skip navigation

More signal. Less noise.

Daily briefing.

Journalists and other observers continue to mull Kaspersky's coy but admiring account of its researches into Equation Group. Most infer US responsibility. (Wired, for example, cracks wise that it turns out the Americans have had a cyber Manhattan Project after all — and like the original, it's secret, mobilizes lots of scientists and engineers, and focuses on offense. The head of security company Immunity is refreshingly candid in voicing full-throated approval: Equation Group should be patting itself on the back. If they're NSA, they're giving the taxpayers value for their investment.)

Iran says it's deeply concerned by Equation Group news.

The Anthem breach, with an emerging consensus attribution to the Chinese government, "raises US hackles" over its HUMINT implications. Chinese media return Equation Group as a tu quoque.

Help Net Security has a useful table of Desert Falcon's target list. Speculation that the group is a kind of pan-Arab cyber mercenary unit continues.

The conflict between ISIS and its many foes involves information operations broadly conceived even more than cyber. Interesting reports on how ISIS perceives itself, and communicates its goals in both word and propaganda-of-the-deed, appear. (By some accounts Russia is attempting Cold-War style exploitation of Islamist discontent and ambition against its main (US) enemy.) US officials describe their approach to anti-ISIS messaging; the Attorney General calls for disruption of the aspiring caliphate's online recruiting.

As the cyber insurance market matures, analysts think businesses underestimate their risk, and that in general they should carry much more coverage than they do.


Today's issue includes events affecting Afghanistan, Belgium, China, Iran, Iraq, Pakistan, Russia, Slovakia, Sweden, Syria, United Kingdom, United States.

Dateline Washington, DC: Cyber Risk Wednesday

White House: Clock ticking on cyber sharing (The Hill) The cybersecurity relationship between the government and private sector will be cemented for generations to come by the decisions made in the next few years, a top White House official said Wednesday

Cyber Attacks, Threats, and Vulnerabilities

Is the US Behind the Most Sophisticated Cyber Attacks to Date? (The Diplomat) A report by a Russian cybersecurity firm lays bare the activities of a highly sophisticated cyber attack group

'Equation Group' Spyware Highly Effective, Culprit Hard to Identify (Sputnik News) Experts claim that the recently-discovered spying software hidden in computers around the world which targets foreign governments and financial institutions is sophisticated enough to get virtually all types of information, without exactly knowing who the culprit is

Cyber Firm: The NSA Is Out-Hacking the Chinese and the Russians (Defense One) A new report exposes the agency's efforts to penetrate systems in multiple countries

Iran Spokeswoman Says It Concerned by Cybersecurity Report (Associated Press via ABC News) Iran is concerned by a Russian cybersecurity firm's report suggesting a new family of malicious programs and worms is infecting computers there and elsewhere in the world, a Foreign Ministry spokeswoman said Wednesday

How hackers could attack hard drives to create a pervasive backdoor (Ars Technica) Reverse-engineering HD firmware isn't rocket science, but it does take skill and time

Arabic cyber espionage group attacking high profile victims (Help Net Security) Kaspersky Lab discovered Desert Falcons, a cyber-espionage group targeting high profile organizations and individuals from Middle Eastern countries

Chinese Stole Anthem Data For HUMINT; Should Raise US 'Hackles' (Breaking Defense) The Chinese just walked out of Anthem's enormous data warehouse (though without encrypting their data it might as well have been a troop of Girl Scouts) with personal data on a quarter of America's population

Report: More US cyber spying on China, others (China Daily) There has been plenty of talk lately by US officials on strengthening cyber security, but none of it touched on US cyber intrusion in other countries

FreeBSD and the YARNBUG — more trouble at the Random Number Mill (Naked Security) The latest vulnerability-with-a-snazzy-name is YARNBUG, and it affects the most recent version of FreeBSD

Ransomware disguised as Google Chrome, and four other security risks CIOs need to know (Financial Post) Insecure web browsers chief source of enterprise malware

Credit card info stolen in BigFish Games site compromise (Help Net Security) Seattle-based casual gaming company Big Fish Games has has its site and personal and financial information of some of its users compromised in an attack that started on last Christmas Eve

Beware of fake Facebook "Copyright Violations" warnings (Help Net Security) The latest Facebook-themed phishing messages doing rounds are trying to trick users into believing they are "making copyright violations" on their Facebook page

IRS Warns Tax Preparers to Watch out for New Phishing Scam; Don't Click on Strange Emails or Links Seeking Updated Information (IRS) The Internal Revenue Service today warned return preparers and other tax professionals to be on guard against bogus emails making the rounds seeking updated personal or professional information that in reality are phishing schemes

