Orchestration, Automation and Response tooling is intended to increase efficiency and consistency. These tools also promise to diminish the cost of operating a Security Operations Center (SOC) for most organizations. If used properly, these tools can do all of these things. The ch...
FEB 05, 2020 | 1:00 PM
SECURING ICS USING THE NIST CYBERSECURITY FRAMEWORK AND FORTINET: BEST PRACTICES FOR THE REAL WORLD
Security challenges continue to mount for industrial control systems environments dealing with legacy systems scattered across remote locations, long equipment life cycles and adoption of new technologies. The integration of operational and IT networks adds to the challenge. In this new we...

TRY FALCON PREVENT™ START YOUR 15-DAY FREE TRIAL
Sponsored
CrowdStrike is the leader in cloud-delivered next-generation endpoint protection. CrowdStrike has revolutionized endpoint protection by being the first and only company to unify next-generation antivirus, endpoint detection and response (EDR),and a 24/7 managed hunting service — all ...
TODAY’S TOP SECURITY CONCERNS: ARE YOUR ERP APPLICATIONS READY?
Sponsored
In recent 451 Research studies, enterprises continue to report three primary security concerns. These challenges affect overall cybersecurity strategies as well as an organization’s business-critical application security: The maintenance of security hygiene is not just an ongoing issue for...
SHAPING THE FINANCIAL ECOSYSTEM WITH SECURE APIS
Sponsored
Have you noticed that many of the leading banks and insurance companies have developer portals with APIs? In this webinar, we’ll discuss how customers’ needs for financial freedom are shaping the financial ecosystem, leading to an explosion of open APIs and a more integrated customer exper...
IMPACT OF YOUR BUSINESS CONTINUITY PROGRAM ON CYBER RESILIENCY
Sponsored
Business Continuity Awareness Week 2018 - Impact of your business continuity program on Cyber Resiliency. Every division inside IBM has a fully functional Business Continuity program focused on identifying what's critical to IBM's internal operations and making sure these business processe...
LEARNING AT THE SPEED OF BUSINESS
Sponsored
Join Ian Stevens, North America L&D Lead at Publicis Sapient will share his team's successful learning programs that prepared Sapient's consultants to be leaders in digital transformation. Watch now to walk away with: A proven "push-pull" blended learning program How to tie learning with h...
LEARNING AT THE SPEED OF BUSINESS
Sponsored
Join Ian Stevens, North America L&D Lead at Publicis Sapient will share his team's successful learning programs that prepared Sapient's consultants to be leaders in digital transformation. Watch now to walk away with: A proven "push-pull" blended learning program How to tie learning with h...

RESOURCES

To be fair, its method of assessing the security of operating systems is somewhat bunk. It sets a figure based on the number of vulnerabilities found rather than the importance of those vulnerabilitie...

Given the evolving way Web and Cloud applications are used— and the constantly shifting threat landscape organizations must confront—proxy architecture is more important than ever in terms...

Current challenges. According to the ACSC Threat Report 2017, cybercrime is a prevalent threat for Australia. It enables criminals to generate large profits with a low risk of identification and preve...

Cyber risks pose unique threats to financial stability that are not well understood or managed, despite growing investment in research and dependence by financial institutions, consumers, and governme...

This White Paper offers an overview of ETSI's work on security in Information and Communications Technologies (ICT). Each section introduces a specific technology and outlines ETSI's involveme...

Sony, Target, Westinghouse, Home Depot, U.S. Steel, Neiman Marcus, and the National Security Agency (NSA). The security breaches suffered by these and many other organizations, including most recently...

The ever-changing threat landscape requires more robust security risk management programs that can defend against the unknown. This survey assesses how healthcare entities are doing with regulatory co...

Threat intelligence is rapidly becoming an ever-higher business priority. There is a general awareness of the need to ‘do’ threat intelligence, and vendors are falling over themselves to o...

Decades ago, a group of merchants created a concept of general average—which is when all parties in a maritime venture share in losses resulting from a sacrifice of cargo in an emergency. What t...