More trouble for Adobe Reader, as FireEye finds infected PDFs in the wild. The malware bypasses mitigations through return-oriented programming and baffles sandbox analysis reports through fake app export table entries pointing to invalid memory locations. (Sophos examines infected PDFs and offers a detailed account of their malicious functionality.) Adobe issued another advisory late yesterday telling users to avoid trouble by enabling the protected view in Reader, which Adobe says can be done by going to Preferences, selecting Security (Enhanced) and then checking either "Files from potentially unsafe locations" or "All files."
An iOS 6.1 security flaw is exposed. An Android app developer says he's discovered that Google Play reveals user data to developers. A Flickr bug takes private photos public.
Jawbone reports it's been hacked, with user accounts compromised. Chinese users of OS X experience a spike in attacks.
Telecommunications Denial of Service (TDoS) is now available as a service on the black market. MIT's Technology Review notes with alarm the growth of a "malware-industrial complex" that serves the US military: malware is likely to prove far more difficult to contain than other military technologies. (The US Department of Defense yesterday announced a Distinguished Warfare Medal for cyber and drone operations.)
The US National Institute for Standards and Technology (NIST) solicits comments on its draft Electronic Authentication Guideline, set to supersede NIST Special Publication 800-63-1.
US President Obama's cyber executive order will share classified threat information with critical infrastructure operators. It will also expedite security clearances in selected industries.
Today's issue includes events affecting Canada, China, Japan, New Zealand, Spain, United Kingdom, United States..
Adobe Reader zero-day exploit spotted in the wild(Help Net Security) Researchers form security firm FireEye have found in the wild a PDF file that exploits a new zero-day vulnerability in Adobe Reader. "Upon successful exploitation, it will drop two DLLs. The first DLL shows a fake error message and opens a decoy PDF
Malware attacks spike against Apple OS X users in China enclave(Ars Technica) The increase is further proof that users of any system are vulnerable to hacks. One of the pages displayed by a booby-trapped Word document that exploits a vulnerability Microsoft patched in 2009. Researchers are reporting a spike in hack attacks targeting Mac OS X systems for the purpose of surreptitiously monitoring users' e-mail and chat contacts and maintaining persistent control over their computers
Google Play Gives User Data to App Devs(Threatpost) Android application developer Dan Nolan claims that the Google Play store sends software developers the names, approximated locations, and email addresses of every individual that downloads one of their applications
Flickr bug made users' private photos public(Help Net Security) A glitch in the Flickr matrix has resulted in intimate photos of a number of its users being made available for everyone to see after their permissions turned from "private" to "public" without their
Cryptome site, Twitter and email account hacked again(Help Net Security) Cryptome, the well-known online repository of documents concerning cryptography, freedom of speech, spying, and surveillance, has been hacked again on Monday night, says the notice on the site's main
Botnets for rent, criminal services sold in the underground market(SecurityAffairs) Internet is becoming a mine for criminals that in easy way are able to access to any kind of resources to arrange a cyber attacks, a cyber espionage campaign or a complex banking fraud. What is very scaring is the simplicity with which it is possible to acquire any kind of criminal services in the underground and the creativity of cyber criminals that are able to offer model of sale efficient as cheap. In the past I proposed in different posts information related to the sales in the underground market, especially the Russian one that is considered the most active
Welcome to the Malware-Industrial Complex(Technology Review) The U.S. government is developing new computer weapons and driving a black market in "zero-day" bugs. The result could be a more dangerous Web for everyone. Governments, contractors, and researchers are developing cyber-weapons that could put businesses and ordinary Internet users at risk. Every summer, computer security experts get together in Las Vegas for Black Hat and DEFCON, conferences that have earned notoriety for presentations demonstrating critical security holes discovered in widely used software. But while the conferences continue to draw big crowds, regular attendees say the bugs unveiled haven't been quite so dramatic in recent years
Security Patches, Mitigations, and Software Updates
Apple Will Release Fix For iOS 6.1 Microsoft Exchange Bug(TechCrunch) Apple says it has identified a fix for a bug that causes excess activity on Microsoft Exchange accounts after users accept an exception to a recurring calendar event, and will make it available in an upcoming software update. The bug is troublesome enough that some corporate IT departments have blocked their own devices from their Exchange servers
