Ransomware concerns grow as this form of cybercrime becomes more vicious and widespread. F-Secure thinks the Reveton gang alone victimized 5 million people worldwide, with losses running above $800M. Norton declares India Asia-Pacific ransomware central, with an 8% rise in cost per victim over the past year. The figures are high enough to strain credibility, but clearly the problem is large and growing.
July's US Department of Energy data breach appears twice as large as originally reported: over 100,000 people were affected.
NETGEAR ReadyNAS storage is vulnerable to command injection attack. Troublesome Android ad network Vulna makes itself less troublesome (under pressure from FireEye). Malicious spam spoofing Xerox WorkCentre Pro messages has been seen in the wild.
Network Solutions reports more DNS issues and says it's working to overcome service interruptions.
Security researchers find application–layer denial–of–service attacks becoming more common.
Huawei's security evangelism receives scrutiny from the business press. One interesting note—the Chinese firm may use the US–UK special relationship to enter the US market via the UK.
Other industry and policy news centers on the tension between a security-driven desire for IT autarchy and a law-enforcement-driven desire for transnational cooperation. Where you come down seems to depend upon which you fear more: states or gangs. Thus Europe and the US find themselves at loggerheads over surveillance as experts call for closer information sharing, and US DNI Clapper deprecates Le Monde's sensationalism as US Representative Wolf seeks sensational punishment for Chinese cyberespionage.
Today's issue includes events affecting Australia, China, European Union, France, India, Democratic People's Republic of Korea, Republic of Korea, Mexico, New Zealand, Philippines, Saudi Arabia, Turkey, United Kingdom, United States..
Ransomware family starts accepting Bitcoin(ITProPortal) One particular ransomware family is now accepting Bitcoin for the first time with the anonymous currency able to remove the encryption and signalling the malicious threat is continuing to grow. Alienvault.com reports that Cryptologic, identified by Microsoft as Crilock.A, also takes payment in MoneyPack, Ukash and cashU, with Bitcoin offered as the "most cheap option"
What is the cost of ransomware?(F-Secure) Here's a question we're often asked: what's the economic cost of malware? We recently assisted in a joint investigation with the Finnish Police and CERT-FI. And in this particular case -- we estimate that just one gang of "police" (themed) ransomware could be responsible for more than 800 million dollars worth of damage and losses
Dept. Of Energy Breach: Bigger Than We Realized (Dark Reading) DOE says July data breach affected more than double the number of people in initial estimates; CIO tasks an independent investigator to probe breach and agency's technology infrastructure
Overzealous Android Vulna Ad Network Put in its Place(Threatpost) An Android ad library containing a maliciously potent cocktail of features and vulnerabilities is less of a danger to Android users today after Google and the ad network itself made a series of change
Spamhaus puts foot down HARD on Chinanet–GD(Security Skeptic) Anti-spam and block listing not-for-profit Spamhaus has added an entire /12 block of IP addresses allocated to Chinanet Guongdong Province Network (Chinanet-GD) for "Spammer, malware and botnet hosting for months. Ignoring multiple notifications sent by Spamhaus and 3rd parties"
Fake 'Scanned Image from a Xerox WorkCentre' themed emails lead to malware(Webroot Threat Blog) We've intercepted a currently circulating malicious spam campaign, tricking users into thinking that they've received a scanned document sent from a Xerox WorkCentre Pro device. In reality, once users execute the malicious attachment, the cybercriminal(s) behind the campaign gain complete control over the now infected host
Application–layer DDoS attacks are becoming increasingly sophisticated(ComputerWorld) The number of DDoS (distributed denial-of-service) attacks that target weak spots in Web applications in addition to network services has risen during the past year and attackers are using increasingly sophisticated methods to bypass defenses, according to DDoS mitigation experts
Security Patches, Mitigations, and Software Updates
