skip navigation

More signal. Less noise.

Daily briefing.

#OpIsrael appears to have breached the network of an Israeli defense firm, disclosing information about customers and corporate personnel.

Malwarebytes reports that a malvertising campaign exploiting an Adobe zero-day enjoyed several months of success. Abode's February 2 patch seems to have brought the campaign to (says Dark Reading) "a screeching halt."

Fidelis Cybersecurity notes a resurgence of the Pushdo spamming botnet. Fidelis attributes the botnet's new success to Pushdo's agility in changing its command-and-control system: it's become more resistant to sinkholing.

SourceDNA warns of a widespread flaw affecting around a thousand iOS applications.

Android app security is also a concern, and Google has put developers on notice that their applications had better validate SSL certificates.

FireEye says it's found a vulnerability in the Samsung Galaxy S5's handling of biometric fingerprint data that could enable a hacker to gain system-level access to the device.

A researcher at the Royal Danish Defence College publishes an interesting study of what he calls the "weaponization of social media" — the increased use of social media in international conflict.

In industry news, BlackBerry announces its intent to acquire security firm WatchDox. Accuvant and Fishnet Security discuss their plans to merge into a new company, Optiv, this summer.

Industry analysts note the security benefits cyber insurance can bring to an enterprise. Other analysts look at leadership in breach response and conclude that IT managers' skills probably lie — rightly — elsewhere.

Huawei's CEO, in a rare departure from reticence about official policy, suggests the Great Firewall may be backfiring.


Today's issue includes events affecting Australia, China, Denmark, Estonia, India, Indonesia, Israel, NATO, Russia, Turkey, United States, and Vietnam.

Dateline RSA

RSA: Automation, threat intelligence, and perimeters (where, actually, are they?) (The CyberWire) RSA continues, with many well-attended (and well-covered) addresses and panels by industry leaders (and a few US Government leaders as well). Out on the exhibit hall floors and in suites in the neighborhood around the Moscone Center, meanwhile, some trends are emerging

RSAC 2015: RSA Conference (Day 2) (CSO) Shadow IT isn't the problem, complacency is

5 Trends At RSA Security Conference (Information Management) The computer security industry is eating humble pie at this week's RSA Security Conference in San Francisco. Amid continued cybersecurity break-ins and a growing threat landscape, here are five key IT security and data protection trends emerging at the conference

RSA Conference 2015: Criminals targeting gaps in user awareness training (CSO) Common phishing techniques were less effective last year, so criminals changed their game in order to adapt

U.S. Secretary Of Homeland Security Warns About The Dangers Of Pervasive Encryption (TechCrunch) In a speech at cybersecurity conference RSA, U.S. Secretary of Homeland Security Jeh Johnson outlined the government's discomfort with increasing implementation of encryption by technology companies, and what impact the shift might have on national security

Crypto 'Front Door' Debate Likely to Go on for Years (Threatpost) Encryption is the hot new topic in security at the moment, as it has been any number of times in the last few decades. And, as in the past, the notions of key escrow, mandated legal access to encrypted systems and other ideas for helping governments defeat cryptosystems have followed right along with the latest crypto renaissance

Microsoft's Vision of Cloud Security (Datamation) Scott Charney, Corporate Vice-President of Microsoft's Trustworthy Computing, details what's wrong and what's right in security

Evasive malware goes mainstream (Help Net Security) Lastline Labs conducted analysis of hundreds of thousands of malware samples collected in 2014 and they unveiled their findings at RSA Conference 2015 in San Francisco

This machine catches stingrays: Pwnie Express demos cellular threat detector (Ars Technica) An exclusive first look at Pwnie's new tool for catching cellular network attacks

Cavium to Showcase Secure Cloud Data Center and Telco Infrastructure Solutions at the RSA Conference 2015 (CNN Money) Demonstrations include High Performance Security Modules (HSMs) and Secure Data Center Servers

Cavium Announces Collaboration with A10 Networks for LiquidSecurity™ Hardware Security Module Family (PRNewswire) Cavium, Inc. (NASDAQ: CAVM), a leading provider of products that enable secure and intelligent processing for enterprise, data center, wired and wireless networking, today announced a collaboration with A10 Networks for its LiquidSecurity™ Hardware Security Module (HSM) family for next generation transaction security for cloud applications. This partnership enables seamless integration of the LiquidSecurity HSM family with the A10 Thunder™ ADC product line of application delivery controllers