Thanks, Adobe. Protection for critical zero-day exploit not on by default(Ars Technica) Reader protected view: Like car airbags that work only if owners flip a switch. The recently discovered zero-day attacks targeting critical vulnerabilities in Adobe's ubiquitous Reader application are able to bypass recently added security defenses unless end users manually make changes to default settings, company officials said
Ruby on Rails Patches DoS, Remote Execution Flaws(Threatpost) Web app framework Ruby on Rails patched two security flaws this week in the open source framework that could have led to denial of service attacks and remote execution vulnerabilities
Vulnerability Patched in Schneider Electric ICS Gear(Threatpost) The Industrial Control System CERT released an advisory this week warning of a vulnerability in a popular sensor monitoring system used in a number of critical industries, including energy, water and manufacturing
Personal Reflections on Suits and Spooks DC 2013(infosec island) Now that I've had a chance to decompress from and reflect upon the terrific Suits and Spooks DC conference last weekend, I want to share some surprising shifts in thinking that occurred for me during those two days. The speakers were all terrific, but some topics triggered a lot of passionate debate amongst the speakers and the attendees. You can get a sense of what transpired by reading the live Twitter stream from the event
Global malicious websites increase by 600 percent(Help Net Security) Year-over-year, the number of malicious web-based attacks increased by nearly 600 percent, according to Websense Security Labs. These attacks were staged predominantly on legitimate sites
The growing BYOD problem(FierceMobileIT) Nearly three out of five enterprises believe that BYOD represents a growing problem for their organizations, according to a survey of 162 enterprises conducted by Osterman Research on behalf of Dell (NASDAQ: DELL). Yet, 82 percent of enterprises allow their employees to use personally owned mobile devices to access corporate systems like email, databases and applications, the survey found
Congress Out On A Limb To Avoid Ax(USA Today) A divided Congress will take next week off and then return to a familiar conflict: a looming, self-inflicted budget deadline that threatens economic stability with no path in sight for avoiding it
DOD Repeats Dire Warnings On Cuts(Stars and Stripes) For the second day in the row, Pentagon top brass intensified its warnings to lawmakers about sequestrations crippling effect on military readiness and its ability to respond to budding conflicts across the globe
House GOP: Pentagon Crying 'Wolf' On Sequester(Politico.com) The military's last-ditch push to stop sequestration is being met with increasing resistance on Capitol Hill, with even some of the Pentagons strongest supporters criticizing the latest public relations campaign as too little, too late
Rubio, Paul Reflect GOP Split On Defense Cuts(Washington Times) The two Republican rebuttals to the State of the Union address Tuesday night reinforced the GOP's commitment to cutting spending - but the dueling responses from Sens. Marco Rubio and Rand Paul also exposed a split in the party over how that philosophy applies to the defense budget
INSA: intelligence community CIOs see need for information technology enterprise(FierceGovernmentIT) Driven by budget pressures and mission requirements, including the need to more efficiently share information between agencies, there appears to be a "growing consensus" among the Intelligence Community's chief information officers that implementing an IC Information Technology Enterprise is the right thing to do, according to an Intelligence and National Security Alliance paper
Dell employees grumble about buyout as stock options are drowned(Ars Technica) Many stock-owning employees will be left with less than they had hoped for. While Dell CEO Michael Dell and many at the top of the Dell executive ladder stand to make out well in a move to take the company private, some rank-and-file employees and mid-level executives are grumbling about how the deal affects them. That's because Dell, which has used stock options and restricted stock heavily as an incentive for employees in the past, is simply cancelling many of the stock options it has awarded to employees if the go-private deal is completed
Accenture To Update USDA Food Safety Data System(GovConWire) Accenture (NYSE: ACN) has won a $2 million contract from the U.S. Agriculture Department to help the department's Food Safety Inspection Service update a data tracking system first implemented in 2005. The company will work with FSIS to consolidate data from three legacy systems into an agency-wide enterprise system under the one-year award, Accenture said
Jim Chilton Named Boeing Defense Systems Head, Greg Hyslop Tech Research VP(GovConWire) Jim Chilton, Boeing's (NYSE: BA) former vice president and program manager for exploration launch systems, has been appointed vice president and general manager of strategic missile and defense systems. The 29-year company veteran will succeed Greg Hyslop, who will serve as VP and GM of research and technology, Boeing said Tuesday
Thales Communications…Moving On Up…(Satnews) Thales Communications, Inc. has appointed Aaron Brosnan as the company's new Vice President of Business Development. Mr. Brosnan is responsible for developing and executing the company's business development strategies and growing the company's core business, including its next generation communications products. Mr. Brosnan comes to Thales from SCI Technologies, Inc., a Sanmina-SCI company, where, as Vice President of Business Development, he was responsible for leading its new business initiatives in the areas of aviation communications systems and avionics products, ground tactical vehicular and command post communications systems, radiation detection systems, tethered fiber optic systems, and engineering services