Apple Follows In Microsoft's Windows 8.1 Footsteps, Makes OS X Updates Free(TechCrunch) Apple announced today at its event at San Francisco's Yerba Buena Gardens that its forthcoming update to OS X, Mavericks, will come at no cost to consumers. This is a change for Apple, a company that in the past charged for updates to its desktop operating system. Those fees were low — less than $50 — but they existed. And by dropping the cost of OS X updates to zero, Apple is
South Korea Counts Its Cyber War Losses(Strategy Page) South Korea has come up with a number (over $800 million) for the cost of dealing with North Korean cyber attacks over the past four years. The list the government complied is quite detailed. The latest attacks (in March and June) accounted for 93 percent of the cost. South Korea has been subjected to a growing number of Cyber War attacks since 2009 and the high cost of the latest ones shows that the North Koreans are getting better and that South Korea is not keeping up
Kroll Global Fraud Report Reveals Significant Surge In Corporate Fraud(Dark Reading) The number of companies falling victim to fraud has increased in the past year, according to the 2013 Kroll Global Fraud Report. Overall, 70 percent of companies were affected by fraud in the past 12 months, up from 61 percent the previous year, with an increase in every category of fraud covered by the study
IBM: CISOs Don't Get BYOD(eSecurity Planet) The 2013 IBM Chief Information Security Officer Assessment identifies a few areas of weakness, including BYOD policy, in modern IT security. IBM is out with its second annual Chief Information Security Officer (CISO) Assessment study this week, providing visibility into how enterprises are dealing with modern IT security challenges. David Jarvis
Infographic: Insecure state of app security(FierceITSecurity) Only 11 percent of information security managers trust the security of their applications, according to a survey of more than 500 chief information security officers and security managers in the United States and Europe surveyed by Quotium
Sprint and Lookout Survey Reveals Consumers' Mobile Behaviors(Lookout) Our phones are our lifelines and have become an essential tool for everyday life. We are constantly plugged into our phones — during the morning commute, just before bed — even at the dinner table. Gone are the days when we used phones merely as a means of communication. Smartphones have become our most personal computers and in many cases know more about us than our best friends. Lookout and Sprint today released the results of a national survey revealing consumers' mobile behaviors, habits and concerns over privacy
Cyber vulnerabilities becoming more worrisome, experts say(Government Security News) On a list of risk factors that contemporary businesses have to face, cybersecurity vulnerabilities have moved up, from number 12 to number 3, according to Robert Rodriguez, the chairman and founder of SINET, an IT security organization, at a recent cyber security conference in New York
How To Attract, Keep Gen Y Software Engineers(InformationWeek) Gen Y software engineer all-stars are easy to find, but hard to retain. Try these steps to keep them happy and productive. Engineering enrollment at universities in the U.S. is on the rise. As these new graduates hit the market, most employers have no clue how to attract them, how to train them, what core skills they bring to the table, and what will make them happy and productive
The commercial reality of Huawei's trust issues(ComputerWeekly) This week, we have been visiting Huawei's headquarters in Shenzhen. The company has been on a mission in the past three years to open its doors to more journalists and try and change its reputation as a closed off firm to one of openness and transparency. Yet, it is still struggling to break into some of the world's biggest and most lucrative markets
Shutdown stalled FedRAMP authorizations, GAO IT reports(FCW) Almost a week after it ended, the partial government shutdown continues to affect the federal IT community. Companies seeking authorization under the government's standardized approach to security assessments for cloud services — known as the Federal Risk and Authorization Management Program (FedRAMP) — were delayed by the 16-day shutdown
