home.aspx
 
EVENTS

Cyber Security for Critical Assets APAC
CYBER SECURITY FOR CRITICAL ASSETS APAC
January 27-28, 2021
The coronavirus pandemic has caused a surge in cyberthreats and attacks, a lot of which have targeted companies whose employees must now access critical infrastructure, such as industrial control systems (ICS) and operational technology (OT) networks, from home. But that critical infrastructure, whi...

National Cyber Summit
NATIONAL CYBER SUMMIT
June 08-10, 2021
National Cyber Summit is the nation’s most innovative cyber security-technology event, offering unique educational, collaborative and workforce development opportunities for industry visionaries and rising leaders. NCS offers more value than similar cyber conferences with diverse focus-areas, ...

BIO-key International, Inc.

SHARESHARESHARE
BIO-key designs and develops advanced fingerprint biometric security solutions. Complete algorithms and middleware solutions, leading to robust applications in various verticals around the globe. Software toolkits and infastructure components for authentication security. Specialties Fingerprint, Biometric Security, Cloud Authentication, Mobile Authentication.
SHARESHARESHARE

RELATED NEWS


While it is likely that the breach activity of 2018 won’t reach the level of 2017, a look back at the first nine months suggests that 2018 is on pace to be another significant year for breaches, according to Risk Based Security. The 2018 Q3 Data Breach QuickView Report found that 3,676 data compromise events were disclosed between 1 January and 30 September, exposing 3.6 billion records. However high those numbers might seem, and despite the consistent pace at which disclosures are reporte...
INFOSECURITY MAGAZINE
READ MORE

A new study by Max Kilger, director of Data Analytics Programs at The University of Texas at San Antonio (UTSA) College of Business, is delving into an aspect of cybersecurity rarely explored before now: the human component. Kilger's research utilizes his talents as a social psychologist to show that at the beginning of any digital threat is a real person with unique motivations....
SCIENCE DAILY
READ MORE

Tenable Network Security Inc. has tapped the head of a Dell Technologies cybersecurity unit to serve as its chairman and CEO.Amit Yoran will take the helm at the fast-growing Columbia cybersecurity company Jan. 3. He replaces Tenable co-founder and CEO Ron Gula, who announced in June he was stepping down after 14 years....
BALTIMORESUN.COM
READ MORE

The employees at Black Hills Information Security get paid to break into companies for a living; their focus on security and penetration testing and validation of security controls involves cyber activities such as phishing and hacking, as well as a little old-fashioned casing-the-joint type of work. Jordan Drysdale, Systems Administrator and Tester, calls it "Mission: Implausible.""The number one question we get asked is, why would anybody want us to break into their organization...
RAPID CITY JOURNAL
READ MORE

REVBITS CYBERSECURITY SOLUTIONS, provider of a comprehensive suite of security solutions, announced today that it has been named one of the top 100 cybersecurity startups for 2020. RevBits prevailed against many strong cybersecurity startups for this prestigious award. Cyber Defense Magazine searched around the world and found over 3,200 cybersecurity companies, nearly 30% of which were founded or launched their first innovative cybersecurity products and services within the last 36 months....
PRNEWSWIRE
READ MORE

Malware authors are using a new technique to keep their communications covert and evade detection: abusing the DNS protocol. According to Fidelis Security, DNS command and control (C&C) and DNS exfiltration can be successful because DNS is an integral part of the internet's infrastructure. Most traffic analyzers don’t look at how the DNS protocol itself is being used, which provides an opportunity for a victim machine to communicate with the bad actor’s C&C server, often ...
INFOSECURITY-MAGAZINE
READ MORE

EVENTS

Cyber Security for Critical Assets APAC
CYBER SECURITY FOR CRITICAL ASSETS APAC
January 27-28, 2021
The coronavirus pandemic has caused a surge in cyberthreats and attacks, a lot of which have targeted companies whose employees must now access critical infrastructure, such as industrial control systems (ICS) and operational technology (OT) networks, from home. But that critical infrastructure, whi...

National Cyber Summit
NATIONAL CYBER SUMMIT
June 08-10, 2021
National Cyber Summit is the nation’s most innovative cyber security-technology event, offering unique educational, collaborative and workforce development opportunities for industry visionaries and rising leaders. NCS offers more value than similar cyber conferences with diverse focus-areas, ...