Hillstone Networks Showcases Firewalls with Behavioral Intelligence at RSA (BusinessWire) New intelligent next-generation firewall technology finds and stops threats in minutes, not months

Advanced threat detection platform leveraging distributed computing (Help Net Security) At the RSA Conference 2015, Damballa unveiled Damballa Failsafe 6.0. This advanced threat detection platform leverages a distributed computing architecture that enables the seamless addition of new detection modules, ease of integration with other security technologies, and more efficient processing power

BlackVault CYNR: Code and document signing appliance (Help Net Security) Engage Black introduced the BlackVault CYNR security appliance at RSA Conference 2015. The BlackVault CYNR integrates a Layer 3+ Hardware Security Module (HSM) with application specific code-signing or document-signing functionality to simplify and improve the process of generating, managing and protecting digital signatures

The portable secure desktop: tVolution Mini (Help Net Security) At the RSA Conference 2015 Becrypt launched tVolution Mini. The device is smaller than a mobile phone, but has the power of a PC, and transforms a monitor or TV into a smart device for securely accessing corporate applications and data

AdaptiveMobile to Reveal Sophisticated Banking Scams at RSA Conference Showing How Cybercriminals Are Threatening US Banks (BusinesWire) Visualizations give a first-time view of solar-flare-like attack patterns across US states

ManTech Cyber Solutions International to Demo Industry Leading Behavior-Based Cybersecurity Software at 2015 RSA Conference (Nasdaq) ManTech Cyber Solutions International (MCSI), a commercial software division of ManTech International Corporation (Nasdaq:MANT), today announced it will be offering live demos of its industry-leading cybersecurity product lines: Active Defense™ and Responder PRO™ at the 2015 RSA Conference

CSG Invotas Introduces Security Orchestrator 3.0 to Solve Pressing Enterprise Security Challenges (BusinessWire) CSG Invotas, a leader in security orchestration and automation, today unveiled Security Orchestrator 3.0 to accelerate data breach response time, minimize the impact of breaches, and enable internal resources to devote more time to high-impact security initiatives

RSA Conference 2015: Trend Micro Showcases Adaptive Protection and Response Capabilities to Defend Against Targeted Attacks (BusinessWire) Presentation with FBI features 'How-To' on combatting enterprise threats

Huawei tackles security sandboxing with FireHunter appliance (Fierce Enterprise Communications) At the RSA Conference this morning, networking vendor Huawei took the wrapping off of its latest firewall and advanced persistent threat prevention solution. Dubbed the FireHunter Sandbox and Anti-Advanced Persistent Threat Solution, the new 2U appliance was designed with the intention of providing enterprises with a multi-layered security approach

Dispersive Technologies Unveils Cybersecurity Software to Protect Data-at-Rest (PRNewswire) Dispersive Technologies, Inc., a leading innovator in software-defined solutions for IP-based networks, announces Dispersive™ SDS, a new software-defined storage platform that radically improves the security of data-at-rest

ThreatMetrix Announces World's Largest Digital Identity Network at RSA Conference (Benzinga) The ThreatMetrix Digital Identity Network leverages global shared intelligence to safeguard online customer identities

RiskIQ Wins Cyber Defense Magazine Editor?s Choice Award for Best Enterprise Security Solution (BusinessWire) Company recognized for innovation at the RSA Conference USA 2015

ThreatStream Honored with The Cutting Edge Award in the Enterprise Security Solutions Category by 2015 Cyber Defense Magazine Awards (PRNewswire) ThreatStream® (RSA booth #S2727), the leading provider of an enterprise-class threat intelligence platform, announced today that Cyber Defense Magazine, an information security magazine, has named ThreatStream winner of the Cutting Edge award in the Enterprise Security Solutions category

WatchGuard Technologies Wins Most Innovative Firewall and Cutting Edge SIEM Solution from Cyber Defense Magazine (Virtual Strategy Magazine) WatchGuard's Firebox M500 firewall continues streak of industry recognition for its ability to inspect encrypted traffic 149 percent faster than competing solutions