Columbia struggles to prevent cyber attacks on city's website (Columbia Missourian) The city's website,, has been essentially defenseless against a series of cyber attacks that have overloaded its servers and rendered it temporarily inoperable since December

RedTube porn website spreads malware, via iFrame invisible to the naked eye (Graham Cluley) RedTube, one of the world's most popular websites for those eager to watch pornographic sex videos, has been compromised and found attempting to infect visiting computers via an Adobe Flash vulnerability

Jamie Oliver website has been serving up malware since December (Graham Cluley) The website of celebrity chef Jamie Oliver, which is said to receive some 10 million visitors every month, has been found serving up the unpleasant dish of malware

What ISIS Really Wants (National Journal) The Islamic State believes it is a key agent of the coming apocalypse. Here's what that means for its strategy

Why does ISIS keep making enemies? (CNN) Whenever ISIS carries out a new atrocity, whether it's beheading a group of Egyptian Christians or enslaving Yazidi women in Iraq or burning its victims alive, the big question most people have is: Why on Earth is ISIS doing this? What could possibly be the point?

Putin directs Muslim anger toward Cold War foes (Stars and Stripes) Hundreds of thousands of Muslims vented their anger in unison, shouting "Allahu Akbar!" as their leader condemned supporters of the satirical French magazine Charlie Hebdo after militants murdered five of its cartoonists

Faulted for Avoiding 'Islamic' Labels to Describe Terrorism, White House Cites a Strategic Logic (New York Times) President Obama chooses his words with particular care when he addresses the volatile connections between religion and terrorism. He and his aides have avoided labeling acts of brutal violence by Al Qaeda, the so-called Islamic State and their allies as "Muslim" terrorism or describing their ideology as "Islamic" or "jihadist"

Security Patches, Mitigations, and Software Updates

Twitter's new tool should stop password sharing and help fend off hijackings (Naked Security) There are many ways to have your Twitter account hijacked: clicking on phishy links; using feeble passwords instead of unique, hefty brutes; or practicing poor password etiquette by, for example, using your pet's name or simply handing over your password to strangers

CVE-2015-1349: A Problem with Trust Anchor Management Can Cause named to Crash (ISC Knowledge Base) When configured to perform DNSSEC validation, named can crash when encountering a rare set of conditions in the managed trust anchors

Cyber Trends

Anthem attack a wake-up call for health care industry, nation (Valley Vindicator) As if patients entering doctor's offices don't have enough anguish, uncertainty and pain to worry about already, along comes a new and mammoth set of unsettling woes confronting them direct from the cyber sphere

Five Cyber Attacks that Made CISOs Rethink Security (IT Business Edge) Click through for five malware attacks that have turned the cyber security industry upside down, as identified by Menlo Security CTO Kowsik Guruswamy


Why Kaspersky's Bank Robbery Report Should Scare Us All (InformationWeek) So, you don't work for a financial institution? Don't think you're off the hook for the kind of theft discussed by Kaspersky. Banks are certainly not the only organizations moving around massive amounts of money every day

Cyber attack risk requires $1bn of insurance cover, companies warned (Financial Times) Companies will need as much as $1bn in cyber insurance coverage as the costs of hacking attacks mount, industry experts are warning, but some businesses are struggling to secure even a tenth of that

Black Friday for cyber insurance (Bankrate Insurance Blog) When I first started writing about cyber insurance back in 2000, the world had just breathed a collective sigh of relief that our computer infrastructure had not been rendered helpless by Y2K. While that may sound like science fiction to teens today, plenty of smart people actually believed that a turn-of-the-millennium apocalypse was imminent because the fear was that our machines weren't yet capable of replacing a "1" with a "2," as in making the transition from 1999 to 2000

MasterCard, Visa up ante in battle for data security (FierceRetailIT) MasterCard and Visa are adding more firepower in their fight to combat data security abuses

How the Government Outsourced Intelligence to Silicon Valley (Truthdig) For years, the outsourcing of defense and intelligence work was, with good reason, controversial in political circles. But in the last years of Bill Clinton's administration, the president authorized the CIA's creation of the first US government-sponsored venture capital firm, In-Q-Tel, designed to invest in cutting-edge Silicon Valley companies

