home.aspx
 
EVENTS

International Cybersecurity Forum
INTERNATIONAL CYBERSECURITY FORUM
January 22-23, 2019
The International Cybersecurity Forum is a platform aiming at promoting a pan-european vision of cybersecurity as well as to strengthen the fight against cybercrime. In line with the digital single market and data protection regulation, the FIC became THE reference event, bringing together all major...

The Future of Cyber Security Manchester
THE FUTURE OF CYBER SECURITY MANCHESTER
January 24-24, 2019
Cyber security at the top of the agenda as the attack landscape widens. Cyber-attacks are diversifying, putting businesses at increasing risk. In 2017, multiple ransomware attacks such as the Wannacry cryptoworm that hit the NHS demanded bitcoins in exchange for the release of data. This is now evol...

Avanade


Avanade leads in providing innovative digital services, business solutions and design-led experiences for its clients, delivered through the power of people and the Microsoft ecosystem. Our professionals combine technology, business and industry expertise to build and deploy solutions to realize results for clients and their customers. Avanade has 27,000 digitally connected people across 23 countries, bringing clients the best thinking through a collaborative culture that honors diversity and reflects the communities in which we operate. Majority owned by Accenture, Avanade was founded in 2000 by Accenture LLP and Microsoft Corporation.

RELATED NEWS


From leaving your mobile in the back of a taxi to having it swiped at a coffee shop, phone theft or loss is hardly a rare occurrence. Kaspersky Lab is looking to address the security ramifications of that reality with an app for Android users, dubbed Phound!...
INFOSECURITY MAGAZINE
READ MORE

“The new reality of security is that every organization has some piece of malicious code within their network,” said David DeWalt, chairman of the board and CEO of FireEye, in a statement. “The more important question is has that code been able to execute any compromising activity that puts the organization at risk, and if so, what data left the network? With the addition of the nPulse solution, the FireEye platform will have a ‘flight recorder’ for security analyti...
INFOSECURITY-MAGAZINE
READ MORE

Cybersecurity is one of the most significant economic and national security challenges facing our nation today," said Farnam Jahanian, the NSF's assistant director for computer and information science and engineering (CISE), in a statement. "NSF's investments in foundational research will transform our capacity to secure personal privacy, financial assets, and national interests. These new Frontier awards will enable innovative approaches to cybersecurity, with potential benefi...
INFOSECURITY MAGAZINE
READ MORE

In tests that imitated the actions of hackers by sending emails to employees with links to websites, password entry forms and attachments, 17% of the messages would have led to a compromise of the employee's workstation and, ultimately, the entire corporate infrastructure if they had been real. In total, 3,332 messages were sent by cybersecurity firm Positive Technologies. The most effective method of social engineering turned out to be phishing emails: More than a quarter (27%) of recipient...
INFOSECURITY-MAGAZINE
READ MORE

Caught between the need to develop quickly and the lack of staff to test thoroughly, the result is buggy applications. Cenzic adds a third problem: hackers are increasingly turning their attention to exploiting applications rather than just defeating firewalls and antivirus. "While the majority of corporations have the important security building blocks, such as firewalls and intrusion protection systems needed for their security infrastructure," notes the report, "not enough orga...
INFOSECURITY-MAGAZINE
READ MORE

Israeli security researchers have discovered a way to steal sensitive information from a supposedly secure “air gapped” PC using just a lightweight piece of malware and a cheap GSM feature phone. In research set to be released in August, a team at the Ben-Gurion University of the Negev (BGU) Cyber Security Research Center claimed the ‘hack’ requires malware dubbed GSMem to be installed onto the computer. Its malicious code works to modify the CPU firmware, forcing it to t...
INFOSECURITY MAGAZINE
READ MORE

EVENTS

International Cybersecurity Forum
INTERNATIONAL CYBERSECURITY FORUM
January 22-23, 2019
The International Cybersecurity Forum is a platform aiming at promoting a pan-european vision of cybersecurity as well as to strengthen the fight against cybercrime. In line with the digital single market and data protection regulation, the FIC became THE reference event, bringing together all major...

The Future of Cyber Security Manchester
THE FUTURE OF CYBER SECURITY MANCHESTER
January 24-24, 2019
Cyber security at the top of the agenda as the attack landscape widens. Cyber-attacks are diversifying, putting businesses at increasing risk. In 2017, multiple ransomware attacks such as the Wannacry cryptoworm that hit the NHS demanded bitcoins in exchange for the release of data. This is now evol...