SRA Chosen to Support SPAWAR Systems Center Atlantic's Cyber Security and C5ISR Operations and Solutions(BWW) SRA International, Inc., a leading provider of IT solutions and professional services to government organizations, today announced that the U.S. Navy's Space and Naval Warfare Systems Center (SSC) Atlantic has selected SRA as a prime contractor to support its Integrated Cyber Security Operations (ICO) indefinite delivery/indefinite quantity (IDIQ) contract. The multi-award, five-year IDIQ carries a ceiling value of $900 million, if all options are exercised
IBM to Build GSA Cloud-Based Order Mgmt System(GovConWire) IBM (NYSE: IBM) has won a five-year, $30 million contract to build a cloud-based platform for the U.S. General Services Administration to use for processing orders from federal, civilian and military clients
Bromium Raises $40M For Security Technology That Traps Malware And Limits Attacks(TechCrunch) Bromium has raised $40 million for its micro virtual machine (micro-vm) technology that traps malware and analyzes it for IT administrators to examine once an attack takes place. The oversubscribed Series C funding round was led by new investor Meritech Capital Partners, with participation from existing investors Andreessen Horowitz, Ignition Partners, Highland Capital Partners, and Intel Capital
Cindy Farkus Joins Camber Corporation as new VP and Director of Maryland Operations(Sacramento Bee) Camber Corporation is proud to welcome Ms. Cindy Farkus as the new Vice President and Director of Maryland Operations and Deputy of the National Intelligence and Special Operations Division. Ms. Farkus brings over 35 years of national security experience, specifically in intelligence analysis and homeland security. Ms. Farkus has extensive experience guiding and directing the establishment of new organizations, providing intelligence support to strategic and military operations, and expertly supporting crisis management, information sharing, international relations, and cyber security efforts
Websense Enhances TRITON Security Platform(SecurityWeek) Websense released the latest version of its TRITON security platform on Tuesday, which includes new features designed to more effectively thwart targeted attacks
Gatekeeper on Mac OS X 10.9 Mavericks(TrendLabs Security Intelligence Blog) One of the Mac OS X platform's security features is Gatekeeper, which was first introduced in 2012 and works with Lion, Mountain Lion, and Mavericks. If a program is downloaded from the Internet and launched, Gatekeeper will first validate its digital signature and choose whether to let it run based on the user's settings. How has this changed in Mavericks
'Bring your own support' an option for BYOD enterprises(FierceMobileIT) BoxTone and BMC Software each unveil BYOD support solutions. As the BYOD movement takes hold in the enterprise, many organizations have stood up mobile device management software and whitelisted apps to get a better handle on the personal smartphones and tablets connecting to the network. These backend security strategies take a minimally invasive and least disruptive path to security. Now it looks like enterprises can take a similarly hands-off approach to device support
How to Choose the Right Eyes and Ears for Cyber Security(Forbes) The modern practice of cyber-security is now powered by data analysis. As a result, the quality of security will be determined by the volume and quality of the data collected about your environment, and the ability to uncover threats. One fascinating implication is that a raft of technology that can collect and analyze data about a computing environment is now relevant to the practice of security. There are now a huge number of choices of technology that can be the eyes and ears of your cyber security portfolio
Technologies, Techniques, and Standards
The government wants industry input on protecting infrastructure from cyberterrorists(The Verge) If you have opinions on how to protect America's critical infrastructure from hackers, the government wants to hear 'em. The 45-day public comment period is about to open for the preliminary guidelines on how to safeguard power plants, mass transportation, and other large utilities from cyberattacks. The guidelines are set to be released in February 2014 by executive order of the President
Banks to Utilities Given U.S. Standards to Fight Hackers(Bloomberg) President Barack Obama's administration proposed standards for banks, utilities and other companies to voluntarily follow to prevent hackers from infiltrating their computer networks. The measures are intended to help companies that provide critical services inside the U.S. — such as electricity, financial transactions and health care — improve their digital defenses, according to the National Institute of Standards and Technology
