home.aspx
 
EVENTS

CS4CA USA
CS4CA USA
March 26-27, 2019
While cybercrime steadily increases in the US, the perceived complexity of data security remains a barrier for organizations to strengthen their cybersecurity strategies. Cyber risks are complex and unique to every circumstance, therefore difficult to quantify. But ultimately, all complexities can b...

NEPIC Digitalisation & Cyber Security Conference
NEPIC DIGITALISATION & CYBER SECURITY CONFERENCE
March 27-27, 2019
The 4th Industrial Revolution represents an extraordinary growth and productivity opportunity for manufacturing in general, however, by its very nature brings with it increased risk. During this new event for 2019, we will explore the pros and cons of the connected world we live in whilst showcasing...

Bandura Cyber


Bandura Cyber created the Threat Intelligence Gateway: TIG™. TIG helps combat cyber threats in enterprise and government networks by delivering innovative network security solutions. TIG in-line IP filter security appliance is the global leading geo-IP location and IP threat filter appliance, reducing the attack surface at networks throughout the world. Originally developed for the U.S. Military, the TIG is both powerful and easy-to-use, enabling network administrators to maintain complete visibility and control over ingress and egress traffic.

RELATED NEWS


President Obama has promised to take action in response to findings by U.S. intelligence agencies that Russia hacked computers at the Democratic National Committee and other Democratic political groups. And one of Donald Trump's first big decisions as president may be whether to continue down the chosen path. State-sponsored hacking is "arguably one of the biggest threats to the nation," says Jay Kaplan, a former analyst at the National Security Agency. State actors are behind nume...
NPR
READ MORE

Although current industry statistics may seem somewhat intimidating, data science experts and big data enthusiasts are excited and prepared for a future that's becoming increasingly connected to the web. Some techniques used to harness this raw information, such as data mining, help give us an insight into the future of cybersecurity and what areas may pique interest moving forward....
CIO
READ MORE

A recently observed Zeus Panda banking Trojan attack used poisoned Google search results for specific banking related keywords to infect users, Cisco Talos researchers warn. As part of this attack, the actor behind Zeus Panda used Search Engine Optimization (SEO) to make their malicious links more prevalent in the search results....
SECURITY WEEK
READ MORE

"Juniper Networks has claimed that a security audit conducted after backdoor code was discovered in its ScreenOS software has revealed no additional unauthorized code, but it is ditching the Dual_EC crypto technology in the product anyway.

The networking giant claimed back in December that an internal code review uncovered unauthorized code which could allow attackers to gain remote control of NetScreen devices."...

INFOSECURITY MAGAZINE
READ MORE

Security firm FireEye has discovered a recent targeted attack campaign likely to have been backed by the Kremlin which exploits zero day vulnerabilities in Adobe Flash and Microsoft Windows....
INFOSECURITY MAGAZINE
READ MORE

iOS 6 introduced several security mitigations to make it more difficult for hackers to leverage well-known attacks against operating systems – such as buffer overflows and the zone free list pointer overwrite. Such mitigations, including memory layout randomization, depend on the generation of a random number at boot. So with their introduction in iOS 6, Apple included a new PRNG called early_random() that, explains Azimuth researcher Tarjei Mandt, "leveraged a fairly simple generator...
INFOSECURITY-MAGAZINE
READ MORE

EVENTS

CS4CA USA
CS4CA USA
March 26-27, 2019
While cybercrime steadily increases in the US, the perceived complexity of data security remains a barrier for organizations to strengthen their cybersecurity strategies. Cyber risks are complex and unique to every circumstance, therefore difficult to quantify. But ultimately, all complexities can b...

NEPIC Digitalisation & Cyber Security Conference
NEPIC DIGITALISATION & CYBER SECURITY CONFERENCE
March 27-27, 2019
The 4th Industrial Revolution represents an extraordinary growth and productivity opportunity for manufacturing in general, however, by its very nature brings with it increased risk. During this new event for 2019, we will explore the pros and cons of the connected world we live in whilst showcasing...