home.aspx
   
 
EVENTS

Cyber Security Summit Denver
CYBER SECURITY SUMMIT DENVER
August 23-23, 2019
Cyber security systems and principles are designed to safeguard websites and web applications from attackers seeking to disrupt, delay, alter or redirect the flow of data. These attackers vary in target, motive, levels of organization, and technical capabilities, requiring public and private organiz...

Cyber Attack Manila Series
CYBER ATTACK MANILA SERIES
August 29-29, 2019
Cyber Attack Manila Series provides the Philippines IT executives an opportunity to gather for a day of networking, collaboration, knowledge transfer through peer-led keynotes, breakouts, panels, and networking sessions. The conference focuses on defending the Philippines in cyberspace, cloud threat...

Aurora Data Security

Aurora is revolutionizing the Cybersecurity approach with products and services that proactively prevent, secure and manage advanced threats and malware. Our technology offerings and portfolio of services protect hundreds of enterprise clients worldwide including Fortune 1000 organizations, local government and federal institutions.

RELATED NEWS


A new report reveals how CISOs are shifting priorities and security strategies to manage increasingly advanced threats with limited resources. The Forbes Insight report found that 84 percent of CISOs believe the risks of cyber attacks will increase and almost a quarter believe the capabilities of attackers are outpacing their ability to defend their organization. This issue is compounded with limited resources, it said, including lack of sufficient budget and skilled professionals as well as a t...
SECURITY MAGAZINE
READ MORE

Hackers are always using inventive ways to implant malware on people’s computers, including the cloning of a popular VPN website to spread a banking trojan. Researchers at Doctor Web’s virus lab discovered that criminals created a website that was a copy of the one belonging to virtual private network service NordVPN. This nord-vpn[.]club website, which is currently inaccessible, was almost identical to the official nordvpn.com site. To make this cloned website appear more legitimate...
TECHSPOT
READ MORE

Some of the biggest names in the cloud and hardware ecosystem have agreed to join a new industry group focused on promoting safe computing practices. Founding members include Alibaba, Arm, Baidu, Google Cloud, IBM, Intel, Microsoft, Red Hat, Swisscom, and Tencent. Named the Confidential Computing Consortium, this industry group's goals will be to come up with strategies and tools to accelerate the adoption of "confidential computing." By confidential computing, the group is referri...
ZDNET
READ MORE

Lionbridge, the world's most trusted global communications platform, is pleased to announce that it has won the Technology division award for Employee Engagement in the Conference Board's Excellence in Marketing & Communications Awards Program. This prestigious program honors organizations for their innovative use of communications technologies. Last year, Lionbridge developed a new intranet known as The Bridge to help its more than 6,000 employees around the world live out its missi...
SOURCE
READ MORE

Lionbridge Technologies is proud to announce it has again been named one of America's Best Employers by Forbes, which also recognized Lionbridge as a Best Employer for Women in 2018. The 2019 list recognizes organizations across a variety of industries that employ more than 1,000 people in the U.S. Working with Statista, Forbes deployed an independent survey to a representative sample of the US workforce and reached more than 50,000 employees overall. The rankings were mainly assessed based ...
SOURCE
READ MORE

Cybersecurity investments in smart cities are “severely lagging” and are “seeding the future vulnerabilities of the IoT ecosystem,” according to new analysis from ABI Research. ABI finds that the financial; information and communication technologies (ICT); and defence industries will account for 56 per cent of the $135 billion projected total cybersecurity spend related to critical infrastructure in 2024. The remaining 44 per cent of the 2024 spend will be split between t...
SMART CITIES WORLD
READ MORE

Digital platforms, whether due to an error in their code or the ability of hackers, are vulnerable to cyber attacks, making the security of their users compromised. Social network applications are no stranger to these attacks. An Israeli electronic security company called Check Point Research reversed the WhastApp encryption algorithm and discovered new vulnerabilities in this Facebook-owned messaging service. These small security gaps could allow hackers to intercept and manipulate messages sen...
KAGAYA
READ MORE

The 111 tech companies that signed on to the Cybersecurity Tech Accord compete against each other every day, but they all agree on the big picture: protecting their customers and users and improving cybersecurity globally. Since Microsoft President Brad Smith launched the initiative in April 2018 with 32 companies including Facebook, Cisco, Dell Technologies, and Nokia, it has grown into what its members say is the largest industry led cybersecurity pact. It has also worked with other industry g...
SDXCENTRAL
READ MORE

Hackers can figure out a person’s password by simply listening to them type on a keyboard, cyber security according to a new study. Using the microphone found on a smartphone, the new method is so effective that it can be carried out in a noisy public space where multiple people are typing, researchers at Southern Methodist University in Texas found. They discovered the technique by analysing the different sound waves produced when a key on a keyboard is struck. After processing the acoust...
THE INDEPENDENT
READ MORE

The Global Cyber Alliance (GCA) has launched a first-of-its-kind cybersecurity development platform for IoT products, called the Automated IoT Defence Ecosystem (AIDE), which allows small businesses, manufacturers, service providers and individuals to detect vulnerabilities, reduces risks and secure IoT devices against the increasing number of threats in today’s interconnected environment. GCA ProxyPot, which is a complementary resource to the AIDE platform, is a custom IoT honeypot soluti...
ENTERPRISE CIO
READ MORE

EVENTS

Cyber Security Summit Denver
CYBER SECURITY SUMMIT DENVER
August 23-23, 2019
Cyber security systems and principles are designed to safeguard websites and web applications from attackers seeking to disrupt, delay, alter or redirect the flow of data. These attackers vary in target, motive, levels of organization, and technical capabilities, requiring public and private organiz...

Cyber Attack Manila Series
CYBER ATTACK MANILA SERIES
August 29-29, 2019
Cyber Attack Manila Series provides the Philippines IT executives an opportunity to gather for a day of networking, collaboration, knowledge transfer through peer-led keynotes, breakouts, panels, and networking sessions. The conference focuses on defending the Philippines in cyberspace, cloud threat...