How to stop intruders without knocking out the workers(The Register) For a sysadmin, fighting malware feels like an uphill battle that you are never going to win. Security software vendors are in a constant catch-up game, trying to create definitions to protect their customers from the latest round of malware. Sysadmins have the tough job of using their various security software and devices, while trying to allow users to still be productive and do their job
Top three indicators of compromised web servers(TechRepublic) Web servers are a popular target for attackers, and the number of servers, frameworks, and web apps can make it difficult to recognize where the threats are. Here are some common indicators
Finding the goodness in threat reports(ComputerWorld) Are you drawing the right conclusions from your favorite security vendor's 2013 threat report? Some do, but I talk with a lot of security executives that miss the opportunity to use these reports as stimulus to re-examine their security strategies. The importance of threat reports are what the trends of user activity mean to your security practices and not-so-much the details of individual threats
Incident Response Teams: Handling and Managing Data and Materials(ThreatTrack Security) You suspect that a nasty file has infiltrated your system. The Incident Response Team (IRT) has been called and has collected data and categorized the event as a serious incident. Now it's time to handle and manage the incident data and materials in a secure manner so that further analysis and remediation can begin. Welcome to the world of cybersecurity incident response
DARPA–funded TechShop location to open in Arlington, VA next year(Engadget) Just ahead of its Menlo Park location's crowdfunded move, TechShop has announced a second (or third, if you want to get technical) space to let your inner maker flag fly. Later this year Arlington, VA's Crystal City neighborhood will see construction begin on the new idea-friendly space near our nation's capitol, with a projected opening of early 2014. It's the latest effort from a partnership between TechShop, DARPA and the Department of Veterans Affairs Center for Innovation, and could help the state's 837,000 veterans develop usable skills through free job-training programs. We thought TechShop might consider a region with lower rent for its next space, but since Virginia has one of the highest veteran populations in the area, who are we to judge
Visualizing Security Analytics That Don't Stink(Dark Reading) When it comes to sifting through an inordinate amount of security data in order to make informed decisions, success depends not just on how one slices and dices that data via algorithms and analysis. Equally important is how that data is eventually presented, whether it be to IT operations making daily decisions, IT leaders developing strategic initiatives or to higher level executives who hold the purse strings
Research and Development
Cyber Grand Challenge for automated network security-correcting systems(Homeland Security) What if computers had a "check engine" light that could indicate new, novel security problems? What if computers could go one step further and heal security problems before they happen? To find out, the Defense Advanced Research Projects Agency (DARPA) intends to hold the Cyber Grand Challenge (CGC) — the first-ever tournament for fully automatic network defense systems. The Challenge will see teams creating automated systems that would compete against each other to evaluate software, test for vulnerabilities, generate security patches, and apply them to protected computers on a network. The winning team in the CGC finals would receive a cash prize of $2 million, with second place earning $1 million and third place taking home $750,000
Penn State to lead cyber–security Collaborative Research Alliance(Phys.org) Creating a science to detect and model cyberattacks and the risk and motivations behind them, and creating a response that can counter the attack and neutralize the cyberattackers in real time, is the aim of a cooperative agreement between the Army Research Laboratory and Penn State
