home.aspx
 
EVENTS

NEPIC Digitalisation & Cyber Security Conference
NEPIC DIGITALISATION & CYBER SECURITY CONFERENCE
March 27-27, 2019
The 4th Industrial Revolution represents an extraordinary growth and productivity opportunity for manufacturing in general, however, by its very nature brings with it increased risk. During this new event for 2019, we will explore the pros and cons of the connected world we live in whilst showcasing...

CS4CA USA
CS4CA USA
March 26-27, 2019
While cybercrime steadily increases in the US, the perceived complexity of data security remains a barrier for organizations to strengthen their cybersecurity strategies. Cyber risks are complex and unique to every circumstance, therefore difficult to quantify. But ultimately, all complexities can b...

Anchor Technologies, Inc.


Information Security and Risk Management Consultants helping clients reduce risk and maximize compliance. Over the past decade, our seasoned security and risk management professionals have been helping clients of all sizes, across a wide-range of industries, manage and secure their electronic data and network systems to reduce risk and maximize compliance.

RELATED NEWS


Employee security awareness continues to be the subject of a dramatic disconnect: Research reveals that 73% of US employees believe their company provides sufficient training on how to protect sensitive information, while a similar percentage of IT personnel (72%) say that employers are not doing enough to educate employees. The research, from Clearswift, underscores the need for more collaboration between the executive team, IT, HR and other employees within an organization to ensure the safety...
INFOSECURITY MAGAZINE
READ MORE

Zerodium has made some changes to its exploit acquisition program and the company is now offering up to $500,000 for remote code execution and privilege escalation vulnerabilities affecting popular instant messaging and email applications.The firm has decided to publish separate payout lists for mobile device exploits and desktop/server exploits. A remote jailbreak with no user interaction for iPhone is still worth up to $1.5 million, and up to $1 million can be earned for a similar exploit that...
SECURITY WEEK
READ MORE

Insufficient security controls are surfacing across consumer mobile payment apps, including five of the most popular solutions for both Android and iOS devices. According to Bluebox Security’s 2015 Payment App Security Study, mobile payment solutions are now a prime source of risk. As mobile payment apps grow in popularity this holiday season, pervasive security flaws have created easy avenues for attackers to compromise these mobile applications, putting consumers’ hard earned dolla...
INFOSECURITY MAGAZINE
READ MORE

"A mysterious gang of cyber hackers have been reportedly using a new malware called Tyupkin, which allows them to steal money from ATMs worldwide, without using debit or credit cards.

The malware is installed on an ATM, allowing the hackers to steal money by simply entering a series of codes. "...

INTERNATIONAL BUSINESS TIMES
READ MORE

CMU has unique multidisciplinary strengths in cybersecurity. Hearing from Admiral Rogers should shed light on how the scholarly community may contribute to enhancing national capacity in the vital area of cybersecurity,” said Kiron Skinner, director of CMU’s Institute for Strategic Analysis (ISA), which is sponsoring the lecture. ISA is supported by the Dietrich College of Humanities and Social Sciences, College of Engineering, Heinz College and the School of Computer Science....
CMU
READ MORE

Among the most widely used tools by security researchers is the open-source Metasploit Framework, which has now been updated with the new 5.0 release. Metasploit Framework is penetration testing technology, providing security researchers with a variety of tools and capabilities to validate the security of a given application or infrastructure deployment. With Metasploit, researchers can also test exploits against targets to see if they are at risk, in an attempt to penetrate the defensive measur...
EWEEK
READ MORE

EVENTS

CS4CA USA
CS4CA USA
March 26-27, 2019
While cybercrime steadily increases in the US, the perceived complexity of data security remains a barrier for organizations to strengthen their cybersecurity strategies. Cyber risks are complex and unique to every circumstance, therefore difficult to quantify. But ultimately, all complexities can b...

NEPIC Digitalisation & Cyber Security Conference
NEPIC DIGITALISATION & CYBER SECURITY CONFERENCE
March 27-27, 2019
The 4th Industrial Revolution represents an extraordinary growth and productivity opportunity for manufacturing in general, however, by its very nature brings with it increased risk. During this new event for 2019, we will explore the pros and cons of the connected world we live in whilst showcasing...