Vectra Networks Honored as Network Security Cutting Edge Award Winner in 3rd Annual 2015 Cyber Defense Magazine Awards Program (MarketWired) At RSA Conference 2015, Cyber Defense Magazine recognizes Vectra X-Series' innovation for protecting networks from threats, malware and cyber attacks

Rook Security Named As The Hot Company In Managed Security Service Providers in the 2015 Cyber Defense Awards (MarketWatch) Indianapolis-based security services provider earns accolade for innovative, comprehensive SECOPS program offering

Fortscale Wins Cyber Defense Award for Most Innovative Enterprise Security Solution (BusinessWire) Fortscale Security Ltd., a pioneer in the growing field of User Behavior Analytics for security, today announced it has received a 2015 Cyber Defense Award for "Most Innovative Enterprise Security Solution"

Bitglass Honored as Hot Company Winner for Best Cloud Security Solutions in Third Annual 2015 Cyber Defense Magazine Awards (Marketwired) Bitglass (RSA booth #S237), the Total Data Protection company, announced today that Cyber Defense Magazine, an information security magazine, has named Bitglass a winner of the Hot Company award for Best Cloud Security Solutions for 2015. The magazine selected the company as a winner for its Bitglass Total Data Protection Suite after many months of review by leading independent information security experts

Imperva Honored as Winner in the Third Annual 2015 Cyber Defense Magazine Awards in Two Categories (MarketWatch) Imperva, Inc. IMPV, +1.64% committed to protecting business-critical data and applications in the cloud and on-premises, announced today that Cyber Defense Magazine, the industry's leading electronic information security magazine and media partner of the RSA® Conference 2015, has named Imperva Skyfence Cloud Gateway winner of the Most Innovative Cloud Security Solution for 2015 and Imperva SecureSphere winner of the Most Innovative Data Center Security Solution for 2015

Qualys CEO Philippe Courtot Receives the 2015 Industry Leadership Award From the Cloud Security Alliance (MarketWired) Courtot honored for his industry innovations and support as a founding member of the Cloud Security Alliance

Cyber Attacks, Threats, and Vulnerabilities

Anonymous Hackers Breach Israeli Arms Importer, Leaking Vital Client Details for #OpIsrael (Feedom Hacker) The hacktivist collective, Anonymous, breached the website of a prominent Israeli arms importer and manufacture, leaking the username and password combination for a number of customers including additional personal information of international clients such as job title, state, country, company they work for, first and last name, as well as company and personal phone number

Zero-Day Malvertising Attack Went Undetected For Two Months (Dark Reading) Researchers at Malwarebytes tracked stealthy attack campaign that infected some major websites with malicious ads harboring ransomware

Pushdo spamming botnet gains strength again (PC Advisor) The botnet has infected computers in more than 50 countries by changing its infection tactics

Networking flaw opens millions of iOS app users to data theft (Guardian) Bug in open-source codebase found its way into at least 1,000 apps, leaving millions of users open to man-in-the-middle attacks

Renewed Attention on Android Apps Failing SSL Validation (Threatpost) Android developers whose apps fail to validate SSL certificates are on notice; not only are researchers scanning apps making insecure connections, but so is Google. And the hammer may fall soon

Samsung Galaxy S5 Flaw Allows Hackers To Clone Fingerprints , Claim Researchers (Forbes) Biometric information is about as personal as data gets. But Google's Android partners are still failing to protect it, as researchers from security firm FireEye will discuss this week at RSA

Hyatt resets Gold Passport passwords after security incident (CSO) In a letter to members, hotel chain urges caution, but stresses that this isn't a major incident

Is this new zero-day dark market the real deal? (IT Pro) Davey Winder takes a look at the latest market to appear on the dark web and ponders whether it's a sting operation

Cyber Trends

#TheWeaponizationOfSocialMedia @Characteristics_of_ Contemporary_Con fl icts (Royal Danish Defence College) Social Network Media has become an integral part of the conflict environment over the past 15 years and longer. Starting with what has been labelled the first "internet-war", that is, the Kosovo conflict in 1999, developments have steadily progressed ever since