NSA-linked Sqrrl eyes cyber security and lands $7M in funding (Gigaom) Sqrrl, the big data startup whose founders used to work for the NSA, plans to announce Thursday that it is shifting its focus to cyber security with a new release of its enterprise service. The startup is also taking in a $7 million Series B investment round, bringing its total funding to $14.2 million, said Ely Kahn, a Sqrrl co-founder and vice president of business development

Check Point Acquisition Sets Up Skirmish With Palo Alto Networks (CRN) Check Point Software Technologies is ramping up the battle against rival Palo Alto Networks, acquiring Israel-based security startup Hyperwise in a bid to detect advanced threats

Grenville Completes Follow-On Investment in Above Security (Marketwired) Grenville Strategic Royalty Corp. (TSX VENTURE:GRC) ("Grenville") is pleased to announce that is has advanced an additional CAD$500,000 to Sécurité Above Inc. ("Above Security") in order for the company to complete its proposed acquisition of Seccuris Inc. ("Seccuris"). In exchange for the amount advanced to Above Security, Grenville will receive a royalty based on Above Security's gross revenue within Grenville's average royalty rate of between 1% and 4%

Lockheed sees double-digit growth in cyber business (Reuters) Lockheed Martin Corp, the No. 1 provider of information technology to the U.S. government, said it expected double-digit growth in its overall cybersecurity business over the next three to five years, and even bigger gains in the commercial sector

Symantec quietly drops cloud security certification due to lack of adoption (TechTarget) After nearly three years, the Symantec Certified Professional-Cloud Security certification has been discontinued due to a lack of adoption, causing observers to question Symantec's cloud security strategy

Partnership will fight cyber-crime (Yorkshire Post) A partnership has been established which could make it easier for Yorkshire firms to fight off cyber criminals

ThreatTrack Security Named to 2015 Cybersecurity 500 (PRNewswire) ThreatTrack Security is one of the "hottest and most innovative cybersecurity companies to watch in 2015"

Products, Services, and Solutions

Lockheed Martin Partners With UK Supply Chain to Counter Cyber-Security Threats (Israel Defense) Lockheed Martin UK is creating a virtual network of businesses to allow small UK-based companies, specializing in cyber-security expertise, to obtain support and investment for the development of new technologies and markets

Windows 10 will offer password-free authentication (Help Net Security) The upcoming Windows 10 will offer more authentication options instead of just passwords, Dustin Ingalls, Group Program Manager for Windows Security & Identity, has shared in a blog post

Ultra security claimed for IoT applications (newelectronics) Atmel says its latest CryptoAuthentication product — the ATECC508A — is the first to integrate the Elliptic Curve Diffie-Hellman (ECDH) security protocol, an ultra secure method to provide key agreement for encryption/decryption. The part, which also features Elliptic Curve Digital Signature Algorithm (ECDSA) authentication, is targeted at IoT applications

GnuPG 2.0.27 released (Help Net Security) GnuPG is a complete and free implementation of the OpenPGP standard. It allows to encrypt and sign your data and communication, features a versatile key management system as well as access modules for all kinds of public key directories

Exabeam's User Behavior Intelligence Solution Provides an Identity-based Strategy for Detecting Modern Cyberattacks (Business Wire) After eight months of testing, dozens of design partners and beta customers see immediate benefits

Prevoty releases cryptography service to make encryption easier for developers at no cost (Virtual Strategy Magazine) Application security company launches encryption, decryption and hashing service to help developers protect sensitive data

ControlCase Announces "One Audit" to Simplify Compliance with Multiple Regulations (Sys-Con Media) "One Audit" is an enhanced Integrated Compliance and Risk Control Solution for organizations subject to multiple regulations, such as ISO, SOC, PCI, NIST 800-53, HIPAA and HITRUST

New Tufin Orchestration Suite Boosts Security Controls over Heterogeneous Networks with Application-Driven Orchestration (Business Wire) Tufin®, the market-leading provider of Security Policy Orchestration solutions, today announces a new version of its award-winning Tufin Orchestration Suite™

Etisalat Adopts Gemalto Mobile NFC Solution for Accessing Office Facilities (Globe Newswire) Etisalat, the UAE's leading telecoms company, is harnessing mobile NFC solution for corporate access control from Gemalto (Euronext NL0000400653 GTO), the world leader in digital security. The solution enables Etisalat's management to securely access its head office and facilities with a single tap of a mobile phone on a contactless reader

Digital Guardian Launches Digital Guardian 7.0 for Data Protection Against All Threats (BusinessWire) Digital Guardian, the only security solution to protect data from insider and outsider threats with a single endpoint agent, has launched Digital Guardian 7.0, which extends the functionality of the patented Digital Guardian Agent to protect against advanced threats

