home.aspx
 
EVENTS

BSI International Cyber Resilience Exchange 2019
BSI INTERNATIONAL CYBER RESILIENCE EXCHANGE 2019
March 26-26, 2019
BSI International Cyber Resilience Exchange 2019 is a one day event which brings together leading international cyber intelligence experts and innovators to share their vision of making a secure digital future a reality. The exchange comprises of keynote speakers, panel discussions and interactive s...

NEPIC Digitalisation & Cyber Security Conference
NEPIC DIGITALISATION & CYBER SECURITY CONFERENCE
March 27-27, 2019
The 4th Industrial Revolution represents an extraordinary growth and productivity opportunity for manufacturing in general, however, by its very nature brings with it increased risk. During this new event for 2019, we will explore the pros and cons of the connected world we live in whilst showcasing...

AvarTec, Inc


AvarTec, Inc. helps small enterprise businesses with IT support including design, build, maintenance, monitoring, help desk services, and security services for all computer/server/network infrastructure including VoIP telecommunications.

RELATED NEWS


Illusive Networks, a cybersecurity startup based out of Israel that protects networks by building “deception” frameworks to identify and trap malicious hackers, is today announcing that it has added Microsoft Ventures — the software giant’s young investment arm — as its newest strategic investor. In keeping with the its name and purpose in this world, Illusive is not disclosing any details about the terms of this investment — except that it’s new, and wh...
TECHCRUNCH
READ MORE

How the historic Internet worm attack of 1988 has shaped security - or not. Michele Guel was sound asleep on Nov. 3, 1988, when the call came at 3:30 a.m.: An unknown virus had infiltrated NASA Ames Research Laboratory's Sun Microsystems file servers and workstations and was sapping their resources, slowing them to a crawl. She headed to the lab in the dead of the night and with her team at NASA scrambled to stop the attack. They manually powered down each machine, one by one. "We walke...
DARK READING
READ MORE

Recent changes made to the Terror exploit kit (EK) allow it to fingerprint victims and target specific vulnerabilities instead of carpet bombing the victims with many exploits at the same time, Talos researchers discovered.Terror was initially detailed in January this year, when security researchers observed that it was targeting vulnerabilities with exploits taken from Metasploit or from either Sundown or Hunter EKs. Terror activity increased last month, after the Sundown EK inexplicably disapp...
SECURITYWEEK
READ MORE

The ITIL change management process is one of the very important processes that helps increase security for IT applications and infrastructure. For example, in healthcare and hospital environments, maintaining an eHealthRecord (eHR) application is an enormous IT task. Cerner, Epic, Allscripts, MEDITECH, Siemens and McKesson are the major vendors and cost many millions to purchase. It often requires millions more in resources to implement and maintain.The ongoing task of maintaining a hospital eHe...
BETA NEWS
READ MORE

Security technology on cloud servers is supposed to help block and prevent the installation of malware, but what happens when attackers figure out how to uninstall security technology as part of a hacking campaign? According to a report released on Jan. 17 by Palo Alto Networks' Unit 42 security research division, that's exactly what the Rocke hacker group is doing in China. Palo Alto reported that Rocke is actively exploiting servers and gaining administrative access. With the full admi...
EWEEK
READ MORE

Smartphone provider BlackBerry has admitted over one week after it was first discovered that the majority of its software and devices are affected by the FREAK vulnerability....
INFOSECURITY MAGAZINE
READ MORE

EVENTS

BSI International Cyber Resilience Exchange 2019
BSI INTERNATIONAL CYBER RESILIENCE EXCHANGE 2019
March 26-26, 2019
BSI International Cyber Resilience Exchange 2019 is a one day event which brings together leading international cyber intelligence experts and innovators to share their vision of making a secure digital future a reality. The exchange comprises of keynote speakers, panel discussions and interactive s...

CS4CA USA
CS4CA USA
March 26-27, 2019
While cybercrime steadily increases in the US, the perceived complexity of data security remains a barrier for organizations to strengthen their cybersecurity strategies. Cyber risks are complex and unique to every circumstance, therefore difficult to quantify. But ultimately, all complexities can b...