FireEye's Kevin Mandia: Identifying Hackers Is Getting More Difficult (Re/code) Hackers aren't just getting more aggressive — take a look at what happened last winter to Sony — they're also getting harder to track down

Cybercriminals Attack Corporate Personnel (Credit Union Times) The 2015 Human Factor Report revealed that last year, cyberattackers "went corporate" by focusing on businesses rather than consumers, exploiting middle managers' overload of information sharing, and trading off attack volume for sophistication

New Ponemon Institute Study Details the Financial Impact of Mixed Content Security Warnings on Retail Websites (MarketWired) Top 100 U.S. retailers losing up to $310 million annually

15 key insights from the Pew Internet and Life Project on the American public, open data and open government (e-Pluribus Unum) Today, a new survey released by the Pew Research Internet and Life Project provided one of the most comprehensive snapshots into the attitudes of the American public towards open data and open government to date

Executives Underestimate Importance of Security, Privacy to Consumers (Wall Street Journal) Many consumer product (CP) industry executives may be out of touch with consumers' opinions on the importance of data security and privacy


Cybersecurity stocks rally after Fortinet beats estimates, guides strong (Seeking Alpha) Security tech firms are rallying once again (HACK +2.3%) after unified threat management (UTM) hardware leader Fortinet (FTNT +9.6%) beat Q1 estimates on the back of 36% Y/Y billings growth, and provided strong Q2 and full-year sales/billings guidance

BlackBerry to buy mobile security company WatchDox for undisclosed sum (MarketWatch) BlackBerry Ltd. BBRY, -0.10% said Tuesday it has agreed to buy mobile security company WatchDox Ltd. for an undisclosed sum

Accuvant and FishNet Security to Become Optiv Security in Summer 2015 (BusinessWire) Accuvant and FishNet Security, which recently joined together to create the nation's premier cyber security solutions provider, today announced plans to launch their new, combined corporate name and brand, and to begin conducting business as Optiv Security in summer 2015

Technologies, Techniques, and Standards

Cyber insurance can reduce impact of a data breach (Arizona Republic) Cyber insurance for your business might be worth the cost. It deserves a good look because it educates on reducing risk, helps when a breach happens and can be a competitive advantage

Report: IT managers not best leaders in breach crisis (CSO) Technology managers are typically expected to take the point when a company is hit by a major cyber security crisis, but a more business-oriented leader might be more effective, says a new report from Booz Allen Hamilton

To Counter Systemic Cyberthreats, Share Information (Wall Street Journal) A few weeks after a series of distributed denial-of-service (DDoS) attacks first began disabling several U.S. banks' retail websites in September 2012, some cybersecurity researchers began characterizing the incident as a systemic attack on the financial system

NATO to hold major cyber defense drill in Estonia (Mining Journal) About 400 computer experts will participate in a major cybersecurity drill in Estonia this week as part of NATO's efforts to upgrade its capability to counter potentially debilitating hacker attacks


Norwich University Launches New Online Bachelor's Degree Completion Program in Cyber Security (Vermont Digger) Norwich University's College of Graduate and Continuing Studies has launched its third online degree completion program, the Bachelor of Science in Cyber Security

Academy places 2nd in NSA cyber competition (US Air Force Academy) The Air Force Academy's Cyber Team took second place in the National Security Administration's 15th annual Cyber Defense Exercise April 13-16

Legislation, Policy, and Regulation

Exclusive: Huawei CEO says Chinese cybersecurity rules could backfire (Reuters) China can only ensure its information security in the long run if it keeps its market open to the best technology products, be they foreign or domestic, Huawei's rotating chief executive Eric Xu told Reuters on Tuesday

Cyber attack rethink needed: tech giants (The Australian) Greater sharing of intelligence about cyber attacks is needed to tackle an "increasingly pervasive" threat, information technology sector giants have declared

McConnell introduces bill to extend NSA surveillance (Washington Post) Senate Majority Leader Mitch McConnell introduced a bill Tuesday night to extend through 2020 a controversial surveillance authority under the Patriot Act

Jeb Bush: Best part of Obama administration is NSA (Bellingham Herald) Former Florida Gov. Jeb Bush says the best thing about President Barack Obama is his support for the National Security Agency's massive communications data dragnets