No Security Alert Left Behind: Swimlane Launches Automated Security Operations Management Platform (PRNewswire) Phoenix Data Security today announced the launch of Swimlane, a new security operations management platform and company focused on empowering enterprises and government agencies with data-driven automation and orchestration for incident response and improved security operations

Technologies, Techniques, and Standards

UTM vs. NGFW: Unique products or advertising semantics? (Tech Target) In comparing UTM vs. NGFW, organizations find it difficult to see if there are differences between the two products or if it is just marketing semantics

Integrated Threat Defence: Joining Forces to Defend Against Cyber Attacks (CSO) Today's security landscape is constantly changing. Attackers are becoming more sophisticated and nimble, leading to new threats and attacks evolving every day

When Spies Tweet (Pacific Standard) How are government agencies adapting to the social media age

Design and Innovation

Google Urges Friendly Hackers To Set Deadlines For Fixes, But How Feasible Is It? (iDigitalTimes) On Friday, Google's Project Zero Team issued a call to action for ethical hackers to hold vendors accountable for timely software fixes in the form of deadline ultimatums

Bits and Chips Beat Guns and Guards (Forbes) I recently expressed the view that Edward Snowden had provided a great service to business. Whatever your views on his actions, one of their key impacts has been to raise the profile of cryptography. I can?t overemphasize the importance of this development, so I think it is worth digging down a little more into the discussion and the implications it has for how companies need to think about data security moving forward

Security should not be hard to implement (Solid State Technology) Data is ubiquitous today. It is generated, exchanged and consumed at unprecedented rates

Research and Development

Breakthrough in facial recognition: the 'Deep Dense Face Detector' (Naked Security) Just take a look at all these great actors

Kiska, rectors and ESET open new research centre (Slovak Spectator) President Andrej Kiska along with rector of the local Slovak Technical University (STU) Robert Redhammer, rector of Comenius University (UK) Karol Micieta and ESET's CEO Richard Marko opened a new research centre opened in Bratislava on February 17


Can tech conservatories save the day? (Washington Post) Once upon a time, if you emerged from college with zero marketable skills but dreams of a safe career path, you went to law school. For three years and $150,000

Legislation, Policy, and Regulation

Gaps in France's Surveillance Are Clear; Solutions Aren't (New York Times) Last June, Patrick Calvar, the head of France's domestic intelligence service, faced a decision: continue surveillance on a French Islamist who had been viewed as a potential threat for a decade, or shift limited resources to help monitor a swelling new generation of fighters returning from Syria

Holder urges more data sharing to thwart would-be Islamic State recruits (McClatchy) U.S. Attorney General Eric Holder called on some 70 nations Wednesday to immediately step up data sharing to help border agents thwart would-be foreign fighters from reaching Syria and Iraq to join the Islamic State

Surprise! America Already Has a Manhattan Project for Developing Cyber Attacks (Wired) "What we really need is a Manhattan Project for cybersecurity." It's a sentiment that swells up every few years in the wake of some huge computer intrusion

Can Silicon Valley and Fort Meade work out their differences? (Brookings) One year ago, President Obama spoke to the world about American surveillance policies

President Obama say he leans more towards strong encryption than law enforcement (Graham Cluley) Well, this is somewhat refreshing

President's cyber security summit: Share attack info but protect privacy, civil liberties (Network World) Cyber security cannot be done right without government and private business cooperating

Phyllis Schneck, DHS Cyber Chief, Elected to Wash100 for Public-Private Collaboration Leadership (GovConExec) Executive Mosaic is honored to introduce Phyllis Schneck, deputy undersecretary for cybersecurity and communications at the Department of Homeland Security, as the newest inductee into the Wash100 — a group of influential leaders in the government contracting arena

Cyber Attack Battle Plan (WVTF) The battle against cyber attacks is being joined in Virginia. Political leaders are looking for new weapons to fight the wave of breaches and hack attacks that seem to be ramping up

Litigation, Investigation, and Law Enforcement

Russian Hacker Charged With Data Breach, But What Has America Done? (Wall Street Cheat Sheet) On Tuesday, the Department of Justice's Office of Public Affairs announced a federal court charge brought this week against a Russian national. The man, 34-year-old Vladmimir Drinkman was first extradited from the Netherlands before facing charges related to the "largest international hacking and data breach scheme ever persecuted in the United States"

Swedish man pleads guilty to peddling Blackshades malware (CSO) Blackshades was widely used in the cybercriminal underground for about three years

For a complete running list of events, please visit the Event Tracker on the CyberWire website.

