Two more Java 6 and 7 zero-days were being exploited in the wild late last week. Oracle will fix Java 7 soon, but observers consider a patch for Java 6 unlikely.
Evernote has been attacked, and some 50 million passwords were reset after usernames, email addresses, and encrypted passwords were stolen. Cloudflare succumbed briefly this weekend to a distributed denial-of-service attack on one of its customers.
Cyber riots affect sites in New Zealand and the Philippines. The Australian Tax Office is found to store passwords in plain text.
Dell SecureWorks' sinkholes identify more Chinese espionage. The mix, opportunistic or not, of espionage with traditional organized crime causes US authorities to puzzle over the motivation of particular attacks.
Romania thinks it knows which foreign government is behind MiniDuke, but it's playing its findings close to the chest.
Anonymous is active again in various protests, notably against the Federal prosecutor who pursued Aaron Swartz. ZDNet foresees hacktivism becoming easier, more diffuse, and more pervasive—"Anonymous has become the Hello Kitty of hacktivism"—and says that Anonymous' goals have become so broad that anyone can become a target.
US Federal budget sequestration is expected to slow payments to contractors, but also to hasten migration to the cloud as a cost-cutting measure. Cyber Command is not expected to be immune to short-term budget pain. Raytheon joins Lockheed Martin in the US Department of Homeland Security's Enhanced Cybersecurity Services stable. HP plans to lay off another 15,000 workers.
Today's issue includes events affecting Australia, China, Iran, Israel, Japan, Malaysia, Morocco, NATO, New Zealand, Oman, Philippines, Romania, Sri Lanka, United States..
Cyber Attacks, Threats, and Vulnerabilities
Zero-day exploit hits Java 7 and end-of-life Java 6(CSO) Time to disable Java browser plugins until Oracle releases a patch, but Java 6 users should not hold their breath. Just two weeks after Oracle released its latest critical patch updates, attackers have found a previously unseen flaw in Java 6 and 7 to compromise computers.Researchers at security firms FireEye and CyberESI last week discovered the new Java attack, which successfully exploits flaws in Java 6 Update 41 and Java 7 Update 15 -- the most recent versions of Java that Oracle released on February 19
Zero Day Java Vulnerability Allows McRat Trojan Infections(InformationWeek) Security experts urge users of latest versions of Java 6 and 7 to disable Java in their browsers until Oracle releases a patch. A newly discovered zero-day vulnerability in the most recent versions of Java 6 and Java 7 is being actively exploited by attackers to install malicious software on vulnerable PCs
CloudFlare security service goes down after router failure(CNet) The hour-long outage occurred when the Web security service detected a DDoS attack against one of its customers and tried to defend against it. Web security service CloudFlare was offline for about an hour this morning due to a systemwide failure of its edge routers. The outage, which began around 1:47 a.m
Hackers from Malaysia, Philippines go on cyber war!(theborneopost) The conflict in Lahad Datu between the followers of Sultan of Sulu and Malaysian forces has spilled over to the web. Several websites of Philippine local governments have been hacked by the so-called Anonymous Malaysia with the message: Well, its time for us to PEACE and stop attacking each other. To end up this way, this is our last defacement and from now on none of us will step or touch ur (sic) country site and none of you are able to touch our country site
The taxpayer-funded plain text password store(ZDNet) There are so many sites that store passwords in the clear that normally when I come across one, I make a mental note to never trust it with anything too important, or to find a similar service that actually does care about security. However, as Alex North has recently discovered, when it's your own government's taxation office and it somehow believes that it's following best practice, a seething ball of rage slowly worked its way up from my spleen. The Australian Taxation Office (ATO) has been storing passwords in plain text
Scammers use Google glasses as lure(Help Net Security) The great interest that the upcoming release of Google glasses has generated in the public is being actively exploited by cyber scammers, warns Trend Micro. Counting on the fact that users will be googling for information about them and ways to procure them, they have poisoned the search results for "free Google glasses" with links that take to survey scams