Another Blow For BlackBerry As New Zealand Cops Pick iOS Devices(TechCrunch) In another setback for BlackBerry's key government business, the New Zealand police force has chosen iOS devices over smartphones and tablets running BlackBerry. Kiwi cops will be kitted out with iOS devices after spending nearly a year testing iPhones and iPads against competing models running Android and BlackBerry operating systems
Zscaler delivers big visibility security analytics(Help Net Security) Zscaler unveiled new analytics technology that gives enterprise security professionals real-time visibility into all employee internet activity across web, cloud email, and mobile application platform
Samsung unveils new cloud displays(Help Net Security) Samsung announced its next-generation TC191W and TC241W thin-client and NC191 and NC241 zero-client cloud displays. The lines combine VDI and desktop virtualization for secure access to a business cloud
Opportunistic scanning from cloud to endpoint(Help Net Security) iScan Online introduces opportunistic security scanning from the cloud to any device. They perform internal PAN, PCI and Vulnerability scanning without installing software or the need for additional
CA streamlines identity and access management(Help Net Security) CA announced its CA CloudMinder identity and access management (IAM) service solution. CA CloudMinder provides enterprise-grade IAM for both cloud-based or on-premise applications in a highly scalable
SmartShare: Free tool for secure social sharing(Help Net Security) Veracode released SmartShare, a free tool designed to offer developers, bloggers and marketers a more secure method of on-site bookmark sharing. With more online content being shared than ever before
CACI, AOptix to Deliver Mobile Biometric Devices to the Pentagon; Dan Allen Comments(ExecxutiveBiz) CACI International and technology innovation firm AOptix will work together on a Defense Department contract to develop smart mobile identity devices, according to a AOptix statement. The new platform was unveiled by the company in September during the Biometrics Consortium Conference and integrates biometrics, including iris, fingerprint, face and voice recognition with smartphone technology
Security Analytics and Big Data(Dark Reading) I get a flood of 'big data' announcements on how using big data clusters, to analyze the mountains of event data companies collect, will 'transform' security as we know it. I think this is wrong
Auditd is your friend(Internet Storm Center) Recently I've been working on several incidents that included attackers getting shell access to the compromised host and somehow elevating their privileges to root. Of course, once they have access to the box, one of the first things they want to do is to be able to establish that same level of access again. While there are many, many ways for an attacker to plant a backdoor that will allow him access to the server later, the easiest way is, of course, to create a new, privileged account that the attacker can use to access the server
What businesses can learn from the New York Times cyber-attack(CBS News) What businesses can learn from the New York Times cyber-attack. Flickr user alextorrenegra. (MoneyWatch) There's a war taking place in cyberspace. Every day, businesses around the world are the subject of attacks by criminal organizations, and possibly
NIST revises electronic authentication guideline, releases for public comment(FierceGovernmentIT) The National Institute of Standards and Technology has updated the registration and issuance processes section of its Electronic Authentication Guideline, according to a revised NIST draft. The document, which will supersede NIST Special Publication 800-63-1, provides technical guidelines for federal agencies implementing electronic authentication, and defines requirements for each of four levels of assurance in the areas of identity proofing, registration, tokens, management processes, and authentication protocols. Its recommendations cover remote authentication of users, such as employees, contractors or private individuals who interact with government IT systems over open networks
BYOD spurs need for enterprise app stores(FierceMobileIT) The BYOD trend is spurring the deployment of enterprise app stores as companies struggle to deal with the influx of personally owned devices, according to Gartner. One-quarter of enterprises will have enterprise app stores to manage corporate apps on PCs and mobile devices by 2017, the research firm predicts
Enterprises need to educate employees about BYOD risks(FierceMobileIT) BYOD continues to pose more and more support and security challenges for the enterprise. According to a recent survey conducted by Osterman Research on behalf of Dell (NASDAQ: DELL), three out of five enterprises believe that BYOD represents a growing problem
Design and Innovation
