Java's recent patches have been breached: new security settings are readily bypassed. Oracle resolves to "fix Java," but observers doubt this remains possible.
Distributed denial-of-service attacks continue, and their victims find traditional criminals behind them about as often as hacktivists.
Sophos finds a variant of the Citadel kit infecting point-of-sale devices and banks. Symantec identifies a new Trojan—"Spachanel"—that exploits the Sender Policy Framework (SPF) to cloak communication with command-and-control servers.
Networked devices are again found open to exploitation: printers and security cameras (and by extension other networked cameras) offer ways into enterprise infrastructure. Exploited cameras also enable serious privacy breaches.
Apple updates iOS, addressing twenty-seven vulnerabilities and the TURKTRUST revocation. WordPress 3.5.1 closes thirty-seven bugs in previous versions of the product.
Mid-sized businesses are said to fall into a "security no-man's land," big enough to attract attacks but too small to afford effective security. Lost paper and portable storage devices account for most data breaches. CIO's breathless "All-Out Cyber War" headline opens a useful summary of cyber conflict between the US and Iran. (In a related story, the FBI has reopened its investigation into Stuxnet leakers.)
The US Department of Defense intends, budget and labor market permitting, a great expansion of its cyber forces. VMWare reorganizes to shed 900 jobs. AV-Test releases test results for nine security products.
China makes a rare acknowledgement of the People's Liberation Army's cyber capabilities. Tim Berners-Lee thinks government monitoring of citizens' online activities will backfire by creating a large, soft, espionage target.
Today's issue includes events affecting Antigua and Barbuda, Australia, Canada, China, Czech Republic, European Union, Germany, Iran, Israel, Netherlands, Philippines, Saudi Arabia, United Kingdom, United States..
Oracle: 'We Have to Fix Java'(eSecurity Planet) After a series of missteps, Oracle aims to improve Java security -- but is it too little, too late? Over the course of the last two years, Oracle's Java has been exploited time and again as hackers eviscerate the technology, seemingly at will. As each exploit emerges against Java, Oracle typically responds
High-Bandwidth DDoS Attacks as Much About Cyber-Crime as 'Hacktivism'(EWeek) Criminals looking to extort money from financial institutions continue to hit firms. Even the "hacktivists" have questionable motives, say security firms. In late 2011, trading services firm Henyep Capital Markets came under a distributed denial-of-service (DDoS) attack that disrupted many of the company's service portals
DDoS attacks, mobile traffic visibility top security concerns: Arbor(Computer World) More than 90 per cent of data centre operators are experiencing distributed denial of service (DDoS) attacks, according to Arbor Networks 8th Annual Worldwide Infrastructure Security Report. A further 60 per cent of mobile providers have no visibility of traffic on their mobile evolved packet core, the framework for providing converged data and voice services on their 4G LTE networks, the report said. Arbor surveyed 130 security professionals across different market segments globally, 20 per cent which are in the Asia-Pacific region, and found 83
Pirates target iOS enterprise loophole to spread fake iPhone apps(V3) Chinese cyber crooks are exploiting a loophole in Apple's iOS enterprise deployment procedures to release pirated apps onto iPhones. Trend Micro reported detecting a new influx of pirated apps appearing on iOS over the past few weeks in a blog post. "In the past couple of weeks, there has been some breathless reporting about how iOS users could now install pirated apps without having to jailbreak their phones. This was made possible by certain Chinese app store-like services," said Warren Tsai, product manager for Trend
What if your security camera were an insecurity camera?(Naked Security) An occasional security blogger named someLuser, who has an interest in embedded devices, recently wrote up the results of some hacking he did a security review he carried out on a popular brand of network-enabled security camera
Security Patches, Mitigations, and Software Updates
WordPress 3.5.1 fixes 37 bugs(Help Net Security) WordPress 3.5.1, now available for download, is a maintenance and security release for all previous versions that fixes 37 bugs