The U.S. needs to adjust its policy toward spying on allies(Washington Post) In response to the serial revelations of National Security Agency (NSA) spying against allied countries, the Obama administration offers two standard explanations. One is pragmatic: sweeping up phone records and other data in places such as France and Germany is an important counterterrorism operation that protects citizens of those nations as well as Americans. The other is tinged with cynicism: Many governments spy on one another, including on their friends, so no one should be shocked to learn that the United States does it as well
US rift with allies grows as Saudi Arabia, France voice concerns(Fox News) While the White House battles Congress over everything from the budget to ObamaCare, a potentially seismic shake-up is happening in America's relationship with some of its most-longstanding allies. For weeks now, a damaging trickle of once-secret information about the National Security Agency's spying abroad has outraged U.S. partners. France is the latest to formally protest over its citizens' alleged treatment at the hands of NSA analysts
New Leaks, New Repercussions(New York Times) Stunning new details continue to emerge from Edward Snowden's leaks about the vast electronic data mining carried out by the National Security Agency, setting off one diplomatic aftershock after another
European Parliament Joins List Of Those Upset With The NSA(WSHU) The fallout from revelations about the National Security Agency's spying activities continues: A key European Parliament committee approved new rules strengthening online privacy and outlawing the kind of surveillance the U.S. has been conducting. NPR's Soraya Sarhaddi Nelson says the legislation could also have significant implications for U.S. Internet companies. Here's what she told our Newscast unit
European Parliament Votes to Permit Pseudonymous Data Profiling(CIO) But digital rights groups warn that the proposal lacks sufficient safeguards for citizens' data. The European Parliament's civil liberties committee voted Monday night to allow profiling of "pseudonymous" data, but digital rights groups say that safeguards to protect data are not sufficient
Time to review cyber trust, says ICSPA(ComputerWeekly) The world needs to reset the clock on trust after whistleblower Edward Snowden revealed the US Prism internet surveillance programme, according to the International Cyber Security Protection Alliance (ICSPA). "Governments need to do a better job to help citizens to understand the reasons for conducting internet surveillance, John Lyons, ICSPA chief executive told the ISSE 2013 security conference in Brussels
Privacy Problem(MIT Technology Review) s Web companies and government agencies analyze ever more information about our lives, it's tempting to respond by passing new privacy laws or creating mechanisms that pay us for our data. Instead, we need a civic solution, because democracy is at risk.Most proposals for enhancing our privacy treat it as an end in itself. Instead we need to be talking about how to best stimulate democracy--a balancing act that laws or market mechanisms can't achieve alone. In 1967, The Public Interest, then a leading venue for highbrow policy debate, published a provocative essay by Paul Baran, one of the fathers of the data transmission method known as packet switching. Titled "The Future Computer Utility," the essay speculated that someday a few big, centralized computers would provide "information processing…the same way one now buys electricity"
Cyber criminals have no borders, so neither should we(Naked Security) Rob Forsyth takes a look at the efforts of the Australian and New Zealand governments in tackling cyber security awareness, and highlights the work needed by global providers of security products to create a united front, unhindered by national barriers
It is Time for the TCG to Repudiate the NSA(Security Current) Trust is fragile and the decade long effort on the part of the NSA to compromise all security models has destroyed trust. From its inception the coalition of industry giants who have backed the concept of hardware-based security, the Trusted Computing Group (TCG), have been at odds with the "information should be free" crowd. The problem these giants (Microsoft, Intel, AMD, IBM, HP) faced a decade ago was software and media piracy. As the biggest backer, Microsoft, was the most suspect. In recent weeks that suspicion of Microsoft has exploded into bald-face claims from the German BSI that the Trusted Platform Module, the hardware component of Trusted Computing is an NSA backdoor. And who knows what further releases of the Snowden files will unveil about the NSA's involvement with the Trusted Computing Group?