New 'FiberHouse' in Kansas City invites startups for a year, rent-free(Ars Technica) Famed early-stage investor Brad Feld, who bought house, holds new competition. The Kansas City Startup Village is aglow with the announcement that Brad Feld, an early-stage investor, has closed on a house in Kansas City, Kansas (KCK)—he's already dubbed it the "FiberHouse." Feld is also a co-founder of TechStars, a well-known startup accelerator based in Boulder, Colorado. "I'm not going to be living in it," he wrote on his blog on Wednesday. "Instead, I'm going to let entrepreneurs live / work in it. Rent free. As part of helping create the Kansas City startup community. And to learn about the dynamics of Google Fiber. And to have some fun"
Research and Development
Science Shows Dating Websites Aren't Better At Finding You Love(TechCrunch) I was really hoping this article would have ended differently. But after spending countless hours scanning tiny pixelated squares of people who were supposed to represent my mathematically determined soul mate, I found that online dating websites are modern-day versions of snake oil. I ended up back at bachelorhood after a long and expensive trek through computer-aided love services; I decided to
Ask Ars: Why spend time and money finding new prime numbers?(Ars Technica) That new 17-million digit Mersenne prime number might matter. Someday. Are we wasting computer power looking for new numbers with certain properties? OK, you've got us. The jig is up. There is no use for absurdly large prime numbers—yet (we'll explain that eventually). Slightly less ludicrous prime numbers do have a point, which we'll describe here
Hague spells out counterterrorism plan(Financial Times) William Hague will say on Thursday that Britain needs to develop justice and human rights partnerships with states in the Middle East and Africa so that the UK is better placed to provide them with intelligence to counterterrorist threats. The foreign secretary will use a speech in London to spell out how the UK wants to deepen intelligence co-operation with countries where jihadist threats to Britain are emerging. It is often hard for the UKs intelligence agencies to share information with the relevant governments because they have poor human rights records
Obama Presses Cybersecurity Effort(Wall Street Journal) The Obama administration pressed ahead Wednesday with its campaign to bolster cybersecurity measures through an executive order while setting the stage for a new battle in Congress over how to ensure computer safeguards at companies that run the electric grid and other key infrastructure
US says America is losing cyber war to China; officials vow to find compromise on legislation(Washington Post) Declaring that America is losing an aggressive cyber-espionage campaign waged from China, administration officials and lawmakers on Wednesday agreed to push legislation that would make it easier for the government and industry to share information about who is getting hacked and what to do about it. They say this new partnership, codified by law and buoyed by President Barack Obamas new executive order, is critical to keeping countries like China, Russia and even Iran from rummaging in American computer networks and targeting proprietary data they can use to wreak havoc or compete against U.S. businesses
Feds roll out cyber plan as Hill vows legislation(Monterey County Herald) Declaring that America is losing an aggressive cyber-espionage campaign waged from China, administration officials and lawmakers on Wednesday agreed to push legislation that would make it easier for the government and industry to share information about who is getting hacked and what to do about it
Presidential Cybersecurity Executive Order Has Limited Reach(SIGNAL Magazine) One day after unveiling a long-awaited executive order concerning a wide-range of cybersecurity concerns, President Barack Obama's top cybersecurity advisers admit that the order only goes so far in dealing with pressing Internet security needs. They say that the order is only a "down payment" and no substitute for permanent congressional legislation on the matter
Cybersecurity Executive Order(Chemical Facility Security News) Well, President Obama finally signed the long promised Cybersecurity Executive Order. We dont have an EO number yet, that will come in the next day or two when the EO is published in the Federal Register. In any case, what is posted on the White House web site is certainly good enough for us to start seeing what practical effect this EO will have on cybersecurity
Cybersecurity Executive Order Short on Action, Long on Voluntary Initiatives(Threatpost) The executive order that President Barack Obama signed yesterday in advance of his State of the Union Address contains a lot of provisions for information sharing on attacks and threats on critical infrastructure, and also calls for the development of a framework to reduce cybersecurity risks in federal agencies and critical infrastructure. What the order does not include are any mandates, required changes or a plan for significant action. The most-discussed section of the executive order on cybersecurity is the one that directs the attorney general, secretary of the Department of Homeland Security and the Director of national Intelligence to establish an information-sharing program that will produce unclassified reports on "cyber threats to the U.S. homeland that identify a specific targeted entity." However, this is not the broad, two-way sharing of attack and threat data between the government and the private sector that some in the security community had been pushing for.