Argentina's Ministry of Education for the La Rioja Province Hacked(Softpedia) An Anonymous hacker using the online moniker Libero has breached and defaced the website of Argentinas Ministry of Education for the La Rioja province (educacionlarioja. gov. ar), E Hacking News informs. In addition, he has defaced the main site and several subdomains of the Municipality of Puerto Madryn (madryn
Sinkholes reveal more Chinese-hacked biz - and piggybacking crims(The Register) Researchers have identified yet more high-profile organisations attacked by spying Chinese hackers after seizing hold of the miscreants' command-and-control servers. Dell SecureWorks Counter Threat Unit (CTU) said that its tactic of "sinkholing" spyware-controlled systems is great for identifying custom malware and warning victims. It typically involves taking over the criminals' domain names to trick their armies of malware-infected computers - known as botnets - into communicating with the researchers' servers
As Hacking Against U.S. Rises, Experts Try To Pin Down Motive(New York Times) American intelligence officials believe that the greater danger to the nations infrastructure may not even be China, but Iran, because of its avowal to retaliate for the Stuxnet virus created by the United States and Israel and unleashed on one of its nuclear sites. But for now, these officials say, that threat is limited by gaps in Iranian technical skills
Asia on the Front Line of China's Cybersecurity Threat(RFA) An American computer security firm that has traced a series of cyberattacks across the globe to the Chinese military says Asia may be more vulnerable than previously thought to Beijing's economic espionage operations, even as experts see the region beefing up its cybercapabilities. Mandiant Corp. last week published the extraordinary details of hacking attacks it believes were masterminded by a unit of the People's Liberation Army to steal commercial secrets from at least 141 entities worldwide, but mostly inside the U.S., over the last seven years
Unmasked, but Unfazed—Chinese Hacking Group Is Still Active(Technology Review) The computer hacking group accused last week of being part of a specific unit of the Chinese military is apparently unfazed by the public attention triggered by a detailed report on its activities published by the security firm Mandiant. Another
Romania believes rival nation behind 'MiniDuke' cyber attack(Yahoo News) Romania believes another state was behind the "MiniDuke" cyber attack that hit its national security institutions as well as NATO and other European countries, its SRI secret service said on Friday. It did not say which foreign power it suspected
OpAngel: Anonymous to Protest in Boston, Demands the Resignation of Carmen Ortiz(Softpedia) The hacking part of OpAngel, the campaign initiated after the death of Reddit co-founder Aaron Swartz, has become OpLastResort. However, OpAngel continues with live protests. Anonymous calls on its supporters to protest against the treatment of Aaron Swartz by the US Department of Justice during his prosecution, on March 4, at 3PM ET, in front of Bostons Federal Courthouse
Hackers use corporate attacks as staging grounds for other cyber assaults(CSO) "There may be law enforcement watching it," said Charles Shugg, retired Brigadier General of the Air Force who once headed the U.S. Air Force Cyber Command, and spoke yesterday on a panel at the RSA Conference on the topic of how far IT managers can go to "hackback" against network attackers they happen to detect. But you might be stepping into something bigger than you know, because "an undercover agent may witness crimes taking place and not stop them in hopes of getting them," said Shugg
Security Patches, Mitigations, and Software Updates
Apple bans outdated Adobe Flash plugins from Safari(Naked Security) Last week, Apple showed that it is getting more serious about security by getting strict about the version of Flash you're allowed to use in Safari. Paul Ducklin explains the what and the why
Firms see smartphones as weak link in cybersecurity(Eur Activ) The explosion in smartphone use is leaving businesses vulnerable to cyberattacks since almost half of their employees' mobile phones can become a target, according to new research. The 2012 Cyber Security Risk Report published by Hewlett-Packard at the recent RSA security conference in San Francisco found that mobile phone vulnerabilities rose significantly (68%) from 2011 to 2012, mirroring the growth of mobile applications and the use of smartphones. Of the mobile applications tested by HP, 48% of them were found to be vulnerable to unauthorised access
Beware! Anonymous has become the Hello Kitty of hacktivism(ZDNet) If you think hacktivists are a problem now, just wait. The tools are becoming increasingly easy to use, and the hacktivists increasingly stupid making everyone a target. Apparently, last week's hack of an Australian Broadcasting Corporation (ABC) website wasn't an "official" operation by Anonymous inasmuch as anything about that un-organisation can be said to be official but just a lone hacktivist jumping on the bandwagon
