home.aspx
   
 
EVENTS

Indianapolis CyberSecurity Conference
INDIANAPOLIS CYBERSECURITY CONFERENCE
June 19-19, 2019
FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce. Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks. Educating...

Gartner Security & Risk Management Summit 2019
GARTNER SECURITY & RISK MANAGEMENT SUMMIT 2019
June 17-20, 2019
Understand new threats and challenges. Secure rapid innovation. Prepare for emerging technologies. Prioritize resilience. Make sure you have the latest insights on fast-moving IT trends such as IoT and AI, evolving security technologies and the ever-changing threat landscape. At Gartner Security &am...

Auth0


Auth0 is a cloud service that provides a set of unified APIs and tools that instantly enables single sign-on and user management for any application, API or IoT device. It's modern identity infrastructure, built for developers. Auth0 provides open source SDKs for all popular platforms, all popular operating systems, all popular devices and all popular programming languages. It allows connections to any identity provider from social to enterprise to custom username/password databases. Auth0 is obsessed with making identity, authentication and authorization simpler for modern applications.

RELATED NEWS


“The incident has been contained and we have partnered with a leading forensics firm to understand and remediate this issue,” Shelton said. “We are not aware of any misuse of any information from this incident, but we are notifying all of the affected individuals and providing them with free one-year membership of credit monitoring and identity theft insurance.”...
INFOSECURITY MAGAZINE
READ MORE

Global IT association ISACA has launched its bid to reduce the global IT security skills shortage with a new course designed for those just starting out on their career in information security. Citing research that 92% of organizations hiring this year would find it difficult to find candidates with the right level of cyber security skills, ISACA claimed its new online course would help plug the gap. The Cybersecurity Fundamentals program will be made available through ISACA’s Cybersecurit...
INFOSECURITY MAGAZINE
READ MORE

Jask's Chiron Brings AI Threat Detection to Home Networks. There are a lot of different ways to detect potential intruders on an enterprise network, but what about smaller businesses or consumers? That's the challenge that Rob Soto, director of security research at Jask wants to help solve with the Chiron project that he is set to demonstrate at the Black Hat USA 2018 conference on Aug. 9. Chiron is a home-based network analytics and machine learning threat detection framework. The syste...
EWEEK
READ MORE

U.S. Cyber Command’s effort to build a force of 6,200 cyber warriors, split among 133 operational teams, has fueled a tug-of-war between the Defense Department’s active and reserve components....
NAVYTIMES
READ MORE

An exploit for a privilege-escalation zero-day vulnerability in Apple's latest version of OS X has cropped up in the wild, spreading malware without need for system passwords. So far, the exploit is installing adware like VSearch, Genieo package variations and MacKeeper....
INFOSECURITY MAGAZINE
READ MORE

Cyber security experts say built-in intelligence and visibility are the hallmarks of the next generation cyber security technology. At the ITWeb Security Summit 2019 being hosted this week in Sandton, Johannesburg, a panel of experts led by Stefan van de Giessen, GM of cyber security, Networks Unlimited, said an effective IT security ecosystem involves the consolidation of tools, with intelligence and analytics that feature strongly in technology deployed to protect the network. Sam Linford, reg...
ITWEB
READ MORE

EVENTS

Indianapolis CyberSecurity Conference
INDIANAPOLIS CYBERSECURITY CONFERENCE
June 19-19, 2019
FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce. Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks. Educating...

Cyber Attack Hong Kong Series 2019
CYBER ATTACK HONG KONG SERIES 2019
June 20-20, 2019
Hong Kong Series provides the region's IT executives an opportunity to gather for a day of networking, collaboration, and knowledge- transfer through peer- led keynotes, breakouts, panels, and networking sessions.