home.aspx
 
EVENTS

Cyber Security for Critical Assets APAC
CYBER SECURITY FOR CRITICAL ASSETS APAC
January 27-28, 2021
The coronavirus pandemic has caused a surge in cyberthreats and attacks, a lot of which have targeted companies whose employees must now access critical infrastructure, such as industrial control systems (ICS) and operational technology (OT) networks, from home. But that critical infrastructure, whi...

National Cyber Summit
NATIONAL CYBER SUMMIT
June 08-10, 2021
National Cyber Summit is the nation’s most innovative cyber security-technology event, offering unique educational, collaborative and workforce development opportunities for industry visionaries and rising leaders. NCS offers more value than similar cyber conferences with diverse focus-areas, ...

Caretower

SHARESHARESHARE
As an independent IT security specialist, Caretower provide comprehensive solutions to individual problems, thus allowing our recommendations to be unbiased. Over the years Caretower has quickly established many long standing relationships with all of our vendors, achieving the highest status within these organisations based on the level of expertise within our internal sales, support and professional services teams. This relationship ensures we provide our customers with key changes within the industry which assists in their on-going security management strategy.
SHARESHARESHARE

RELATED NEWS


With the acquisition, Masergy’s security-as-a-service suite also adds comprehensive enterprise security solutions, including the Unified Enterprise Security product and a range of professional services, including comprehensive security audits, forensic audits, compliance testing, penetration testing, vulnerability assessments and risk management.
...

INFOSECURITY-MAGAZINE
READ MORE

A sophisticated attack is leveraging the ability to evade detection with the use of a rapidly changing Trojan attack pattern, according to researchers at GreatHorn. The research team identified what it called a widespread Trojan pattern that uses multiple different subject lines, email content, email addresses, display name spoofs and destination URLs to disguise itself as a confirmation on a paid invoice. The lack of consistency found in a typical volumetric attack makes this particular threat ...
INFOSECURITY MAGAZINE
READ MORE

Whether you’re working within a small practice or a large hospital system with 10,000 users, you need to worry about cybersecurity.The “bad guys” — the people trying to break into your system — are getting more sophisticated every year. No one can stop every break-in. Instead, IT must keep an eye on how best to reduce the number of breaches and minimize the damage of successful hacks....
BIZTECHMAGAZINE.COM
READ MORE

The Justice Department may have abandoned its fight with Apple over accessing the iPhone of one of the San Bernardino shooters. The war over government access to encrypted technologies, however, is far from over.
In the wake of the deadly attacks in Brussels and Paris, U.S. and European intelligence agencies are under intense pressure to intercept communications between terrorists who use secure modes of communication to plan and carry out their strikes. Key U.S. senators say they will try...

FOREIGNPOLICY
READ MORE

Cyber criminals attacking the finance and other industry sector are continuing to exploit legitimate administration tools to hide their activities, highlighting the need for threat hunting, a report reveals. Common IT administration tools are being hijacked to act as invisibility cloaks for cyber criminals targeting financial institutions, according to a report by security firm Carbon Black. The report is based on a survey of CISOs at 40 financial institutions and notes that cyber attacks agains...
COMPUTER WEEKLY
READ MORE

The daily deluge of negative security headlines and data breaches isn't the whole story when it comes to modern cyber-security, according to Cisco. In a keynote at the RSA Conference here, Cisco executives outlined some key successes against recent threats and detailed a strategy for bridging the gap between information technology (IT) and operational technology (OT) systems. In an exclusive interview ahead of the keynote, Matt Watchinski, vice president of Cisco's Talos Threat Intellige...
EWEEK
READ MORE

EVENTS

Cyber Security for Critical Assets APAC
CYBER SECURITY FOR CRITICAL ASSETS APAC
January 27-28, 2021
The coronavirus pandemic has caused a surge in cyberthreats and attacks, a lot of which have targeted companies whose employees must now access critical infrastructure, such as industrial control systems (ICS) and operational technology (OT) networks, from home. But that critical infrastructure, whi...

National Cyber Summit
NATIONAL CYBER SUMMIT
June 08-10, 2021
National Cyber Summit is the nation’s most innovative cyber security-technology event, offering unique educational, collaborative and workforce development opportunities for industry visionaries and rising leaders. NCS offers more value than similar cyber conferences with diverse focus-areas, ...