Security No-Man's Land(Dark Reading) As the industry descends on the RSA Conference to discuss the latest and greatest in security, the underserved midmarket continues to struggle with basic blocking and tackling. The industry machinery is not built to solve that problem…In the security practice, we have our own version of no-man's land, and that's midsize companies. Wendy Nather refers to these folks as being below the "Security Poverty Line." These folks have a couple hundred to a couple thousand employees. That's big enough to have real data interesting to attackers, but not big enough to have a dedicated security staff and the resources they need to really protect anything. These folks are caught between the baseline and the service box. They default to compliance mandates like PCI-DSS because they don't know any better. And the attackers seem to sneak those passing shots by them on a seemingly regular basis
Report: Lost Documents, Portable Memory Devices To Blame For Majority Of Data Breaches(Dark Reading) Nearly two-thirds surveyed suffered data breaches according to HCCA, SCCE survey. Lost paper files and portable memory devices account for 65 percent of data breaches according to "Data Breach Incidents & Responses," a just released survey conducted by the Society of Corporate Compliance and Ethics (SCCE) and the Health Care Compliance Association (HCCA). The compliance and ethics department, according to 69 percent of respondents, led the remediation effort following the last data breach
China loses US$46B to cybercrime in 2012(ZDNet) Online crimes such as fraud and personal information theft have cost China 289 billion yuan (US$46. 4 billion) in 2012, but the lack of legal support makes it tough for local authorities to reduce the losses. Citing a study by the People's Public Security University of China on Internet crimes in the country, Global Times reported Tuesday that local public security departments investigated more than 118,000 Internet crimes last year, with many cases involving multiple victims
Unseen, All-Out Cyber War on the U.S. has Begun(CIO) Security pros and government officials warn of a possible cyber 9/11 involving banks, utilities, other companies, or the Internet. There's a war going on, and it's raging here at home -- not in the streets or the fields, but on the Internet. You can think of it as a war on the digital homeland. If you work for a power company, bank, defense contractor, transportation provider, or other critical infrastructure type of operation, your organization might be in the direct line of fire. And everyone can become collateral damage
A couple of infographics & useful resources to mark Data Privacy Day(FraudTube) A couple of infographics and useful resources to mark Data Privacy DayIdentity fraud contributes more than 50% of 2012 UK fraud: A blog from miiCard, exploring the latest fraud figures from CIFAS along with some advice on how to check your social media footprint. Fraud: I wont be a victim will I? When setting up and growing a new business there are many things to be done: Identifying potential suppliers, targeting customers, establishing presence with online market places, implementing a social media strategy the task list is endless
Pentagon plans massive surge in Cyber Command staff(The Register) The US military is planning a massive increase in the capabilities of its Cyber Command online-warfare department as it seeks to exert dominance over the digital battlefield. "Given the malicious actors that are out there and the development of the technology, in my mind, there's little doubt that some adversary is going to attempt a significant cyberattack on the United States at some point," William Lynn III, a former deputy defense secretary, told the Washington Post. "The only question is whether we're going to take the necessary steps like this one to deflect the impact of the attack in advance or . . . read about the steps we should have taken in some post-attack commission report," he said. Currently there are around 900 uniformed and civilian staff employed by the Pentagon in its Cyber Command, which is separate from the National Security Agency - at least in principle. In practice, however, the two work side-by-side, and both are headed by the same man, General Keith Alexander. A senior defense official told the paper that the Pentagon would primarily focus on online activity outside of US domestic borders, and would only be involved in major online attacks, not minor hacking and phishing annoyances. US companies and those international companies that use American-hosted services won't be touched. "There's no intent to have the military crawl inside industry or private networks and provide that type of security," the official said
Killer Apps: DoD: No formal decision on expanding cyber command, yet(Foreign Policy (blog)) While U.S. Cyber Command has been working with the Pentagon since last April to define the cyber capabilities it wants from each of the armed services, no final decision has been made on the numbers of troops, where they will be drawn from, and what
U.S. DoD's cybersecurity force to increase fivefold(Help Net Security) The Pentagon is poised to start searching for more than 4,000 new employees for the Defense Department's Cyber Command, in a bid to boost its cyber defensive and offensive capabilities
