home.aspx
 
EVENTS

BSI International Cyber Resilience Exchange 2019
BSI INTERNATIONAL CYBER RESILIENCE EXCHANGE 2019
March 26-26, 2019
BSI International Cyber Resilience Exchange 2019 is a one day event which brings together leading international cyber intelligence experts and innovators to share their vision of making a secure digital future a reality. The exchange comprises of keynote speakers, panel discussions and interactive s...

CS4CA USA
CS4CA USA
March 26-27, 2019
While cybercrime steadily increases in the US, the perceived complexity of data security remains a barrier for organizations to strengthen their cybersecurity strategies. Cyber risks are complex and unique to every circumstance, therefore difficult to quantify. But ultimately, all complexities can b...

Ariento


Ariento provides cybersecurity, information technology (IT), and compliance services to small and mid-sized organizations. Comprised of a veteran team boasting decades of experience at the highest levels of the United States military and federal government, Ariento specializes in delivering best-in-class technology solutions that are secure and regulatory compliant. From consulting to fully outsourced IT services and more, Ariento gives business owners and executives one less thing to worry about in today’s interconnected digital world.

RELATED NEWS


The information stolen included payment card numbers and the three-digit security codes, known as CVV numbers, the company said. The retailer said it does not store customers’ personal identification numbers (PINs)....
WASHINGTON POST
READ MORE

On infected systems, the Agent.btz worm creates a file named “thumb.dd” on all USB flash drives connected to the computer, using it to store information about the infected system and the worm’s activity logs. Given this functionality and the global scale of the epidemic caused by the worm, Kaspersky believes that there are tens of thousands of USB flash drives in the world containing files named “thumb.dd” created by Agent.btz at some point in time and containing in...
INFOSECURITY-MAGAZINE
READ MORE

A fault in a widely used component of most Linux distributions could allow an attacker to take remote control of a system after merely sending a malicious email. The vulnerability, nicknamed "Ghost," is in the GNU C Library known as glibc, according to security vendor Qualys, which disclosed the issue on Tuesday as many Linux distributions released patches. Glibc is a C library that defines system calls....
COMPUTERWORLD
READ MORE

A previously undetectable remote administration tool has been uncovered, dubbed “GlassRAT.” The zero-detection Trojan appears to have operated stealthily for three years, according to RSA, and evidence suggests it is being used as part of a very targeted campaign, focused on Chinese nationals in commercial organizations. GlassRAT employs many of the telltale signs of good, at least very effective, malware design. Its dropper is signed using a compromised certificate from a trusted an...
HTTP://WWW.INFOSECURITY-MAGAZINE.COM/
READ MORE

One of the main challenges that I’ve heard voiced in discussions among CIOs recently involves the perceived lack of visibility into application security in the Cloud. The shift to software-defined infrastructure, including security and networking, along with the evaporation of the network perimeter means that you can no longer “see” your application security controls, infrastructure assets such as hardware firewalls, and network security appliances....
INFORMATIONSECURITYBUZZ.COM
READ MORE

As the younger, “millennial” generation makes its way into the workforce, security experts are concerned that this group’s attitudes toward privacy, combined with expectations regarding what devices and apps they can access at work, will bring new cybersecurity challenges to the workplace....
HTTP://WWW.INFOSECURITY-MAGAZINE.COM/NEWS/PAGE-80/
READ MORE

EVENTS

BSI International Cyber Resilience Exchange 2019
BSI INTERNATIONAL CYBER RESILIENCE EXCHANGE 2019
March 26-26, 2019
BSI International Cyber Resilience Exchange 2019 is a one day event which brings together leading international cyber intelligence experts and innovators to share their vision of making a secure digital future a reality. The exchange comprises of keynote speakers, panel discussions and interactive s...

CS4CA USA
CS4CA USA
March 26-27, 2019
While cybercrime steadily increases in the US, the perceived complexity of data security remains a barrier for organizations to strengthen their cybersecurity strategies. Cyber risks are complex and unique to every circumstance, therefore difficult to quantify. But ultimately, all complexities can b...