The Law of Attack in Cyberspace: Considering the Tallinn Manual's Definition of 'Attack' in the Digital Battlespace(Student Pulse) 'Attack' is a term of central importance in the Law of Armed Conflict, the body of international rules and standards that regulate conduct in armed conflict (jus in bello). A 1977 amendment to the Geneva Conventions of 1949, 'Protocol I,' defines an attack as an '[act] of violence against the adversary, whether in offence or defence.'1 The term's importance lies in its centrality to other prohibitions in the Law of Armed Conflict, for example the principle that individual civilians and civilian populations 'shall not be the object of attack'
Wolf: Change Needed In Addressing Cyber Threat(TMC.Net) Rep. Frank R. Wolf, R-Va. (10th CD), issued the following news release: Speaking at a cybersecurity summit in Tysons, Rep. Frank Wolf (R-VA) today said there needs to be stiffer penalties for countries like China who threaten our national security with cyber attacks and cyber espionage
Protect the Edward Snowdens of this world, says web's founder(The National) Society needs to protect whistleblowers like the American Edward Snowden to prevent the "abuse" of power online, says the founder of the internet. In an interview streamed live from New York for the keynote speech of the Abu Dhabi Media Summit yesterday, Sir Tim Berners-Lee highlighted the need for an agency to hold governments to account for their online activities
UK Cyber Reserve Force May Include Convicted Hackers(The State of Security) The U.K.'s Joint Cyber Reserve Unit that was announced in September by Defense Secretary Philip Hammond is recruiting, and they have not ruled out the possibility that convicted hackers may be considered eligible for the cyber warrior unit, officials said
The TSA is now searching your personal records before you get to the airport(The Verge) The Transportation Security Administration is gearing up for stronger and broader pre-screenings, according to newly released documents. The TSA already checks travelers against a terrorist watch list, but the The New York Times reports that the agency will now begin profiling travelers based on their past travel itineraries, property records, car registrations and employment information. The result is a full background check, directing some towards lighter screenings and others towards more invasive bag checks and pat-downs
South Korean cyber command raided in growing scandal(The Age) Military investigators raided South Korea's Cyberwarfare Command on Tuesday after four of its officials were found to have posted political messages online last year, in what opposition lawmakers have called a smear campaign against President Park Geun-hye's opponents before her election in December
Experian Got Scammed(FITSNEWS) Experian - the credit bureau which received a controversial no-bid contract from S.C. Gov. Nikki Haley during last year's #SCHacked scandal - has acknowledged being duped into selling its confidential customer data to a Vietnamese scammer. News of the heist was first reported this week by KrebsOnSecurity. According to the site, scammer Hieu Minh Ngo "gained access to Experian's databases by posing as a U.S.-based private investigator"
For a complete running list of events, please visit the Event Tracker on the CyberWire website.
Cloud Connect(Chicago, Illinois, USA, October 21 - 23, 2013) Cloud Connect returns to Chicago October 21-23, 2013 with an all new program built around the leading cloud platforms. Cloud Connect provides the independent guidance IT professionals need to successfully...
Cyber Security Seminar and IT Expo at Peterson AFB(Colorado Springs, Colorado, USA, October 22, 2013) The Cyber Security Seminar and IT Expo is a one-day event held on-site where industry vendors will have the opportunity to display their products to personnel attending briefings concerning the latest...
Hack.lu 2013(Luxembourg, October 22 - 24, 2013) Hack.lu is an open convention/conference where people can discuss about computer security, privacy, information technology and its cultural/technical implication on society.
STEM family night returning to Arundel Mills(Arundel Mills Mall, Maryland, USA, October 23, 2013) The Fort Meade Alliance is hoping to spark interest in future engineers and doctors at their third annual STEM family night Wednesday at Arundel Mills mall.
Joint Federal Cyber Summit 2013(Washington, DC, USA, October 23 - 24, 2013) This collaborative government wide event is truly one of a kind, with speakers and attendees anticipated to represent more than 10 federal government agencies. Information sharing will be accomplished...
NSU's 12 Simple Cybersecurity Rules For Your Small Business(Fort Lauderdale, Florida, USA, October 24, 2013) In this presentation twelve simple and inexpensive techniques for protecting small businesses from cyber threats will be discussed. While complex and expensive solutions exist to improve the security...
BREAKPOINT 2013(Melbourne, Australia, October 24 - 25, 2013) Over two days, 14 world-renowned speakers front Breakpoint to share their knowledge on a full range of security issues, from unpublished research to the latest trends in information security.
Ruxcon(Melbourne, Australia, October 26 - 27, 2013) Ruxcon is a computer security conference that aims to bring together the best and the brightest security talent within the Aus-Pacific region. The conference is a mixture of live presentations, activities...
2013 ACT–IAC Executive Leadership Conference(Williamsburg, Virginia, USA, October 27 - 29, 2013) Advances in technology and massive increases in data available can both challenge and transform Government mission performance. ELC-2013 focuses on how to make this transformation a reality, in and for...
