home.aspx
 
EVENTS

BSI International Cyber Resilience Exchange 2019
BSI INTERNATIONAL CYBER RESILIENCE EXCHANGE 2019
March 26-26, 2019
BSI International Cyber Resilience Exchange 2019 is a one day event which brings together leading international cyber intelligence experts and innovators to share their vision of making a secure digital future a reality. The exchange comprises of keynote speakers, panel discussions and interactive s...

NEPIC Digitalisation & Cyber Security Conference
NEPIC DIGITALISATION & CYBER SECURITY CONFERENCE
March 27-27, 2019
The 4th Industrial Revolution represents an extraordinary growth and productivity opportunity for manufacturing in general, however, by its very nature brings with it increased risk. During this new event for 2019, we will explore the pros and cons of the connected world we live in whilst showcasing...

ACSI - Alternetive Converged Solutions Inc


Alternative Converged Solutions Inc. (ACSI) is an IT Solutions company that has been serving the Alberta market for more than 13 years. Established across the province in multiple sectors that include energy and health with a significant and tenured presence in education and government. ACSI is an agile boutique style IT company focused on select products and service offerings working with mid to enterprise level organizations to help clients simplify their network management.

RELATED NEWS


New research reveals SamSam ransomware campaign has generated almost $6 million for attacker and appears to be the work of a single hacker who shows no sign of slowing down. The long-running SamSam ransomware campaign, active since early 2016, has apparently earned its perpetrators nearly $6 million in ill-gotten gains -- and the pace of the campaign is picking up. According to Sophos' new report, titled "SamSam: The (Almost) Six Million Dollar Ransomware," the evidence shows the c...
TECHTARGET
READ MORE

A detailed analysis by cybersecurity experts from the University of Maryland found that website administrators nationwide tasked with patching security holes exploited by the Heartbleed bug may not have done enough...
SCIENCEDAILY
READ MORE

iOS 6 introduced several security mitigations to make it more difficult for hackers to leverage well-known attacks against operating systems – such as buffer overflows and the zone free list pointer overwrite. Such mitigations, including memory layout randomization, depend on the generation of a random number at boot. So with their introduction in iOS 6, Apple included a new PRNG called early_random() that, explains Azimuth researcher Tarjei Mandt, "leveraged a fairly simple generator...
INFOSECURITY-MAGAZINE
READ MORE

The image of an ATM spewing out cash is a bank’s worst nightmare, but Kaspersky Lab researchers have discovered new malware that does just that. It’s the latest in a long line of cash machine compromise tactics....
INFOSECURITY MAGAZINE
READ MORE

The index – a survey of more than 500 of the world’s most senior business leaders – noted that cybersecurity is firmly at the top of the agenda for boards of global enterprises, third only to the risks posed by high taxation and the loss of customers....
INFOSECURITY MAGAZINE
READ MORE

Cyber-criminals have added a recently patched Flash Player zero-day vulnerability to the notorious Magnitude exploit kit, significantly raising the risk of users being targeted with attacks making use of the flaw....
INFOSECURITY MAGAZINE
READ MORE

EVENTS

BSI International Cyber Resilience Exchange 2019
BSI INTERNATIONAL CYBER RESILIENCE EXCHANGE 2019
March 26-26, 2019
BSI International Cyber Resilience Exchange 2019 is a one day event which brings together leading international cyber intelligence experts and innovators to share their vision of making a secure digital future a reality. The exchange comprises of keynote speakers, panel discussions and interactive s...

CS4CA USA
CS4CA USA
March 26-27, 2019
While cybercrime steadily increases in the US, the perceived complexity of data security remains a barrier for organizations to strengthen their cybersecurity strategies. Cyber risks are complex and unique to every circumstance, therefore difficult to quantify. But ultimately, all complexities can b...