Pentagon Cyber Force Turns To Hackers To Meet Growing Demand(Huffington Post) Faced with growing fears of potentially crippling cyber attacks and not enough skilled technicians to combat the threat, the Defense Department has launched a massive recruitment drive that's tapping an unlikely group: computer hackers. The Pentagon plans to dramatically boost the ranks of U.S. cybersecurity forces, expanding its number of cyber warriors more than five-fold, the Washington Post reported Sunday. But that strategy immediately confronts a critical shortage of those with the required skills
CEO hot seat: Dave Hansen(Help Net Security) Recently SafeNet announced the appointment of Dave Hansen, an information security and cloud veteran, as the company's new President and CEO. Help Net Security put him in the hot seat to learn more about
Who hacks the hackers? Meet CrowdStrike(Fox News) Crowdstrike even offers an on-call tactical response team to investigate incidents - a sort of cyber SWAT team. For the company that wishes to go on the
Startup Taasera Offers Defense Against Zero-Day Attacks(American Banker (subscription)) As startup Taasera opens its doors today, it is launching software designed to detect zero-day attacks -- threats from malware that exploits a previously unknown application vulnerability. Financial services companies are primary potential customers
VA Picking Up To Three Small Firms For $5B IT Products Award(Govconwire) The Department ofVeterans Affairs plans toTask Order award up to three companies positions on a potential $5 billion contract for information technology products, the Washington Post reports. For this award, Kathleen Miller writes the VA (Department of Veterans Affairs) will reserve prime positions for companies that have up to 150 employees on
Booz Allen Begins Work on $5.6B Intelligence Support Contract(Govconwire) Booz Allen Hamilton (NYSE:BAH) has begun work on a defense intelligence contract awarded in the summer of 2012, according to a company statement. Bob Noonan, a Booz Allen senior vice president, said the company is looking forward to providing the government with mission critical intelligence that will help agencies address challenges to the country's emerging security
Alion To Analyze Defense Dept Spectrum Usage(Govconwire) Alion Science and Technology has won a $1.5 million task order contract from the U.S. Defense Department to study potential affects ofOptional Form reassigning or sharing spectrum used for communications, the company said Friday. The company will analyze radio frequency spectrum used byBudget Year the military that the commercial sector wants to acquire
NJVC Wins Option On $379M NGA IT Services Contract(Govconwire) NJVC has won an option on a re-issued National Geospatial-Intelligence Agency information technology services contract potentially worth $379,945,641. NGA re-issued the contract for administrative reasons and awarded the company an $11,632,110 option for continue providing enterprise operations and sustainment support worldwide, the Defense Department said. The Chantilly, Va-based company will perform
Products, Services, and Solutions
CounterTack Awarded Patent For Next-Generation Cyberattack Detection Technology(Dark Reading) CounterTack's approach enables data collection and intelligence gathering from deep within operating systems. CounterTack, the industry's first and only provider of in-progress cyber attack intelligence and response solutions, today announced that the U.S. Patent and Trademark office has allowed the patent application for its unique cyber attack detection technology, which was developed at the company's research and development center in Santa Monica, California
Security software showdown! 9 antivirus suites empirically tested(IT World) If you're like a lot of people, when it comes time to renew your security software, you may ask yourself, "Do I really need to upgrade to the latest version?" The answer is yes. Keeping up-to-date is generally a good idea, as new threats surface constantly. And if you value mobile security or use a social network, this year's crop of security suites is worth paying attention to
Facebook's Graph Search Is the Future of Social Recruiting(ERE) You've probably heard the hype about Facebook's new search utility, which it calls Graph Search. Unveiled just a couples weeks ago, it's already being described as everything from a LinkedIn killer to a privacy killer, and a recruiter's new best friend. For every one of those you can find an article -- or 100 -- that says the opposite
