home.aspx
 
EVENTS

BSI International Cyber Resilience Exchange 2019
BSI INTERNATIONAL CYBER RESILIENCE EXCHANGE 2019
March 26-26, 2019
BSI International Cyber Resilience Exchange 2019 is a one day event which brings together leading international cyber intelligence experts and innovators to share their vision of making a secure digital future a reality. The exchange comprises of keynote speakers, panel discussions and interactive s...

CS4CA USA
CS4CA USA
March 26-27, 2019
While cybercrime steadily increases in the US, the perceived complexity of data security remains a barrier for organizations to strengthen their cybersecurity strategies. Cyber risks are complex and unique to every circumstance, therefore difficult to quantify. But ultimately, all complexities can b...

Amazon


Amazon strives to be Earth's most customer-centric company where people can find and discover virtually anything they want to buy online. By giving customers more of what they want - low prices, vast selection, and convenience - Amazon continues to grow and evolve as a world-class e-commerce platform. Founded by Jeff Bezos, the Amazon.com website started in 1995 as a place to buy books because of the unique customer experience the Web could offer book lovers. Bezos believed that only the Internet could offer customers the convenience of browsing a selection of millions of book titles in a single sitting. During the first 30 days of business, Amazon fulfilled orders for customers in 50 states and 45 countries - all shipped from his Seattle-area garage.

RELATED NEWS


When Edward Gibbon wrote in 1776 his then comprehensive history of what happened to Rome and the civilization it created, he probably never realized that “The History of the Decline and Fall of the Roman Empire” could just as easily have been about 21st century Facebook. But in fact, watching Facebook’s self-immolation is very much like watching the collapse of Rome over the course of 1,500 years, but in a much shorter time. Make no mistake, Facebook is dying. It’s in a s...
EWEEK
READ MORE

Previewed at its Frontiers conference last September, Slack says Enterprise Key Management (EKM) is now available. EKM gives Slack’s Enterprise Grid customers better control over sensitive data in messages, files and comments. Slack, best known for its messaging and collaboration features, said EKM will let large organizations connect and manage all of their Slack channels and give them control of the keys used to encrypt and decrypt their messages and files. “Slack already encrypts ...
EWEEK
READ MORE

Despite Austin’s South by Southwest (SXSW) conference and festival being largely focused on film and music, 2020 presidential candidates arrived in Texas ready to talk about data privacy and cybersecurity. On March 8, Sen. Elizabeth Warren made headlines for her promise to break up big tech companies such as Amazon, Google, Facebook and Apple, while Sen. Amy Klobuchar proposed reforming antitrust laws and the possibility of taxing technology companies that profit from consumer data. In an ...
INFOSECURITY MAGAZINE
READ MORE

Researchers have seen large spikes in the value of certain stolen data being traded on the dark web, but log-ins for some accounts are selling for as little as $2. Top10VPN’s first Dark Web Market Price Index report revealed debit card details as the most valuable category, selling for an average of $250, a spike of 270% year-on-year. Amazon credentials jumped 237% in value to just over $30, while Facebook (75%), Uber (60%) and Netflix (29%) log-ins also recorded sharp increases over their...
INFOSECURITY MAGAZINE
READ MORE

The Istio service mesh project is an up-and-coming open-source effort that already has the backing of major IT vendors that include IBM, Cisco, Google and Amazon. Istio however isn't secure by default, which is something that Twistlock is trying to help organizations configure, with a new guide to compliance checks released on Feb. 11. The Isto service mesh enables a more efficient type of container to container, or microservice to service communications and networking model, by offloading t...
EWEEK
READ MORE

A security issue that affects several open source container management systems, including Amazon Linux and Amazon Elastic Container Service, has been disclosed by AWS. The vulnerabilities (CVE-2019-5736) were reportedly discovered by security researchers Adam Iwaniuk, Borys Poplawski and Aleksa Sarai and would allow an attacker with minimal user interaction to “overwrite the host runc binary and thus gain root-level code execution on the host.” Also among the affected AWS containers ...
INFOSECURITY MAGAZINE
READ MORE

Linux servers are the target of a new crypto-mining campaign in which a malware dubbed "Speak Up" implants a backdoor Trojan by exploiting known vulnerabilities in six different Linux distributions, according to research from Check Point. The malware has been seen targeting servers predominantly in Asia and Latin America, including machines hosted by Amazon Web Services (AWS) and Mac devices. Because it implants a new backdoor for which there currently are no detections in VirusTotal, ...
INFOSECURITY MAGAZINE
READ MORE

Amazon Web Services (AWS) reported $6.6B in revenue for Q3, 2018 and $18.2B for the first three fiscal quarters of 2018. AWS revenue achieved an impressive 46% year-over-year net sales growth between Q3, 2017 and Q3, 2018 and 49% year-over-year growth for the first three quarters of the year. AWS’ 34% market share is bigger than its next four competitors combined with the majority of customers taken from small-to-medium sized cloud operators according to Synergy Research. The many announce...
CLOUD COMPUTING
READ MORE

IcePick-3PC has impacted a range of businesses, from publishers to e-commerce, across a variety of industries, including retail and healthcare, according to researchers from The Media Trust’s digital security and operations (DSO) team. The malware strain was first identified in spring 2018 and is able to steal device IPs en masse. When it was initially detected, IcePick-3PC was used to spam device owners using phishing in a campaign that fraudulently offered gift cards from big-name retail...
INFOSECURITY MAGAZINE
READ MORE

The cloud is a vital part of any enterprise infrastructure. The convenience of having a database that can be accessed from any location has dramatically improved efficiency within workforces. While many companies had previously been afraid of making the move, as the open nature of the cloud makes it less secure than on-premise solutions, new advances in cloud security have vastly reduced the number of successful attacks. With 2019 here, it is time to look to the future and predict where the clou...
CLOUD COMPUTING
READ MORE

EVENTS

BSI International Cyber Resilience Exchange 2019
BSI INTERNATIONAL CYBER RESILIENCE EXCHANGE 2019
March 26-26, 2019
BSI International Cyber Resilience Exchange 2019 is a one day event which brings together leading international cyber intelligence experts and innovators to share their vision of making a secure digital future a reality. The exchange comprises of keynote speakers, panel discussions and interactive s...

NEPIC Digitalisation & Cyber Security Conference
NEPIC DIGITALISATION & CYBER SECURITY CONFERENCE
March 27-27, 2019
The 4th Industrial Revolution represents an extraordinary growth and productivity opportunity for manufacturing in general, however, by its very nature brings with it increased risk. During this new event for 2019, we will explore the pros and cons of the connected world we live in whilst showcasing...