Financial industry welcomes Obama cybersecurity plans(Finextra) US President Barack Obama has signed a cybersecurity executive order designed to improve collaboration and information sharing between the government and critical infrastructure providers such as banks. Obama signed the 'improving critical infrastructure cybersecurity' order ahead of his State of the Union address this week, during which he warned that America's enemies are "seeking the ability to sabotage our power grid, our financial institutions and our air traffic control systems"."We cannot look back years from now and wonder why we did nothing in the face of real threats to our security and our economy," he told Congress, urging it to pass laws to back up his plans. In response, the House Intelligence Committee said it planned to revive its Cyber Intelligence Sharing and Protection Act (Cispa), which has been criticised in the past by privacy groups
Lawyers Claim Number of Data Breach Victims Was Falsified by Ottawa(Oye Times) The group of people whose personal information was lost by the federal government are claiming that the actual number of victims are much more than claimed by Ottawa. It was officially announced by the Human Resources and Skills Development Canada last month that it has lost a flash drive from an office in Gatineau, Que., which enclosed personal information of more than half a million recipients of student loan
Dutch company hits Facebook with lawsuit over 'Like' button(IT Proportal) Facebook has been dragged into a new legal confrontation, this time over the use of the Like button, as well as a few other popular features. The social networking site was sued by Rembrandt Social Media - a patent-holding company working on behalf of the estate of Joannes Jozef Everardus van der Meer, a programmer from the Netherlands who died in 2004. The complainant claims that Facebooks overwhelming success is a direct product of many key features and technologies patented by Van der Meer and now owned by Rembrandt
Man Arrested in Relation to the Remote Control Virus(Symantec) Back in October 2012, we published a couple of blogs about Backdoor. Rabasheeta, a back door Trojan that was used to make numerous death threats from compromised computers, resulting in four wrongful arrests. The saga may have come to an end for the malware author who had been taunting the Japanese authorities for months
Japanese Police Determined to Enhance Anti-Cybercrime Capabilities(Softpedia) The recent case in which police has wrongfully arrested four men who were believed to have sent threatening messages on the Internet has made Japanese authorities realize the importance of proper cybercrime-fighting skills. To solve the case of the online threats which were actually made by a computer malware whose author was arrested recently various police organizations from all over Japan had to share virus-related information, Daily Yomiuri reports. This was the first time when law enforcement collaborated in such a manner
ATM skimming ring compromised over 6,000 bank accounts(Help Net Security) U.S. federal authorities have announced the filing of an indictment against two alleged leaders of an international scheme to steal customer bank account information using "skimming" technology that
For a complete running list of events, please visit the Event Tracker on the CyberWire website.
ATMiA US Conference 2013(Scottsdale, Arizona, US, February 19 - 21, 2013) A conference devoted to the design of ATMs, and the future of the ATM industry.
#BSidesBOS(Cambridge, Massachusetts, USA, February 23, 2013) Each BSides is a community-driven framework for building events for and by information security community members. The goal is to expand the spectrum of conversation beyond the traditional confines of...
RSA USA 2013(San Francisco, California, USA, February 25 - March 1, 2013) RSA Conference continually evolves program offerings to meet the ever-changing needs of our delegates in the dynamic infosec industry.
Nullcon Goa 2013(Bogmallo Beach Resort, Goa, India, February 26 - March 2, 2013) An international information security conference that will feature speakers and training. Topics include security and politics, vulnerability elimination, Android hacking, SCADA and smart grid penetration...
NRO Winter Way Forward Conference(Chantilly, Virginia, USA, February 28, 2013) This annual event will provide an increased awareness, understanding and support among the IT workforce by focusing on the NRO IT Way-Forward in terms of the NRO IT Sub-Portfolio Roadmaps. Exhibitors will...
TechMentor Orlando 2013(Orland, Florida, USA, March 4 - 8, 2013) Celebrating 15 years of educational events for the IT community, TechMentor is returning to Orlando, Florida, March 4-8, for 5 days of information-packed sessions and workshops. Surrounded by your fellow...
Business Insurance Risk Management Summit(New York City, New York, USA, March 5 - 6, 2013) The annual Risk Management Summit, now in it its fourth year, provides attendees with focused insight via specific, timely general sessions and strategic, thought-provoking discussions with peers and industry...
CanSecWest 2013(Vancouver, British Columbia, Canada, March 6 - 8, 2013) CanSecWest, the world's most advanced conference focusing on applied digital security, is about bringing the industry luminaries together in a relaxed environment which promotes collaboration and social...
e-Crime Congress 2013(London, England, March 12 - 13, 2013) The e-Crime Congress is designed to meet the needs of key stakeholders and decision makers who are responsible for designing and coordinating information security and risk management strategy, safeguarding...