HP launches security service for after the horse has bolted(The Register) HP is getting into the lucrative security remediation sector with a consultancy service designed to minimize the effects of a successful attack, collect evidence for prosecution, and help recover what has been stolen or corrupted."It's nearly impossible for organizations to prevent a breach, but they can take control of how they respond," said Andrzej Kawalec, CTO of enterprise security services at HP in a statement."Combining HP's portfolio of services and software, the HP Breach Management Solution arms clients with the tools and resources to monitor, manage and respond to breaches head on, minimizing their impact while readying for the next attack
Google offers $3.14159 MILLION in prizes for hacking Chrome OS(The Register) Google has announced the target for its third Pwnium hacking contest, to be held at this year's CanSecWest security conference, with $3. 14159m in prize money for the researchers who can successfully crack its Chrome OS operating system. And yes, that figure is derived from the first six digits of . The contest, to be held on March 7, will see hackers trying to subvert the operating system on a base specification Samsung 550 Chromebook running Wi-Fi
How LinkedIn could be a serious threat to Bloomberg(Quartz) Have you ever used a Bloomberg terminal? If the answer is no, you have to understand one thing. It's amazing. The terminal is such a remarkable tool with nearly limitless possibilities. But, to quote a Bloomberg sales person, "if you want to drive a Porsche, you have to pay Porsche prices." And that's the hook. Bloomberg is not only market leading in quality, but it's also market leading in pricing. As in, it's very, very expensive
AV developer Avast starts bug bounty program(Help Net Security) Avast, the Prague-based maker of the popular eponymous AV software, has announced the introduction of a bug bounty program. Rewards are offered only for security-related bugs in the software
Encrypted video and texting for iPhone and iPad(Help Net Security) ZipaClip is a secure mobile video and texting application for iOS devices. The free version of ZipaClip allows users to send and receive fully-encrypted texts and video clips up to 30 seconds in length
Big goals for Big Data(CSO) Many organizations are still in the dark when it comes to using big data to improve security. But for Zions Bancorporation, it's old ha
Combatting Advanced Threats in 2013 Through Basics(Dark Reading) A large majority of successful attacks depend on organizations failures to maintain age-old security fundamentals, undermining other investments. Tom Parker explores why you should focus on fixing the problems of a past generation, before focusing on the next
Common Sense Guide to Mitigating Insider Threats(CERT (Carnegie Mellon Software Engineering Institute)) Cybersecurity Analyst for the CERT Program, with the twelfth of 19 blog posts that describe the best practices fully documented in the fourth edition of the Common Sense Guide to Mitigating Insider Threats. The CERT Program announced the public release of the fourth edition of the Common Sense Guide to Mitigating Insider Threats on December 12, 2012. The guide describes 19 practices that organizations should implement across the enterprise to mitigate (prevent, detect, and respond to) insider threats, as well as case studies of organizations that failed to do so
'Fair data' logo sets ethical standards for collecting consumer data(TechWorld) Consumers worried about how their personal data might be misused by private and public sector organisations can from today look for a new Fair Data logo to calm their worries, the Market Research Society (MRS) has announced. Launched on Data Privacy Day, 28 January, with the enthusiastic endorsement of the Information Commissioner, the MRS claims its 10-point set of principles [PDF] will set a new benchmark for the ethical handling of data
Stop treating your phone like a pocket watch(Quartz) We have been so distracted by all of the features of smart phones that we failed to notice the absurdity of the way we use them. If anything, usage of the quintessential 21st century technology is more reminiscent of a distinctively obsolete 19th century device: the pocket watch. Perhaps, not for much longer
The EU-funded plan to stick a 'flag this as terrorism' button in your browser(Ars Technica) CleanIT has some odd ideas on stopping online extremism. Under CleanIT's rules, the Irish ultra-nationalist "32 County Sovereignty Movement" site (an alias of the terrorist group the "Real IRA") couldn't be touched, as it's hosted in the US. Terrorists, beware! The European Union-funded "CleanIT" project has just wrapped up its work, aimed at preventing online terrorist propaganda and recruitment within Europe. In the run-up to the final CleanIT conference in Brussels on Wednesday, the group published its final report, (PDF) a 30-page document outlining its final recommendations. This document and the conference are the culmination of a two-year, ?400,000 ($428,000) study grant from the EU's Prevention of and Fight against Crime Programme. (Ars editor Cyrus Farivar will be moderating this conference, and his travel and lodging have been paid for out of CleanIT's budget.)