Forrester: Majority of 'private clouds' aren't clouds(FierceCIO: TechWatch) A new report by Forrester Research highlighted how up to 70 percent of what are being touted as private clouds are actually not so private. Indeed, for users who have ever wondered about this, a highly virtualized environment where business users can gain access to virtual machines should not be considered a private cloud
Pentagon Cuts Hit Accounts That Pay Lockheed To Raytheon(Bloomberg) The Pentagon has offered little guidance to contractors that may be hurt by $46 billion in defense spending cutbacks over the next seven months, even as a budget document showed the effect on procurement accounts that pay companies from Lockheed Martin Corp to Raytheon Co
Rhetoric Cools On Near-Term Pain Of Cuts(Wall Street Journal) After warning that across-the-board spending cuts would have catastrophic effects, White House officials are trying to play down fears that people will suffer hardships right away, instead preparing them for a fight that won't be quickly resolved
Parties Seek To Avoid Shutdown(Washington Post) It would provide funding through the end of the fiscal year on Sept. 30, allowing new flexibility to the Pentagon to manage the $40 billion hit the military took Friday but otherwise locking in the sequester's lower spending levels
Sequestration Positions Cyber Command for a Fall(Nextgov) Mandatory, across-the-board decreases in funding will spare the salaries of uniformed Cyber Command members, but many of those personnel will be focused on sequester planning rather than operations. Meanwhile, their civilian peers face furloughs
Asia Pacific banks step up risk IT spending(Finextra) Nearly two thirds of Asia Pacific banks expect to see their risk management technology budgets grow this year, according to research from IDC Financial Insights. Of 40 chief risk officers and their deputies, from banks in 11 countries, 62% say that their IT budget will rise this year, with more than a third projecting growth of at least seven per cent. Another third say their budgets will be flat, with just 2
Oman summit to focus on cyber strategies(Trade Arabia) The two-day Cyber Defence Summit-Mena set to begin in Oman tomorrow, will discuss…providers like F-Secure, BAE Systems Detica, Cassidian and Commendo
Raytheon collaborates with DHS to bolster cyber resiliency for nation's most critical infrastructure(MarketWatch) Raytheon RTN +0.18% is collaborating with the Department of Homeland Security (DHS) to operate as a commercial service provider under the recently expanded Enhanced Cybersecurity Services (ECS) program outlined in President Obama's Executive Order on Improving Critical Infrastructure Cybersecurity. ECS is a voluntary information sharing program that assists critical infrastructure owners and operators as they improve the protection of their systems from unauthorized access, exploitation or data exfiltration
Booz Allen Wins Two Contracts Under an $11B DHS IDIQ(GovConWire) Booz Allen Hamilton [NYSE: BAH] has won two, five-year contracts to provide acquisition life cycle services to the Department of Homeland Security, according to a company statement. The contracts, awarded on November 30, 2012 and February 15, 2013, are part of DHS' $11 billion technical, acquisition and business support services contract vehicle
Why Procera Networks Shares Dropped 30 percent(Motley Fool) Although we don't believe in timing the market or panicking over market movements, we do like to keep an eye on big changes -- just in case they're material to our investing thesis. What: Shares of Procera Networks (NASDAQ: PKT ) dropped today by as
SAIC to name technology business Leidos(Washington Post) John Jumper, SAIC's current chief executive, is to head the business. Tony Moraco, who heads SAIC's intelligence, surveillance and reconnaissance group
The KEYW Holding Corporation - Shareholder/Analyst Call(Seeking Alpha) Leonard E. Moodispaw - Founder, Chairman of The Board of Directors, Chief Executive Officer, President and Chairman of Ethics Committee. Good. All right. We're starting out with the usual disclaimer, and those who heard me do this before -- is Jonathan here? Our SEC counsel is around someplace. He always faints when I do this. But as I admit, I'm a lawyer, so my line is, you shouldn't believe anything I say anyhow, therefore, I don't have to read the disclaimer to you. If anybody objects to that, I can read the disclaimer to you