FIRST Energy Symposium(Leesburg, Virginia, USA, October 28 - 29, 2013) Recent reports have shown that the Energy Sector has seen a large increase in the reported number of cyber attacks. The need to protect against threats and improve upon incident management has never been...
SAP NS2: National Security Solutions Summit(Falls Church, Virginia, USA, October 29, 2013) Join us for a day of learning and networking focused on how to advance U.S. national security and homeland security through I.T. innovation. Top-notch speakers will address the new challenges facing U.S.
RSA Conference Europe(Amsterdam, the Netherlands, October 29 - 31, 2013) Information security today isn't optional. It's business-critical. Over three days, RSA® Conference Europe 2013 imparts the must-know actions to manage growing cyber threats. With over 60 sessions spanning...
Regional Cyber Security Forum & IT Day (CSFI) — Hawaii (Honolulu, Hawai'i, USA, October 30, 2013) 2013 marks the 10th anniversary of National Cyber Security Awareness Month and FBC will host the 1st Annual Cyber Security Forum & IT Day (CSFI) at Fort Shafter - Club Hale Ikena to coinside with the anniversary,...
NSA Hawaii — Cyber Security, Intelligence & IT Day(Honolulu, Hawai'i, USA, October 30, 2013) Be a part of the 1st Annual Cyber Security, Intelligence and IT Day set to take place at the new National Security Agency (NSA) Hawaii Rochefort facility. The event will be hosted by NS/CCS Hawaii Technology...
Ahead of the Threat: Driving Innovation for Cyber Security(Bethesda, Maryland, USA, October 30, 2013) Sponsored by the Tech Council of Maryland, this conference will feature a presentation by Sondra L. Barbour, Lockheed Martin Information Systems & Global Solutions (IS&GS) Executive Vice President, will...
TrustED 2013(Berlin, Germany, November 4, 2013) In this workshop we consider selected aspects of cyber physical systems and their environments. We aim at bringing together experts from academia, research institutes, industry and government for discussing...
OKTANE 1(San Francisco, California, USA, November 3 - 5, 2013) OKTANE13 is an identity, security and mobility event. Whether you're just getting started with cloud applications, evaluating a mobile strategy, building a hybrid enterprise IT, or looking to make your...
MIRcon 2013(Washington, DC, USA, November 5 - 6, 2013) With targeted attacks becoming more prevalent, today's incident responders are faced with the tremendous challenge of accelerating their response times while capturing relevant data from attacks in progress.
KMWorld 2013(, January 1, 1970) KMWorld 2013 is a must-attend event for those concerned with improving their organizations' bottom line, business processes, and productivity, as well as streamlining operations, and accelerating development...
Cyber Education Symposium(Arlington, Virginia, USA, November 19 - 20, 2013) Both the public and the private sectors suffer from a lack of highly trained and effective cyber security leaders. In response, the government, businesses, and academic institutions are all exploring ways...
APPSEC USA(New York, New York, USA, November 18 - 21, 2013) Welcome to Appsec USA 2013, New York - a world class software security conference for developers, auditors, risk managers, and entrepreneurs, bringing you the world's top speakers, the most relevant security...
IT Forum Expo/Black Hat Regional Summit(, January 1, 1970) Black Hat Regional Summit will introduce a mix of local in-region experts and researchers from around the globe, discussing the latest trends in information security with an audience of peers. The sessions...
2nd Annual East Africa IT and Cyber Security Convention 2013(Nairobi, Kenya, November 28 - 29, 2013) The 2nd Annual East Africa IT and Cyber Security Convention 2013 will bring together leading Cyber and IT Security experts who will provide key insights into critical cybersecurity issues surrounding cyber...
SPONSOR & SUPPORT
Grow your brand and reach new customers.
Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.
Be a part of the CyberWire story.
People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.