Hague signs UK up to global Cyber Resilience Partnership(Computing) The UK has joined 25 countries in committing to a set of principles intended, they claim, to make digital networks more secure and resilient. Foreign secretary William Hague signed the World Economic Forum's Partnering for Cyber Resilience initiative, which means that the UK will join more than 70 companies and other government bodies across 15 sectors in practising good "cyber hygiene" - easy-to-follow steps intended to reduce the risks to their organisations and customers. The principles include:Ensuring that the organisation recognises the "interdependent nature of our hyperconnected world" and its own role in contributing to a secure shared digital environment; Management recognition of its leadership responsibilities in making cyber resilience a priority; Organisational recognition of the importance of integrating cyber risk management within its other risk practices; and, For the organisation to encourage suppliers to adopt these principles and guidelines, too
China admits cyber warfare unit in Peoples Liberation Army(Hack Read) The Chinese government for the first time admitted that it has highly skilled group of hackers in its army; supported, equipped and trained by the government officials. Channel4 reports that an intelligence source inside the army shared the secret information which confirms the presence of hackers in Chinese army that are will be used at the time of cyber warfare. The group of elite hackers in the Chinas Peoples Liberation Army is known as cyber blue team that will be working as a defensive wall against any kind of cyber attack against the country
Privacy Crusaders - Their Own Worst Enemies(Infosec Island) Why nihilistic philosophies of patient-privacy advocates are bad news for patient-privacy. If the electronic health records industry has a nemesis, it's Deborah Peel, the founder of Patient Privacy Rights. At a time when doctors and hospitals are digitizing their paper medical records as mandated by the government, Peel, a psychiatrist, has been the most vocal agitator against loss of patient privacy. In Peel's world, malefic forces in the U.S. government and corporations prey on unsuspecting patients by rummaging through their history/physical. "Once your information is released, it's like a sex tape that lives in perpetuity in cyberspace," she once told The Dallas Morning News
Berners-Lee says snoop law could see spies blackmail soldiers(The Register) World Wide Web inventor Sir Tim Berners-Lee has declared government collection of data on citizens web surfing and telephony activities a very bad idea after outlining a scenario in which he feels national security could be compromised by caches of armed forces' members online activities. Speaking in Sydney at the launch of Australia's new Digital Productivity and Services Flagship, a think tank designed to boost productivity through cunning use of technology, Berners-Lee suggested that if governments are allowed to track citizen's use of phones and the internet, foreign spies will find it an irresistible hacking target
World Trade Organization approves new site full of 'pirated' material from US(Ars Technica) America's ongoing dispute with Antigua and Barbuda created bizarre situation. The United States government has been known to respond rather aggressively towards individuals and foreign entities it believes are violating American intellectual property law. (Ask Kim Dotcom.) But relatively few countries have responded by seeking (and receiving) international authorization to directly, openly flaunt American copyright
Court: Government Need Not Justify Warrantless Data Requests(Threatpost) A Virginia appeals court on Friday denied a right-to-access order filed by the Electronic Frontier Foundation and the American Civil Liberties Union on behalf of Icelandic parliamentarian Birgitta Jonsdottir and computer security researchers Jacob Appelbaum and Rop Gonggrijp. The denial confirms a lower court's ruling that neither those individuals nor the public has the right to see the documents a court uses to justify its warrantless acquisition of information. The right-to-access order sought to obtain an unknown number of documents obtained from Twitter that government prosecutors submitted to the courts during the investigation of Wikileaks
17 Chinese held in Philippines for Cyber-crime(Hack Read) The Philippine police last week arrested a group of 15 Chinese women and 2 men. This group was arrested on behalf of a fraudulent activity they carried out over the internet successfully. After week of thorough investigations the police declared this group criminals after which the Chinese police was after