Japanese govt: Use operator-run app stores, not Google Play (The Register) Google's security credentials have taken another hit after the Japanese government warned local Android users to download their apps from third party operator-run stores, and not Google's own Play, following the discovery of a prolific info-stealing app on the official site. The Tokyo-based Information Technology Promotion Agency (IPA) alerted domestic Android users last Friday that a rogue app named sexy porn model wallpaper had already been downloaded 500,000 times from Google Play before being spotted and removed
Bitdefender seeks beta testers to try out antivirus software(Telecompaper) Antivirus services provider Bitdefender is seeking beta testers worldwide to try out the latest generation of its antivirus software and win protection for a year for productive feedback. The New Bitdefender blends technologies and new concepts such as
Thales Datacryptor Recognized as Best Encryption Solution in Info Security Products Guide 2013 Global Excellence Awards(IT News Online) Thales, leader in information systems and communications security, announces that Info Security Products Guide, the industry's leading information security research and advisory guide, has named the Thales Datacryptor line of network encryption solutions Gold Winner of the 2013 Global Excellence Awards in the Best Encryption category. The prestigious global excellence awards recognize Thales as a global leader in the security industry with advanced, ground-breaking products and solutions
F-Secure launches one-stop, multi-device security(Help Net Security) A one-stop-shop for multi-device security is here, answering to the growing need for converged security across multiple devices. F-Secure's Safe Avenue allows consumers to easily manage the security
Portable USB 3.0 SSD With Suite B hardware encryption(Help Net Security) At RSA Conference 2013 in San Francisco, Spyrus announced PocketVault 3X, a portable USB 3.0 Encrypting SSD featuring the same high-assurance hardware encrypting security designed into their Windows
Dell releases privileged access suite for Unix(Help Net Security) At RSA Conference 2013 in San Francisco, Dell announced the release of Quest One Privileged Access Suite for Unix, which combines Active Directory bridge and root delegation technologies with a single
Why the upcoming release of Windows Blue matters(FierceCIO: TechWatch) We reported last week about rumors surrounding Microsoft's next version of the Windows operating system, which will be known as "Blue." At least one source claims it will be free, and with a release date pegged to later this year. This appears to corroborate reports from last year that Microsoft (NASDAQ: MSFT) is working on annual updates for Windows
A Vulnerability Disclosure Game Changer(Dark Reading) Two new ISO standards will push third-party developers, online service providers and even hardware vendors to stop ignoring vulnerability disclosures
Sharpening Endpoint Security(Dark Reading) Some tips on how to protect the most vulnerable parts of your IT infrastructure: the endpoints and the unpredictable users who control them
RSA: Do You Need Mobile Anti-Virus?(eSecurity Planet) Top hackers debate mobile security at the RSA 2013 security conference. Mobile security is a top concern for many in the modern era of smartphone pervasiveness. Yet according to a panel of mobile security experts at the RSA conference this week, a lot of the
One woman's escape from a hacked email account(Daily Herald) Kelly Brown, owner of Four Seasons Redesign in Sleepy Hollow, awoke Monday to find her Yahoo account for her business had been hacked. Her contact list was gone and so was much of her mail from that day. The culprit then masqueraded as "Kelly Brown," used a couple of fake email addresses and dressed them up with her company logo
Design and Innovation
Security Tools Show Many Dots, Few Patterns(InformationWeek) Today's security software wastes valuable time by delivering data dumps, rather than focusing on trends. But you can create your own visualizations. "What do you want to know?" Great question, right? Then why do few security products -- or rather, the developers, product managers, and vendors who build them -- ask that question of their customers? Instead, your firewall, intrusion detection system, antivirus management console, LAN manager, or other security tool report tells you about its day: The quantity of events it's detected, whether antivirus is activated, which country seems to be lobbing the most attacks your way
The top 10 unsolved ciphertexts(Naked Security) For over 12 centuries an intense battle has been fought between the code-makers and the code-breakers. But despite decades of cryptanalysis, there are many ciphertexts which have gone unsolved, leaving us in mystery. Here's our top ten list, can you solve them?
