home.aspx
 
EVENTS

NEPIC Digitalisation & Cyber Security Conference
NEPIC DIGITALISATION & CYBER SECURITY CONFERENCE
March 27-27, 2019
The 4th Industrial Revolution represents an extraordinary growth and productivity opportunity for manufacturing in general, however, by its very nature brings with it increased risk. During this new event for 2019, we will explore the pros and cons of the connected world we live in whilst showcasing...

CS4CA USA
CS4CA USA
March 26-27, 2019
While cybercrime steadily increases in the US, the perceived complexity of data security remains a barrier for organizations to strengthen their cybersecurity strategies. Cyber risks are complex and unique to every circumstance, therefore difficult to quantify. But ultimately, all complexities can b...

Apricorn


Headquartered in Poway, California, Apricorn provides secure storage innovations worldwide to companies and organizations seeking the ultimate protection for their data at rest. And in verticals where data security is regulated such as finance, healthcare, education, and insurance; along with federal, state, and local governments, Apricorn encrypted devices set the standard for data security. Beyond North America, Apricorn products are also being employed in myriad data security strategies worldwide. Founded in 1983, numerous award-winning products have been developed under the Apricorn brand as well as for a number of leading computer manufacturers on an OEM basis.

RELATED NEWS


Today’s topics include Google removing 89 malicious browser extensions from the Chrome web store; Oracle’s Autonomous Database competing with cloud leaders; Pwn2Own 2018 expanding its targets and offering $2 million in prizes; and Microsoft extending Windows 10 support for businesses and schools. Google has also disabled the rogue extensions from running on the devices of over 420,000 Chrome users whose browsers were infected with the malware....

READ MORE

Build a cybersecurity culture, but consider how easily your perimeter can be breached. Speaking in the opening session of TEISS 2018, which was working under the theme of ‘Building an agile cybersecurity culture’, ethical hacker, social engineer and co-founder of Redacted Firm Freaky Clown (FC) highlighted common failings in what should be highly secure environments. These include banks, he said, which do not have security gates inside, have CCTV cameras pointing the wrong way and fe...
INFOSECURITY-MAGAZINE
READ MORE

Even though the majority of companies across the globe have implemented cybersecurity standards, a new report from IT Governance USA found that companies still believe they are the likely target of an attack. Since 2017, there has been a 25% increase in data breaches, according to the ISO 27001 Global Report, which also revealed that 68% of organizations are now using ISO 27001 – the international standard for best practices with information security management systems (ISMSs) – to a...
INFOSECURITY MAGAZINE
READ MORE

Last week President Barack Obama signed five cybersecurity-related pieces of legislation, including an update to the Federal Information Security Management Act(FISMA) — now called the Federal Information Security Modernization Act — the law which governs federal government IT security. Other cyber legislation the president signed includes the Homeland Security Workforce Assessment Act, the Cybersecurity Workforce Assessment Act, the National Cybersecurity Protection Act (NCPA), and ...
HOMELAND SECURITY NEWS WIRE
READ MORE

Dubbed Android.Spywaller by Symantec, the malware initially behaves like other mobile threats by hiding its icon in an attempt to cover its track and by releasing an encrypted payload containing the malware service logic and loading it into memory. As soon as the threat has been installed on a compromised device, it displays a “Google Service” icon on the device, although the Internet giant doesn’t offer such a product...
SECURITYWEEK
READ MORE

The Obama administration has introduced its Cybersecurity National Action Plan, which would create a federal chief information security officer, establish a new commission tasked with protecting computer networks, and increase coordination between federal officials who focus on privacy issues.Part of the plan is a much-needed software patching and updating audit, and more training and recruiting for cybersecurity specialists.None of this will be cheap, of course—the White House will look f...
INFOSECURITY MAGAZINE
READ MORE

EVENTS

NEPIC Digitalisation & Cyber Security Conference
NEPIC DIGITALISATION & CYBER SECURITY CONFERENCE
March 27-27, 2019
The 4th Industrial Revolution represents an extraordinary growth and productivity opportunity for manufacturing in general, however, by its very nature brings with it increased risk. During this new event for 2019, we will explore the pros and cons of the connected world we live in whilst showcasing...

CS4CA USA
CS4CA USA
March 26-27, 2019
While cybercrime steadily increases in the US, the perceived complexity of data security remains a barrier for organizations to strengthen their cybersecurity strategies. Cyber risks are complex and unique to every circumstance, therefore difficult to quantify. But ultimately, all complexities can b...