home.aspx
 
EVENTS

BSI International Cyber Resilience Exchange 2019
BSI INTERNATIONAL CYBER RESILIENCE EXCHANGE 2019
March 26-26, 2019
BSI International Cyber Resilience Exchange 2019 is a one day event which brings together leading international cyber intelligence experts and innovators to share their vision of making a secure digital future a reality. The exchange comprises of keynote speakers, panel discussions and interactive s...

CS4CA USA
CS4CA USA
March 26-27, 2019
While cybercrime steadily increases in the US, the perceived complexity of data security remains a barrier for organizations to strengthen their cybersecurity strategies. Cyber risks are complex and unique to every circumstance, therefore difficult to quantify. But ultimately, all complexities can b...

Avatier


Avatier develops software and delivers services that automate IT operations. Our identity management and access governance solutions make organizations more secure and productive in the shortest time at the lowest costs. Avatier is the only company providing solutions that adapt to the needs of the business user delivering a unified framework for business processes across operations. Avatier Corporation offers identity access management software, cyber security audit controls, and enterprise risk management services that transform how enterprises operate. Avatier identity management solutions combine business technology with innovation to augment and sustain an organization's risk management compliance through self-service administration and automation. From our unique user provisioning IT Store, to our first of its kind self-service password reset tool, and now with our newly released universal mobile client access certification software, Avatier delivers critical identity access governance capabilities to IT operations while lowering administration costs. Avatier offers a complete compliance management system with an ITIL service catalog, self-service provisioning, active directory group management, and self-service password reset to fortify your IT cyber security.

RELATED NEWS


A suspected Chinse APT group has been spotted raiding a UK government contractor for military and other sensitive documents. APT15 is also known as Ke3chang, Mirage, Vixen Panda GREF and Playful Dragon – a group operating for several years from servers registered in China and with Chinese language infrastructure. NCC Group claimed at the weekend that it spotted the group stealing sensitive documents from one of its clients, a government contractor, back in May. It appeared to be using a bl...
INFOSECURITY-MAGAZINE
READ MORE

Companies that provide network-attached storage (NAS) appliances, routers and other types of networking devices have started investigating the impact of a recently disclosed Samba vulnerability on their products. Updates released last week for Samba, the software suite that provides file and print sharing capabilities between Windows and Unix computers, address a remote code execution flaw (CVE-2017-7494) that affects all versions of the product since 3.5.0, released in March 2010....
SECURITYWEEK
READ MORE

At least five different types of AirLive cameras are susceptible to command injection vulnerabilities that could let attackers access user credentials, gaining complete control over the devices....
INFOSECURITY MAGAZINE
READ MORE

A spokesperson for Turkey's president says the country will increase security following a spate of cyber attacks last week that affected government websites and some banks. Ibrahim Kalin, a spokesperson for President Recep Tayyip Erdogan, told reporters on Monday that authorities were investigating the source of the cyber attacks that disrupted access to government websites and online bank transactions....
NEWS24WIRE
READ MORE

Qualys has announced its intent to acquire Second Front Systems, expanding its market presence in building and delivering cybersecurity solutions for the US federal government. “This acquisition would enable us to strengthen our federal division and expand the reach of the Qualys Gov Platform to various government sectors including military and defense,” said Philippe Courtot, chairman and CEO, Qualys. Second Front Systems sources cutting-edge solutions in cybersecurity and advanced ...
INFOSECURITY MAGAZINE
READ MORE

The WannaCry ransomware, also known as Wanna Decryptor, WanaCrypt0r, WannaCrypt, Wana Decrypt0r and WCry, has infected more than 200,000 devices worldwide.While the campaign has earned the attackers more than $50,000 in just a few days....
SECURITYWEEK
READ MORE

EVENTS

BSI International Cyber Resilience Exchange 2019
BSI INTERNATIONAL CYBER RESILIENCE EXCHANGE 2019
March 26-26, 2019
BSI International Cyber Resilience Exchange 2019 is a one day event which brings together leading international cyber intelligence experts and innovators to share their vision of making a secure digital future a reality. The exchange comprises of keynote speakers, panel discussions and interactive s...

NEPIC Digitalisation & Cyber Security Conference
NEPIC DIGITALISATION & CYBER SECURITY CONFERENCE
March 27-27, 2019
The 4th Industrial Revolution represents an extraordinary growth and productivity opportunity for manufacturing in general, however, by its very nature brings with it increased risk. During this new event for 2019, we will explore the pros and cons of the connected world we live in whilst showcasing...