Twitter transparency report shows government data requests on the rise(Computer World) Twitter has released new numbers showing that the social network complied with government data requests 69 percent of the time in the U.S., as government requests for user information worldwide continue to rise. The total number of information requests increased to 1,009 during the second half of 2012, up from 849 during the first half of the year, according to Twitter's transparency report. Government requests for content removal also increased to 42 from just six."All signs suggest that these government inquiries will continue to climb into the foreseeable future," Twitter said
FTC Online Privacy Protection Campaign Kicks Into High Gear(CIO) As the Federal Trade Commission continues its work in evaluating the privacy practices of businesses in the Internet age, agency staffers are focusing not only on what personal information companies are collecting and how they're using it, but also on the security measures in place to keep that data out of the hands of would-be identity thieves and other bad actors. Speaking here at an event to mark Data Privacy Day, an annual initiative led by the nonprofit National Cyber Security Alliance, Commissioner Maureen Ohlhausen stressed that the FTC's privacy work is closely coupled with its consideration of industry security practices
FBI turns up heat in hunt for Stuxnet leakers(ZDNet) US federal investigators are applying pressure on senior government officials suspected of leaking details about the US government's role in developing the Stuxnet malware, according to a report by the Washington Post. The FBI and US prosecutors are analysing email accounts and phone records as well as interviewing current and former officials in a search to find links to journalists, according to the report on Saturday. The investigation is likely to centre on a small circle of senior officials, given the highly classified nature of the cyberattacks against Iran, details of which were published in a report by The New York Times in June 2012
Google faces UK legal action over secret Safari tracking claims(IT Pro) UK law firm enlisted by Apple users who claim search giant used web browser to track their online activities. Web giant Google could be subject to the UKs largest ever group legal challenge, following claims the firm has been snooping on Apple users web browsing habits. The company has been accused of circumnavigating Apples security controls to monitor the online habits of Apple users, who access the web using the Safari browser
For a complete running list of events, please visit the Event Tracker on the CyberWire website.
tmforum Big Data Analytics Summit(Amsterdam, Netherlands, January 29 - 30, 2012) Bringing together leading service providers, market analysts and all of the big names in Big Data, this forward-looking, education-packed two-day Summit combines keynote perspectives, case studies, debates,...
North American ICS & SCADA Summit(Lake Buena Vista, Florida, USA, February 6 - 15, 2013) The Summit brings together the program managers, control systems engineers, IT security professionals and critical infrastructure protection specialists from asset owning and operating organizations along...
ATMiA US Conference 2013(Scottsdale, Arizona, US, February 19 - 21, 2013) A conference devoted to the design of ATMs, and the future of the ATM industry.
#BSidesBOS(Cambridge, Massachusetts, USA, February 23, 2013) Each BSides is a community-driven framework for building events for and by information security community members. The goal is to expand the spectrum of conversation beyond the traditional confines of...
RSA USA 2013(San Francisco, California, USA, February 25 - March 1, 2013) RSA Conference continually evolves program offerings to meet the ever-changing needs of our delegates in the dynamic infosec industry.
Nullcon Goa 2013(Bogmallo Beach Resort, Goa, India, February 26 - March 2, 2013) An international information security conference that will feature speakers and training. Topics include security and politics, vulnerability elimination, Android hacking, SCADA and smart grid penetration...
TechMentor Orlando 2013(Orland, Florida, USA, March 4 - 8, 2013) Celebrating 15 years of educational events for the IT community, TechMentor is returning to Orlando, Florida, March 4-8, for 5 days of information-packed sessions and workshops. Surrounded by your fellow...