Federal data-breach bill would replace dozens of stronger state laws (Los Angeles Times) It's called the Data Security and Breach Notification Act of 2015, and, if passed into law, it would be the first federal rule requiring businesses to let consumers know that their personal information may be in the hands of hackers

Armed Services subpanel wants assurances on cyber vulnerabilities (The Hill) A House Armed Services Committee subpanel on Tuesday directed the Defense Department and other federal agencies to report to Congress on their efforts to make sure U.S. weapons can sustain new kinds of warfare, including cyber attack

Litigation, Investigation, and Law Enforcement

Cisco's First Transparency Report on Law Enforcement Requests for Customer Data (Cisco Blogs) As Cisco's products and services evolve to new models, we find ourselves coming in contact with our customer's data more regularly

Lawyers' Group Seeks Overhaul of a Postal Service Surveillance Program (New York Times) A Postal Service surveillance program that records the information on the outside of letters and packages delivered to people suspected of criminal activity should be overhauled because of a lack of oversight, according to a report by a national defense lawyers' group

Chinese mobile app used for hiring thugs to beat up people (Naked Security) A satirical Chinese video about a mobile app that lets you hire thugs to beat up bullies has been turned into reality

For a complete running list of events, please visit the Event Tracker on the CyberWire website.

Upcoming Events

RSA Conference 2015 (San Francisco, California, USA, April 20 - 24, 2015) Don't miss this opportunity to join thousands of industry professionals at the premier information security event of 2015

Australian Cyber Security Centre Conference (Canberra, Australia, April 22 - 23, 2015) The Australian Cyber Security Centre (ACSC) will be hosting its first cyber security conference in 2015. We are bringing leading cyber security experts from Australia and abroad to share their expertise.

Security Forum 2015 (Hagenberg im Mühlkreis, Austria, April 22 - 23, 2015) The Security Forum is the annual IT security conference in Hagenberg that addresses current issues in this domain. Visitors are offered technical as well as management-oriented talks by representatives...

CyberTexas / CyberIOT (San Antonio, Texas, USA, April 23 - 24, 2015) CyberIOT — Securing the Internet of Things. As more everyday devices become connected to the internet, the need for securing those items becomes critical. CyberTexas will explore the intersection...

Defensive Cyberspace Operations & Intelligence Conference & Exhibition (Washington, DC, USA, April 27 - 28, 2015) The 5th Annual Defensive Cyberspace Operations & Intelligence (DCOI) conference & exhibition is an Israeli-American partnership promoting the extraordinary developments in the technological, intelligence...

INTEROP Las Vegas (Las Vegas, Nevada, USA, April 27 - May 1, 2015) Attend Interop Las Vegas, the leading independent technology conference and expo designed to inspire, inform, and connect the world's IT community. In 2015, look for all new programs, networking opportunities,...

INFWARCON (Nashville, Tennessee, USA, April 28 - 30, 2015) INFWARCON takes a look at how the balance has flipped in the past 20 years in the cyber security industry. Back then, governments had the upper hand, and could not imagine that cyber criminals could ever...

Southern Africa Banking and ICT Summit (Lusaka, Zambia, April 30, 2015) The South Africa Banking and ICT Summit is the exclusive platform to meet industry thought leaders and decision makers, discover leading edge products and services and discuss innovative strategies to...

2015 Synergy Forum (Tysons Corner, Virginia, USA, April 30, 2015) The 2015 Synergy Forum brings together government and industry practitioners driving our collective technology futures. This event is multi-disciplinary, examining the emerging fusion of physical and digital...

WAHCKon Perth 2015 (Perth, Western Australia, Australia, May 2 - 3, 2015) WAHCKon is a Perth based hacker conference that launched in 2013. We cover a wide range of topics focusing on Information security and Hacker subculture as well as locksports, activism and related areas...

Cloud Security Alliance Federal Summit (Washington, DC, USA, May 5, 2015) The Cloud Security Alliance Federal Summit, is a one day free-for-government event taking place at the Ronald Reagan Building and International Trade Center and is expected to draw 250 information security...