Newly Noted Events

Philadelphia SecureWorld (Philadelphia, Pennsylvania, USA, March 18 - 19, 2015) Join your fellow security professional for affordable, high-quality cybersecurity training and education at a regional conference near you. Earn CPE credits while learning from nationally recognized industry...

Centers for Medicare and Medicaid Services (CMS) CISO Security & Privacy Forum (Woodlawn, Maryland, USA, April 7, 2015) The CISO Security & Privacy Forum is hosted by the Information Security Privacy Group (ISPG) at CMS. The Vision for ISPG is to provide leadership to CMS in managing information security and privacy risks...

TakeDownCon Rocket City (Huntsville, Alabama, USA, July 20 - 21, 2015) TakeDownCon is a highly technical forum that focuses on the latest vulnerabilities, the most potent exploits, and the current security threats. The best and the brightest in the field come to share their...

Hacker Halted (Atlanta, Georgia, USA, September 17 - 18, 2015) Hacker Halted is a global series of computer and information security conferences presented by EC-Council. The objective of the Hacker Halted conferences is to raise international awareness towards increased...

Upcoming Events

Cyber Framework and Critical Infrastructure: A Look Back at Year One (Washington, DC, USA, February 19, 2015) Last February, the Obama administration rolled out the nation's first cybersecurity standards to protect critical infrastructure. One year later, Dr. Phyllis Schneck, the Department of Homeland Security...

DEFCON | OWASP International Information Security Meet (Lucknow, India, February 22, 2015) Defcon | OWASP Lucknow International Information Security Meet is a combined meet of Defcon and OWASP Lucknow. Defcon Lucknow is a DEF CON registered convention for promoting, demonstrating & spreading...

10th Annual ICS Security Summit (Orlando, Florida, USA, February 22 - March 2, 2015) Attendees come to the Summit to learn and discuss the newest and most challenging cyber security risks to control systems and the most effective defenses. The Summit is designed so you leave with new tools...

Cybersecurity for a New America: Big Ideas and New Voices (Washington, DC, USA, February 23, 2015) In addition to featuring keynote remarks by Admiral Mike Rogers, Director of the National Security Agency, this event will convene experts and practitioners from the public and private sector, military,...

Workforce Development Forum — CyberWorks Information Session (Baltimore, Maryland, USA, February 24, 2015) Are you a technology company that would like to actively participate in growing the right candidates for your open IT and cybersecurity positions? Are you a job seeker interested in pursuing a career in...

Cybersecurity: You Don't Know What You Don't Know (Birmingham, Alabama, USA, February 24 - 25, 2015) What: Connected World Conference in partnership with University of Alabama at Birmingham's Center for Information Assurance and Joint Forensics Research (The Center) have teamed up to bring professionals...

The Future of Cybersecurity Innovation (Washington, DC, USA, February 26, 2015) The US intelligence community has ranked cyberattacks as the No. 1 threat to national security — more than terrorist groups or weapons of mass destruction. But the military's cyberwarriors fight...

NEDForum: Cyber Network Exploitation and Defence: "Darknet & the Primordial Soup of Cyber Crime" (Edinburgh, Scotland, UK, February 27, 2015) Speakers will cover such topics as: "Fear and loathing on Darknet," (Greg Jones, Managing Consultant, Digital Assurance), "Securing the internet of everything" (Rik Ferguson, Global Vice President Security...

2015 Cyber Risk Insights Conference — San Francisco (San Francisco, California, USA, March 3, 2015) Following on the success of the 2014 half-day cyber risk event, Advisen will present a full day of learning and networking for risk managers, CISOs, CROs, insurance brokers, insurance underwriters, reinsurers...

Cybergamut Technical Tuesday: Tor and the Deep Dark Web (Columbia, Maryland, Sioux Falls, March 3, 2015) This talk will explore the use of Tor and how it relates to garnering useful intelligence. Distinguishing attribution or valuable intelligence from limited event data is difficult. Leveraging external...

Boston SecureWorld (Boston, Massachusetts, USA, March 4 - 5, 2015) Join your fellow security professional for affordable, high-quality cybersecurity training and education at a regional conference near you. Earn CPE credits while learning from nationally recognized industry...

Mercury Proposers' Day Conference (IARPA1, Washington, DC, March 5, 2015) The Intelligence Advanced Research Projects Activity (IARPA) will host a Proposers' Day Conference for the Mercury Program on March 5, in anticipation of the release of a new solicitation in support of...

