home.aspx
 
EVENTS

BSI International Cyber Resilience Exchange 2019
BSI INTERNATIONAL CYBER RESILIENCE EXCHANGE 2019
March 26-26, 2019
BSI International Cyber Resilience Exchange 2019 is a one day event which brings together leading international cyber intelligence experts and innovators to share their vision of making a secure digital future a reality. The exchange comprises of keynote speakers, panel discussions and interactive s...

NEPIC Digitalisation & Cyber Security Conference
NEPIC DIGITALISATION & CYBER SECURITY CONFERENCE
March 27-27, 2019
The 4th Industrial Revolution represents an extraordinary growth and productivity opportunity for manufacturing in general, however, by its very nature brings with it increased risk. During this new event for 2019, we will explore the pros and cons of the connected world we live in whilst showcasing...

Anomalix


Anomalix is a Cyber Security company pioneering Actionable Identity Analytics. We provide user behavior analytics solutions that identify enterprise access patterns and enable real-time responses to anomalous activity. With decades of experience in the Identity & Access Governance space and over 45 Fortune 1000 customers, we help organizations reduce risk and enable compliance while delivering quick ROI. Anomalix services provides tailored solutions leveraging industry best practices and best of breed technologies.

RELATED NEWS


New research shows only the departments of Defense and Energy did a good job recognizing the role of cybersecurity more broadly across their agency.Kevin Desouza, the associate dean for research at the college of public programs at Arizona State University and a non-resident senior fellow of Governance Studies at the Brookings Institution, examined more than 1,000 pages of strategic plans from all the major agencies to assess how they integrate cybersecurity with their goals....
E-END
READ MORE

Attacks involving a rather unknown information stealing malware family dubbed "FormBook" have become increasingly frequent recently, fueled by the threat’s cheap price and the availability of a cracked builder, Arbor Networks security researchers warn....
SECURITY WEEK
READ MORE

Shadow IT -- the use of unauthorized online services by company employees -- is a concern of cyberwarriors charged with defending business systems against network attacks. There's new evidence that those concerns are justified....
TECHNEWSWORLD
READ MORE

We all like to talk about security, but sometimes words can't tell the whole the story. That's especially true in the case of cyber-threats, identify theft and fraud. It's a numbers game. And as you'll see, users weren't the winners in 2015....
COMPUTERWORLD
READ MORE

Executive-level security professionals fear their organizations are not well positioned to respond to a cyber-attack, according to the results of a new poll from Deloitte. In a poll of more than 3,150 security professionals across all industries and sectors taken during a webcast on cyber preparedness and war-gaming, survey respondents indicated that in large part, cybersecurity remains siloed. As a result, many employees across the organizations are not well versed in how to respond to a cyber ...
INFOSECURITY MAGAZINE
READ MORE

Cloud giant Salesforce.com has been forced to warn customers that remote access trojan (RAT) malware known as Dyre may be targeting their PCs to steal log-in credentials....
INFOSECURITY MAGAZINE
READ MORE

EVENTS

BSI International Cyber Resilience Exchange 2019
BSI INTERNATIONAL CYBER RESILIENCE EXCHANGE 2019
March 26-26, 2019
BSI International Cyber Resilience Exchange 2019 is a one day event which brings together leading international cyber intelligence experts and innovators to share their vision of making a secure digital future a reality. The exchange comprises of keynote speakers, panel discussions and interactive s...

CS4CA USA
CS4CA USA
March 26-27, 2019
While cybercrime steadily increases in the US, the perceived complexity of data security remains a barrier for organizations to strengthen their cybersecurity strategies. Cyber risks are complex and unique to every circumstance, therefore difficult to quantify. But ultimately, all complexities can b...