home.aspx
 
EVENTS

The RSA Conference 2020
THE RSA CONFERENCE 2020
July 15-17, 2020
RSA Conference has been a driving force behind the world’s cybersecurity agenda. The central point where people from around the world gather to share, learn and grow. And the place that provides a forum for innovation and partnership. It’s even more important today to have these points o...

WASHINGTON DC CYBERSECURITY CONFERENCE
WASHINGTON DC CYBERSECURITY CONFERENCE
July 23-23, 2020
More than 30,000 customers worldwide—including nearly half the global Fortune 500—rely on RSA’s business-driven security™ strategy for cyber threat detection and response, identity and access management, online fraud prevention, and governance, risk and compliance solutions. ...

ADACOM Cyber Security

SHARESHARESHARE
ADACOM is a Cyber Security solution provider and a PKI CSP with offices in Tel Aviv, Athens, Belgrade and London. We implement projects for Financial Institutions, Telcos and large organizations in more than 30 countries across ΕΜΕΑ. ADACOM enables security online preserving business continuity with projects in Network Security, Endpoint & Host Protection, GRC & Assurance, Data Governance, Security Analytics and PKI & Strong Authentication. With over 1000 certifications, ADACOM has partnerships with technology vendors including large and small innovative companies. ADACOM is ISO/IEC 27001:2013 and ISO 9001:2008 certified.
SHARESHARESHARE

RELATED NEWS


Amid all of the retail data breaches that have been making headlines for the last year or so, the revelation earlier this month that JPMorgan Chase was the victim of a massive compromise that affected millions was even so a bit shocking for the general public. But new details are emerging, showing that the attackers were able to knock around the network for at least two months before being discovered....
INFOSECURITY MAGAZINE
READ MORE

Even though organizations are increasingly being targeted by hackers that use a snowballing amount of sophistication in their attacks, businesses are just as unprepared to detect and protect against malicious activity as they were a year ago. FireEye’s Mandiant M-Trends report found that notably, the tools and tactics of advanced persistent threat (APT) actors have evolved significantly over the last year. For instance, threat actors impersonating the IT department has become an even more ...
INFOSECURITY MAGAZINE
READ MORE

According to TechCruch, Silk Road 2 moderator Defcon said in a forum post that the perpetrators made use of the known transaction malleability exploit within the Bitcoin protocol to hack the marketplace. The exploit essentially lets a user request the same transaction over and over again, but it will only look like one has occurred – or none at all. So, it’s the perfect siphon. In this case, the hacker(s) made use of six vendor accounts to order from each other, and to find and explo...
INFOSECURITY-MAGAZINE
READ MORE

The cybersecurity skills shortage has gained a lot of attention in recent years, and for good reason. Despite various education, upskilling and reskilling programs that have all attempted to close this gap, the results have been minimal. According to (ISC)2, there are currently 2.93 million unfilled cybersecurity positions globally. It’s time the industry admits the skills shortage is at crisis point. One of the major contributors to the increasing skills gap is the speed at which the thre...
SECURITY MAGAZINE
READ MORE

Although the smart home security field is garnering increasing consumer interest, one of the major players in the space is facing a cybersecurity issue that could have a chilling effect on the market. A vulnerability in Comcast XFINITY’s Home Security System could open the door—literally—to intruders.The US cable giant’s home security offering is a remote­-enabled home security system, consisting of a battery-­powered base station and one or more battery­-powe...
INFOSECURITY MAGAZINE
READ MORE

Speaking for the motion "Is the auditor a bigger threat to information security than the cybercriminal," Paul Simmonds, board member of the Jericho Forum, argued that auditors are incentivised to maximise their billable hours, and so to find faults in the companies they are auditing.
...

INFOSECURITY-MAGAZINE
READ MORE

EVENTS

The RSA Conference 2020
THE RSA CONFERENCE 2020
July 15-17, 2020
RSA Conference has been a driving force behind the world’s cybersecurity agenda. The central point where people from around the world gather to share, learn and grow. And the place that provides a forum for innovation and partnership. It’s even more important today to have these points o...

WASHINGTON DC CYBERSECURITY CONFERENCE
WASHINGTON DC CYBERSECURITY CONFERENCE
July 23-23, 2020
More than 30,000 customers worldwide—including nearly half the global Fortune 500—rely on RSA’s business-driven security™ strategy for cyber threat detection and response, identity and access management, online fraud prevention, and governance, risk and compliance solutions. ...