home.aspx
 
EVENTS

Cyber Security for Critical Assets APAC
CYBER SECURITY FOR CRITICAL ASSETS APAC
January 27-28, 2021
The coronavirus pandemic has caused a surge in cyberthreats and attacks, a lot of which have targeted companies whose employees must now access critical infrastructure, such as industrial control systems (ICS) and operational technology (OT) networks, from home. But that critical infrastructure, whi...

National Cyber Summit
NATIONAL CYBER SUMMIT
June 08-10, 2021
National Cyber Summit is the nation’s most innovative cyber security-technology event, offering unique educational, collaborative and workforce development opportunities for industry visionaries and rising leaders. NCS offers more value than similar cyber conferences with diverse focus-areas, ...

Aurora Data Security

SHARESHARESHARE
Aurora is revolutionizing the Cybersecurity approach with products and services that proactively prevent, secure and manage advanced threats and malware. Our technology offerings and portfolio of services protect hundreds of enterprise clients worldwide including Fortune 1000 organizations, local government and federal institutions.
SHARESHARESHARE

RELATED NEWS


The operation started in 2011 and has increased in size and scope over the last few years, the firm found. Based on the profiles of known targets, the attackers appear to have an interest in a range of sectors: military, shipbuilding and maritime operations, computers and software development, research companies, telecom operators, satellite operators, mass media and television. Some of the target names are big: defense industry contractors such as Lig Nex1 and Selectron Industrial Company, ship...
INFOSECURITY MAGAZINE
READ MORE

A quarter of employees have connected at least one internet of things (IoT) device to the corporate network, with less than half of IT professionals confident that they’re securely configured, according to new research from Tripwire.What’s more, less than half of IT pros interviewed said they are confident in the secure configuration of the most common device types, with the number dropping to “fewer than 20%” when considering newer, less common IoT device types....
INFOSECURITY MAGAZINE
READ MORE

Passwords are a company’s first line of defense against hackers, but are often the weakest. Beirut-based Myki wants to change that with its password management tool in a region where cyber security is still an afterthought. It started when Priscilla Sharuk’s grandmother kept forgetting the password to her Skype account, which she used to call her son in the U.S. from Beirut. “She was diagnosed with Alzheimer’s,” says Sharuk, who’s 28. “Slowly but surely ...
FORBES MIDDLE EAST
READ MORE

How should the U.S. respond to cyber attacks? That’s been a major question at this year’s RSA security conference, following Russia’s suspected attempt to influence last year’s election. Clearly, the government should be doing more on cybersecurity, said U.S. lawmakers and officials at the show, but they admit that politics and policy conflicts have hampered the government's approach....
PCWORLD
READ MORE

Reuters then published a report that the specific type used was a memory-scraping malware, which captures the data stored on the card’s magnetic stripe in the instant after it has been swiped at the terminal. As US-CERT explained, the data stored on the magnetic stripe is referred to as Track 1 and Track 2 data. Track 1 data is information associated with the actual account; it includes items such as the cardholder’s name as well as the account number. Track 2 data contains informati...
INFOSECURITY MAGAZINE
READ MORE

To the young Syrian rebel fighter, the Skype message in early December 2013 appeared to come from a woman in Lebanon, named Iman Almasri, interested in his cause. Her picture, in a small icon alongside her name, showed a fair-skinned 20-something in a black head covering, wearing sunglasses....
NYTIMES
READ MORE

EVENTS

Cyber Security for Critical Assets APAC
CYBER SECURITY FOR CRITICAL ASSETS APAC
January 27-28, 2021
The coronavirus pandemic has caused a surge in cyberthreats and attacks, a lot of which have targeted companies whose employees must now access critical infrastructure, such as industrial control systems (ICS) and operational technology (OT) networks, from home. But that critical infrastructure, whi...

National Cyber Summit
NATIONAL CYBER SUMMIT
June 08-10, 2021
National Cyber Summit is the nation’s most innovative cyber security-technology event, offering unique educational, collaborative and workforce development opportunities for industry visionaries and rising leaders. NCS offers more value than similar cyber conferences with diverse focus-areas, ...