Legislation, Policy, and Regulation
Australia joins convention on cybercrime treaty(ZDNet) Australia has now officially joined 38 other nations as part of an international cybercrime treaty designed to assist international collaboration against online crimes. Last year, Australia passed the Cybercrime Legislation Amendment Bill 2011 as part of the prerequisites to become a party to the Council of Europe Convention on Cybercrime. While extending the scope of Commonwealth-related computer offences, it also, controversially, required internet service providers (ISPs) to store customer data on persons deemed under suspicion by law-enforcement agencies
ITA launches the first Regional Cyber Security Center(AME info) The Information Technology Authority (ITA), represented by the Oman Computer Emergency Readiness Team (OCERT), launched the Regional Cyber Security Center yesterday at ITA's headquarters located at KOM3 in the Knowledge Oasis Muscat. OCERT has been designated to host the Center, as per an agreement signed in December 2012, between ITA and the International Telecommunication Union (ITU) and the Organization of IMPACT to be the first ITU Regional Cyber Security Center. The launch ceremony was held under the auspices of H.E. Dr. Ali bin Masoud Al Sunaidy, Minister of Commerce & Industry and Chairman of the Information Technology Authority, along with the presence of some ITA Board Members, Dr. Salim Sultan Al Ruzaiqi, CEO of ITA, Mr. Houlin Zhao, Deputy Secretary-General of the International Telecommunication Union (ITU), and Datuk Mohammed Noor Amin, Chairman of IMPACT Organization
Cyber war crucial to edge in regional arms race(AFR) Australia risks losing a regional arms race unless closer links can be forged between the government and the defence industry on countering cyber attacks, the Australian Industry Group Defence Council warns. The councils submission to the federal governments 2013 defence white paper warns Australia will struggle to win a regional arms race unless the Gillard government pursues policies to align defence and industry. Given the more rapid acquisition of advanced military capabilities in our region of primary strategic concern, maintaining a capability edge is going to become much more demanding, it says
IDF forms new force to combat cyber warfare(IDF forms new force to combat cyber warfare) The Israel Defense Forces has defined cyber warfare as the fifth realm of warfare, alongsideland, sea, air and space. The IDF has established a command dedicated to cyber warfare that brings together personnel from the Intelligence Branch and the Teleprocessing Branch to ward off cyber attacks
US retaliation strategy against hackers(SecurityAffairs) The year started very difficult for the U.S. government, his networks have been constantly hit by hackers that for different reasons have tried to steal sensitive information and intelligence secrets. The principal menaces against US come from state-sponsored hackers and hacktivists, in the last months we have read of many cyber attacks, mainly for cyber espionage purpose, that involved also US infrastructures and offices. The US governments is facing with one of the most aggressive cyber campaign against its cyber resources, and exactly as any other countries is working to definition of a series of countermeasure to mitigate the risks related cyber threats
Newspapers go all-in for copyright fight against clipping service(Ars Technica) Is Meltwater News a search engine or a copycat news service? A copyright battle between The Associated Press and an online news-clipping service is reaching a climax, and the case could have significant implications for fair use. AP sued Meltwater Group last year, arguing the "reputation management" company had a "parasitic business model" that violated copyright. Meltwater is defending the case, arguing that it is merely a search engine
Nearly Every NYC Crime Involves Cyber, Says Manhattan DA(The Epoch Times) Think twice next time you need money from a curbside ATM machine, or decide to pay for a meal with a credit card. Prosecutions for cybercrime and identity theft in Manhattan have increased by 50 percent in the last five years, and criminals are rigging ATM machines and scanning your credit cards when youre not looking. Cybercrime is the fastest growing crime trend in New York, and around the country, said Manhattan district attorney Cyrus Vance, during a cybercrime symposium at Pace University on Feb. 28
For a complete running list of events, please visit the Event Tracker on the CyberWire website.
