home.aspx
 
EVENTS

Cyber Security for Critical Assets APAC
CYBER SECURITY FOR CRITICAL ASSETS APAC
January 27-28, 2021
The coronavirus pandemic has caused a surge in cyberthreats and attacks, a lot of which have targeted companies whose employees must now access critical infrastructure, such as industrial control systems (ICS) and operational technology (OT) networks, from home. But that critical infrastructure, whi...

National Cyber Summit
NATIONAL CYBER SUMMIT
June 08-10, 2021
National Cyber Summit is the nation’s most innovative cyber security-technology event, offering unique educational, collaborative and workforce development opportunities for industry visionaries and rising leaders. NCS offers more value than similar cyber conferences with diverse focus-areas, ...

CloudPost Networks

SHARESHARESHARE
CloudPost Networks develops IoT security and risk-reduction solutions that protect business-critical devices and systems. CloudPost uniquely ties device identity with behavioral analytics so organizations can quickly spot security issues and implement precise controls to protect the environment.
SHARESHARESHARE

RELATED NEWS


That’s the startling premise of a recent study by researchers at Cambridge University and Sweden’s Linköping University who were able to glean passwords by deciphering the sound waves generated by fingers tapping on smartphone touch screens. Malicious actors can decode what a person is typing by using a spying app that can access the smartphone’s microphone, according to the study, which was first reported by The Wall Street Journal. “We showed that the attack can su...
THE DENVER POST
READ MORE

Toshiba is working on what it calls an unbreakable encryption method. More specifically: It will be a quantum-cryptography system that will use photons—light particles—delivered via a custom-made fiber-optic cable not connected to the internet....
INFOSECURITY MAGAZINE
READ MORE

Security experts are warning of another large-scale malvertising campaign  which could be exposing as many as 50 million global internet users to the Bunitu trojan....
INFOSECURITY MAGAZINE
READ MORE

The impact of mobile malware on the average user has been hugely overstated by the AV industry, with users more likely to be struck by lightening than get infected, according to new research from Damballa....
INFOSECURITY MAGAZINE
READ MORE

The struggle to balance decreasing resources -- both budgets and personnel -- with the need to protect our infrastructures has resulted in the phenomenon of the "Wagon Wheel" information security posture. By Wagon Wheel, I am referring to the snack that consists of a hard crusty chocolate outside and a soft marshmallow inside. Most of us place or focus all of our control and detection efforts outward facing, ignoring what is originating from the inside -- the all too common threat of i...
TECHTARGET
READ MORE

The 2014 study continues to see security budgets rise for most, but also shows an outsized role for compliance in security, said Daniel Kennedy, TheInfoPros research director for information security and networking, in a statement...
INFOSECURITY MAGAZINE
READ MORE

EVENTS

Cyber Security for Critical Assets APAC
CYBER SECURITY FOR CRITICAL ASSETS APAC
January 27-28, 2021
The coronavirus pandemic has caused a surge in cyberthreats and attacks, a lot of which have targeted companies whose employees must now access critical infrastructure, such as industrial control systems (ICS) and operational technology (OT) networks, from home. But that critical infrastructure, whi...

National Cyber Summit
NATIONAL CYBER SUMMIT
June 08-10, 2021
National Cyber Summit is the nation’s most innovative cyber security-technology event, offering unique educational, collaborative and workforce development opportunities for industry visionaries and rising leaders. NCS offers more value than similar cyber conferences with diverse focus-areas, ...