Financial Services Cyber Security Summit: Middle East and North Africa (Dubai, UAE, March 9 - 10, 2015) Building on the success and feedback of our Cyber Security Summit in Europe — 180 attendees, 3 streams, CPE certified — we are pleased to invite you to the Financial Services Cyber Security...

The Vulnerability Economy: Zero-Days, Commerce and National Security (Rockville, Maryland, USA, March 10, 2015) Dr. Ryan Ellis (Belfer Center, Harvard University) will explore a series of topics around cybersecurity including the challenges and opportunities associated with the growing trade in previously unknown...

OISC: Ohio Information Security Conference (Dayton, Ohio, USA, March 11, 2015) Technology First invites you to participate in the 12th Annual Ohio Information Security Conference Wednesday, March 11, at the Sinclair Community College Ponitz Center in Dayton, Ohio. The conference...

RiSK Conference 2015 (Lasko, Slovenia, March 11 - 12, 2015) In recent years RISK conference has become one of the leading events on computer security in the Adriatic region and is attended by engineering as well as executive staff of companies from the region.

B-Sides Vancouver (Vaqncouver, British Columbia, Canada, March 16 - 17, 2015) The third annual Security B-Sides Vancouver is an information security conference that will be held March 16th and 17th. We love to see brand new speakers, seasoned speakers, and everyone in between

Insider Threat 2015 Summit (Monterey, California, USA, March 16 - 17, 2015) The Insider Threat 2015 Summit is about bringing Government and Industry organizations and their cybersecurity leaders together in order to better understand the type of threats that may impact their infrastructure...

2015 North Dakota Cyber Security Conference (Fargo, North Dakota, USA, March 17, 2015) The North Dakota Cyber Security Conference brings together community members from academia, government and industry to share strategies, best practices and innovative solutions to address today's challenges...

IT Security Entrepreneurs Forum: Bridging the Gap Between Silicon Valley & the Beltway (Mountain View, California, USA, March 17 - 18, 2015) IT Security Entrepreneurs Forum (ITSEF) — SINET's flagship event — is designed to bridge the gap between the Federal Government and private industry. ITSEF provides a venue where entrepreneurs...

BSides Salt Lake City (Salt Lake City, Utah, USA, March 20 - 21, 2015) BSides is a community-driven framework for building events for and by information security community members. The goal is to expand the spectrum of conversation

CarolinaCon-11 (Raleigh, North Carolina, USA, March 20 - 22, 2015) CarolinaCon-11 (also hereby referred to as "The Last CarolinaCon As We Know It") will occur on March 20th-22nd 2015 in Raleigh NC (USA). We are now officially accepting speaker/paper/demo submissions...

CyberTech Israel 2015 (Tel Aviv, Israel, March 24 - 25, 2015) In the face of these enemies and threats, individuals, organizations and states are required to produce innovative, unique solutions that would improve the resistance and resilience of the sensitive systems...

2nd Annual ISSA COS Cyber Focus Day (Colorado Springs, Colorado, USA, March 25, 2015) Join us for the Information Systems Security Association (ISSA) — Colorado Springs Chapter — Cyber Focus Day set to take on Wednesday, March 25, 2015 at the University of Colorado Colorado...

CYBERWEST: the Southwest Cybersecurity Summit (Phoenix, Arizona, USA, March 25 - 26, 2015) The purpose of CYBERWEST is to bring together Government and businesses to: Exchange information and learn in areas of policy and strategy; technology and R&D; workforce training and education; and economic,...

Women in Cyber Security (Atlanta, Georgia, USA, March 27 - 28, 2015) Despite the growing demand and tremendous opportunities in the job market, cybersecurity remains an area where there is significant shortage of skilled professionals regionally, nationally and internationally.

Automotive Cyber Security Summit (Detroit, Michigan, USA, March 30 - April 1, 2015) The debut Automotive Cyber Security Summit will bring together CTOs, CSOs, Engineers and IT professionals from GM, KIA, Nissan, Bosch, Qualcomm and more for three days of case studies, workshops, panel...

Insider Threat Symposium & Expo (Laurel, Maryland, USA, March 31, 2015) The National Insider Threat Special Interest Group (NITSIG) announced that it will hold FREE 1 day Insider Threat Symposium & Expo (ITS&E) on March 31, 2015 in Laurel, Maryland. The symposium is exclusively...

Grow your brand and reach new customers.

Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.

Be a part of the CyberWire story.

People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.