TechMentor Orlando 2013(Orland, Florida, USA, March 4 - 8, 2013) Celebrating 15 years of educational events for the IT community, TechMentor is returning to Orlando, Florida, March 4-8, for 5 days of information-packed sessions and workshops. Surrounded by your fellow...
IHS CERAWeek 2013(Houston, Texas, USA, March 4 - 8, 2013) IHS CERAWeek 2013 will offer new insight on the energy future -- and on the strategic and investment responses by producers, consumers and policy-makers. What are the changes ahead in the competitive...
Business Insurance Risk Management Summit(New York City, New York, USA, March 5 - 6, 2013) The annual Risk Management Summit, now in it its fourth year, provides attendees with focused insight via specific, timely general sessions and strategic, thought-provoking discussions with peers and industry...
CanSecWest 2013(Vancouver, British Columbia, Canada, March 6 - 8, 2013) CanSecWest, the world's most advanced conference focusing on applied digital security, is about bringing the industry luminaries together in a relaxed environment which promotes collaboration and social...
e-Crime Congress 2013(London, England, March 12 - 13, 2013) The e-Crime Congress is designed to meet the needs of key stakeholders and decision makers who are responsible for designing and coordinating information security and risk management strategy, safeguarding...
CTIN Digital Forensics Conference(Seattle, Washington, USA, March 13 - 15, 2013) Speakers include experts and published authors in the field of digital forensics and cybersecurity. Topics include; Mobile Device Forensics, Internet Forensics, Physical Memory Analysis, Open Source Tools,...
Google and University of Maryland Cybersecurity Seminar(College Park, Maryland, USA, March 14, 2013) Dr. Ari Juels, Chief Scientist of RSA, The Security Division of EMC, and Director of RSA Laboratories, will discuss "Aggregation and Distribution in Cloud Security." His talk will feature information...
Department of Homeland Security 6th Annual Industry Day(Washington, DC, USA, March 18, 2013) The Department of Homeland Security (DHS) will be hosting its 6th Annual Industry Day to provide advanced acquisition planning information to industry. DHS Industry Day will consist of two sessions, the...
IT Security Entrepreneurs' Forum (ITSEF 2013)(Palo Alto, California, USA, March 19 - 20, 2013) Supported by the U.S. Department of Homeland Security, Office of Science and Technology, ITSEF 2013 aims to connect the ecosystem of the entrepreneur: industry, government, and academia. The conference...
The Future of Cyber Security 2013(London, England, UK, March 21, 2013) Cyber Security and the Citizen 2013 is a one-day conference and exhibition for senior decision-makers of central and local government organisations, NGOs and major private sector enterprises.
SANS Cyber Threat Intelligence Summit(Washington, DC, USA, March 22, 2013) Conventional network defense tools such as intrusion detection systems and anti-virus focus on the vulnerability component of risk, and traditional incident response methodology presupposes a successful...
AFCEA Belvoir Industry Days 2013(National Harbor, Maryland, USA, April 2 - 3, 2013) The purpose of this event is to inform the IT community about the recent successes and the forward-thinking opportunities that the Department of Defense and the Department of the Army have developed.