Business Insurance Risk Management Summit(New York City, New York, USA, March 5 - 6, 2013) The annual Risk Management Summit, now in it its fourth year, provides attendees with focused insight via specific, timely general sessions and strategic, thought-provoking discussions with peers and industry...
CanSecWest 2013(Vancouver, British Columbia, Canada, March 6 - 8, 2013) CanSecWest, the world's most advanced conference focusing on applied digital security, is about bringing the industry luminaries together in a relaxed environment which promotes collaboration and social...
e-Crime Congress 2013(London, England, March 12 - 13, 2013) The e-Crime Congress is designed to meet the needs of key stakeholders and decision makers who are responsible for designing and coordinating information security and risk management strategy, safeguarding...
CTIN Digital Forensics Conference(Seattle, Washington, USA, March 13 - 15, 2013) Speakers include experts and published authors in the field of digital forensics and cybersecurity. Topics include; Mobile Device Forensics, Internet Forensics, Physical Memory Analysis, Open Source Tools,...
IT Security Entrepreneurs' Forum (ITSEF 2013)(Palo Alto, California, USA, March 19 - 20, 2013) Supported by the U.S. Department of Homeland Security, Office of Science and Technology, ITSEF 2013 aims to connect the ecosystem of the entrepreneur: industry, government, and academia. The conference...
The Future of Cyber Security 2013(London, England, UK, March 21, 2013) Cyber Security and the Citizen 2013 is a one-day conference and exhibition for senior decision-makers of central and local government organisations, NGOs and major private sector enterprises.
CSO40(Braselton, Georgia, USA, April 2 - 3, 2013) The CSO40 Security Confab + Awards will honor and share the critical viewpoints of today's leading CSOs, CISOs and security executives at the nation's leading CSO thought leadership conference.
Cloud Connect Silicon Valley(Santa Clara, California, USA, April 2 - 5, 2013) Cloud Connect returns to Silicon Valley, April 2-5, 2013, for four days of lectures, panels, tutorials and roundtable discussions on a comprehensive selection of cloud topics taught by leading industry...
Cyber 1.3(, January 1, 1970) Maj. Gen. Suzanne Vautrinot, USAF, commander, 24th Air Force, and commander, Air Force Network Operations, will discuss the global strategic implications that relate to the cyber domain at the Space Foundation...
INFILTRATE 2013(Miami, Florida, USA, April 11 - 12, 2013) INFILTRATE is a deep technical conference that focuses entirely on offensive security issues. Researchers focused on the latest technical issues will demonstrate techniques that you cannot find elsewhere.
InfoSec World Conference & Expo 2013(Orlando, Florida, USA, April 15 - 17, 2013) With the primary objective of providing top-notch education to all levels of information security and IT auditing professionals, InfoSec World delivers practical sessions that give you the tools to strengthen...
Infosec Southwest 2013(Austin, Texas, USA, April 19 - 21, 2013) InfoSec Southwest is intended to be a general security and hacking conference with no specific industry or topical focus. As such, nearly all topics (other than vendor pitches) are fair game and the attending...
Consumerization of IT in the Enterprise Conference and Expo(San Francisco, California, USA, June 2 - 4, 2013) From smartphones to mobile apps, social software and 4G networks, the wave of innovation in the consumer space is transforming the way companies do business, both inside and outside of the enterprise.
25th Annual FIRST Conference(Bangkok, Thailand, June 16 - 21, 2013) The annual FIRST conference provides a setting for conference participants to attend a wide range of presentations delivered by leading experts in both the CSIRT field and from the global security community.
SECRYPT 2013(Reykjavik, Iceland, July 29 - 31, 2013) The 10th International Conference on Security and Cryptography (SECRYPT 2013) will take place from 29 to 31 July 2013 in Reykjavik, Iceland…The conference will focus on information systems and network...
SPONSOR & SUPPORT
Grow your brand and reach new customers.
Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.
Be a part of the CyberWire story.
People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.