Amsterdam 2015 FIRST Technical Colloquium (Amsterdam, the Netherlands, May 5 - 6, 2015) FIRST Technical Colloquia & Symposia provide a discussion forum for FIRST member teams and invited guests to share information about vulnerabilities, incidents, tools and all other issues that affect the...

AFCEA Defensive Cyber Operations Symposium (Baltimore, Maryland, USA, May 5 - 7, 2015) The U.S. Defense Information Systems Agency's new operational role in the cyber domain as network defender creates a formal relationship between DISA, U.S. Cyber Command and the command's military service...

California Cybersecurity Task Force Quarterly Meeting (Walnut Creek, California, USA, January 20, 2015) The California Cyber Security Task Force serves as an advisory body to California's senior government administration in matters pertaining to Cyber Security. Quarterly Cybersecurity Task Force meetings...

DaytonDefense Ohio Cyber Dialogue with Industry Conference (Dayton, Ohio, USA, May 6 - 7, 2015) Our Cyber Security conference presents how Cyber Security affects you as an individual, your company, and your nation, along with business opportunities in this growing area. You will walk away with an...

Suits and Spooks London (London, England, UK, September 12, 2014) On September 12th, in London's South bank neighborhood of Southwork, approximately 50 former intelligence officials, corporate executives, and security practitioners from the U.S. and the EU will gather...

Fraud Summit London (London, England, UK, May 7, 2015) ISMG's Fraud Summit is a one-day event focused exclusively on the top fraud trends impacting organizations and the mitigation strategies to overcome those challenges. Highlights of the London event include...

Apple Security Talks & Craft Beer (Laurel, Maryland, USA, May 8, 2015) The world's first security summit held at a production brewery. Join some of the world's best Apple security researchers as they talk about iOS, OS X, Apple hardware and other Apple-related security topics...

DzHack Event 2015 (Ben Aknoun, Algiers, Algeria, May 9, 2015) DzHackEvent is a security event will contain conferences, workshops, and a challenge (CTF). Aiming to bring together security professionals, students, searcher, ethical hacker enthusiasts or simply technology...

12th CISO Summit & Roundtable Geneva 2015 (Geneva, Switzerland, May 11 - 13, 2015) The 12th CISO Summit will give you direct insights from Europe's most experienced CISOs, you will get the latest top hot buttons and focuses from other CISOs for the coming 5 years — shared predictions...

NG Security Summit (San Antoino, Texas, USA, May 11 - 13, 2015) The NG Security Summit bringx together more than sixty-five relevant CISOs from the private and public sector for a high level summit where they will workshop to benchmark, identify, and tackle key challenges.

Cybergamut Tech Tuesday: An Hour in the Life of a Cyber Analyst (Hanover, Maryland, USA, May 12, 2015) This hands-on workshop will demonstrate how easy it is for a breach to occur by analyzing a virtualized web server environment. Participants will use open source tools such as port scanners and protocol...

MCRCon (Ypsilanti, Michigan, USA, May 12, 2015) Please join the Michigan Cyber Range for the third annual MCRCon cybersecurity conference. MCRCon 2015 will focus on hacking prevention, incident handling, forensics and post-event public relations. MCRCon...

Houston Secure World (Houston, Texas, USA, May 13, 2015) Join your fellow security professional for affordable, high-quality cybersecurity training and education at a regional conference near you. Earn CPE credits while learning from nationally recognized industry...

QuBit 2015 Cybersecurity Conference (Prague, Czech Republic, May 13 - 15, 2015) QuBit brings together top experts and leaders in the field, from the private sector, to academia, to government. The main topics this year are APTs, the Internet of Things, and Digital Forensics, which...

Michgan InfraGard 2015 Great Lakes Regional Conference: Securing Our Critical Infrastructures (Novi, Michigan, USA, May 14, 2015) Learn all about the risks to critical infrastructures and key resources and the efforts underway to protect them. Private and public sectors will be represented. The conference will include four breakout...

THOTCON 0x6 (Chicago, Illinois, USA, May 14 - 15, 2015) THOTCON (pronounced \ˈthȯt\ and taken from THree - One - Two) is a hacking conference based in Chicago IL, USA. This is a non profit non-commercial event looking to provide the best conference possible...