CSO40(Braselton, Georgia, USA, April 2 - 3, 2013) The CSO40 Security Confab + Awards will honor and share the critical viewpoints of today's leading CSOs, CISOs and security executives at the nation's leading CSO thought leadership conference.
Cloud Connect Silicon Valley(Santa Clara, California, USA, April 2 - 5, 2013) Cloud Connect returns to Silicon Valley, April 2-5, 2013, for four days of lectures, panels, tutorials and roundtable discussions on a comprehensive selection of cloud topics taught by leading industry...
Cyber 1.3(, January 1, 1970) Maj. Gen. Suzanne Vautrinot, USAF, commander, 24th Air Force, and commander, Air Force Network Operations, will discuss the global strategic implications that relate to the cyber domain at the Space Foundation...
HITBSecConf2013(Amsterdam, the Netherlands, April 8 - 11, 2013) HITB2013AMS will feature cutting edge attack and defense research including the a presentation on the inner workings of the iOS 6.1 Evasi0n jailbreak presented by members of the world famous Evad3rs Team,...
INFILTRATE 2013(Miami, Florida, USA, April 11 - 12, 2013) INFILTRATE is a deep technical conference that focuses entirely on offensive security issues. Researchers focused on the latest technical issues will demonstrate techniques that you cannot find elsewhere.
Information Tech Expo Series - Hawaii(Oahu, Hawaii, USA, April 12 - 19, 2013) This 6-series showcase will feature stops at 5 DoD locations and 1 Intel Center on the island of Oahu. Celebrating 20 years of these expos is a true testament to the government and military's readiness...
InfoSec World Conference & Expo 2013(Orlando, Florida, USA, April 15 - 17, 2013) With the primary objective of providing top-notch education to all levels of information security and IT auditing professionals, InfoSec World delivers practical sessions that give you the tools to strengthen...
Infosec Southwest 2013(Austin, Texas, USA, April 19 - 21, 2013) InfoSec Southwest is intended to be a general security and hacking conference with no specific industry or topical focus. As such, nearly all topics (other than vendor pitches) are fair game and the attending...
23rd Annual Government Procurement Conference(Washington, DC, USA, April 25, 2013) This unique one-day event attracts more than 3,000 participants representing government agencies, prime contractors and small businesses from around the country. Participating companies are able to network...
Interop Las Vegas(Las Vegas, Nevada, USA, May 6 - 10, 2013) Attend Interop Las Vegas, May 6-10, and attend the most thorough training on Apple deployment at the NEW Mac & iOS IT Conference. Join us in Las Vegas for access to 125+ workshops and conference classes,...
Maryland/DC Celebration of International Trade(Linthicum, Maryland, USA, May 21, 2013) Join Maryland exporters and international business experts as they celebrate International Trade Week. Hosted by the Maryland/DC District Export Council this event is a content rich celebration of international...
Consumerization of IT in the Enterprise Conference and Expo(San Francisco, California, USA, June 2 - 4, 2013) From smartphones to mobile apps, social software and 4G networks, the wave of innovation in the consumer space is transforming the way companies do business, both inside and outside of the enterprise.
25th Annual FIRST Conference(Bangkok, Thailand, June 16 - 21, 2013) The annual FIRST conference provides a setting for conference participants to attend a wide range of presentations delivered by leading experts in both the CSIRT field and from the global security community.
SECRYPT 2013(Reykjavik, Iceland, July 29 - 31, 2013) The 10th International Conference on Security and Cryptography (SECRYPT 2013) will take place from 29 to 31 July 2013 in Reykjavik, Iceland…The conference will focus on information systems and network...
TechCrunch Disrupt San Francisco(San Francisco, California, September 7 - 11, 2013) For the fourth year in a row, TechCrunch Disrupt will take over the San Francisco Design Center Concourse, and we're bringing the hottest startups and best minds in the industry with us. Block off September...
SPONSOR & SUPPORT
Grow your brand and reach new customers.
Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.
Be a part of the CyberWire story.
People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.