CTIN Digital Forensics Conference(Seattle, Washington, USA, March 13 - 15, 2013) Speakers include experts and published authors in the field of digital forensics and cybersecurity. Topics include; Mobile Device Forensics, Internet Forensics, Physical Memory Analysis, Open Source Tools,...
IT Security Entrepreneurs' Forum (ITSEF 2013)(Palo Alto, California, USA, March 19 - 20, 2013) Supported by the U.S. Department of Homeland Security, Office of Science and Technology, ITSEF 2013 aims to connect the ecosystem of the entrepreneur: industry, government, and academia. The conference...
The Future of Cyber Security 2013(London, England, UK, March 21, 2013) Cyber Security and the Citizen 2013 is a one-day conference and exhibition for senior decision-makers of central and local government organisations, NGOs and major private sector enterprises.
SANS Cyber Threat Intelligence Summit(Washington, DC, USA, March 22, 2013) Conventional network defense tools such as intrusion detection systems and anti-virus focus on the vulnerability component of risk, and traditional incident response methodology presupposes a successful...
AFCEA Belvoir Industry Days 2013(National Harbor, Maryland, USA, April 2 - 3, 2013) The purpose of this event is to inform the IT community about the recent successes and the forward-thinking opportunities that the Department of Defense and the Department of the Army have developed.
CSO40(Braselton, Georgia, USA, April 2 - 3, 2013) The CSO40 Security Confab + Awards will honor and share the critical viewpoints of today's leading CSOs, CISOs and security executives at the nation's leading CSO thought leadership conference.
Cloud Connect Silicon Valley(Santa Clara, California, USA, April 2 - 5, 2013) Cloud Connect returns to Silicon Valley, April 2-5, 2013, for four days of lectures, panels, tutorials and roundtable discussions on a comprehensive selection of cloud topics taught by leading industry...
Cyber 1.3(, January 1, 1970) Maj. Gen. Suzanne Vautrinot, USAF, commander, 24th Air Force, and commander, Air Force Network Operations, will discuss the global strategic implications that relate to the cyber domain at the Space Foundation...
INFILTRATE 2013(Miami, Florida, USA, April 11 - 12, 2013) INFILTRATE is a deep technical conference that focuses entirely on offensive security issues. Researchers focused on the latest technical issues will demonstrate techniques that you cannot find elsewhere.
Information Tech Expo Series - Hawaii(Oahu, Hawaii, USA, April 12 - 19, 2013) This 6-series showcase will feature stops at 5 DoD locations and 1 Intel Center on the island of Oahu. Celebrating 20 years of these expos is a true testament to the government and military's readiness...
InfoSec World Conference & Expo 2013(Orlando, Florida, USA, April 15 - 17, 2013) With the primary objective of providing top-notch education to all levels of information security and IT auditing professionals, InfoSec World delivers practical sessions that give you the tools to strengthen...
Infosec Southwest 2013(Austin, Texas, USA, April 19 - 21, 2013) InfoSec Southwest is intended to be a general security and hacking conference with no specific industry or topical focus. As such, nearly all topics (other than vendor pitches) are fair game and the attending...
23rd Annual Government Procurement Conference(Washington, DC, USA, April 25, 2013) This unique one-day event attracts more than 3,000 participants representing government agencies, prime contractors and small businesses from around the country. Participating companies are able to network...
Interop Las Vegas(Las Vegas, Nevada, USA, May 6 - 10, 2013) Attend Interop Las Vegas, May 6-10, and attend the most thorough training on Apple deployment at the NEW Mac & iOS IT Conference. Join us in Las Vegas for access to 125+ workshops and conference classes,...
Consumerization of IT in the Enterprise Conference and Expo(San Francisco, California, USA, June 2 - 4, 2013) From smartphones to mobile apps, social software and 4G networks, the wave of innovation in the consumer space is transforming the way companies do business, both inside and outside of the enterprise.
25th Annual FIRST Conference(Bangkok, Thailand, June 16 - 21, 2013) The annual FIRST conference provides a setting for conference participants to attend a wide range of presentations delivered by leading experts in both the CSIRT field and from the global security community.
SECRYPT 2013(Reykjavik, Iceland, July 29 - 31, 2013) The 10th International Conference on Security and Cryptography (SECRYPT 2013) will take place from 29 to 31 July 2013 in Reykjavik, Iceland…The conference will focus on information systems and network...
SPONSOR & SUPPORT
Grow your brand and reach new customers.
Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.
Be a part of the CyberWire story.
People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.