International Conference on Cyber Security (ICCS) 2015 (Redlands, California, USA, May 16 - 17, 2015) The ICCS 2015 serves as a platform for researchers and practitioners from academia, industry, and government to present, discuss, and exchange ideas that address real-world problems with CYBER SECURITY.

FS-ISAC & BITS Annual Summit (Miami Beach, Florida, USA, May 17 - 20, 2015) The Financial Services Information Sharing and Analysis Center (FS-ISAC), is a non-profit association comprised of financial institution members, that is dedicated to protecting the global financial services...

2015 Cyber Risk Insights Conference — Chicago (Chicago, Illinois, USA, May 18, 2015) Advisen again brings its acclaimed Cyber Risk Insights Conference series to Chicago with a full-day event addressing the critical privacy, network security and cyber insurance issues confronting risk professionals...

IEEE Symposium on Security and Privacy (San Francisco, California, USA, May 19 - 22, 2013) Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for the presentation of developments in computer security and electronic privacy, and for bringing together researchers...

Fraud Summit Chicago (Chicago, Illinois, USA, May 19, 2015) ISMG's Fraud Summit is a one-day event focused exclusively on the top fraud trends impacting organizations and the mitigation strategies to overcome those challenges. Highlights of the Chicago event include...

NCCOE Speaker Series: The Cyber Danger: Problems of Strategic Adaptation (Rockville, Maryland, USA, May 20, 2015) Lucas Kello (Senior Lecturer in International Relations / Director of Cyber Studies Program, Oxford University, and Associate of the Science, Technology & Public Policy Program, Belfer Center for Science...

3rd Annual Georgetown Cybersecurity Law Institute (Washington, DC, USA, May 20 - 21, 2015) In 2015, it is more important than ever that in-house and outside counsel stay abreast of the most current developments and best practices in cybersecurity. Those lawyers who ignore cyber threats are risking...

AFCEA Spring Intelligence Symposium 2015 (Springfield, Virginia, USA, May 20 - 21, 2015) The Symposium will be a one-of-a-kind event designed to set the tone and agenda for billions of dollars in IC investment. Leaders from all major IC agencies, from the ODNI, IARPA, and the National Intelligence...

SOURCE Conference (Boston, Massachusetts, USA, May 25 - 28, 2015) SOURCE is a computer security conference happening in Boston, Seattle, and Dublin that is focused on offering education in both the business and technical aspects of the security industry. The event's...

7th International Conference on Cyber Conflict (Tallinn, Estonia, May 26 - 29, 2015) CyCon is the annual NATO Cooperative Cyber Defence Centre of Excellence conference where topics vary from technical to legal, strategy and policy. The pre-conference workshop day, 26 May, features a variety...

HITBSecConf2015 Amsterdam (De Beurs van Berlage, Amsterdam, The Netherlands, May 26 - 29, 2015) This year's event will feature a new training courses. Keynote speakers include Marcia Hofmann and John Matherly. To encourage the spirit of inquisitiveness and innovation, Haxpo will showcase cutting...

1st Annual Billington Corporate Cybersecurity Summit (New York, New York, USA, May 27, 2015) Join Billington CyberSecurity's unparalleled network of cybersecurity professionals as they provide hard-earned insights and education to a high level and exclusive group of attendees from the corporate...

Atlanta Secure World (Atlanta, Georgia, USA, May 27 - 28, 2015) Join your fellow security professional for affordable, high-quality cybersecurity training and education at a regional conference near you. Earn CPE credits while learning from nationally recognized industry...

Techno Security & Forensics Investigations Conference (Myrtle Beach, South Carolina, USA, May 31 - June 3, 2015) The Seventeenth Annual International Techno Security & Forensics Investigations Conference will be held May 31 ? June 3 in sunny Myrtle Beach at the Myrtle Beach Marriott Resort. This conference promises...

Mobile Forensics World (Myrtle Beach, South Carolina, USA, May 31 - June 3, 2015) The Eighth Annual Mobile Forensics World will also be held May 31 ? June 3 in sunny Myrtle Beach at the Myrtle Beach Marriott Resort. The Mobile Forensics World is specifically dedicated to Federal, State...

Grow your brand and reach new customers.

Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.

Be a part of the CyberWire story.

People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.