skip navigation

More signal. Less noise.

Daily briefing.

Boko Haram takes a page from ISIS's information operations playbook and shows the junior varsity can be a murderous and coldly repellent as the varsity.

Consensus attribution of the Anthem breach to China leads analysts to ask what good such attribution does. Opinion ranges from "none" to "a lot."

Observers think the Lenovo affair is just "the tip of the crapware iceberg."

The FREAK (Factoring Attack on RSA-EXPORT Keys) vulnerability is said to affect export-grade encryption in widespread use since the 1980s, enabling attackers to break HTTPS in both Apple and Android devices.

Cisco's Talos unit observes attackers using the Angler exploit kit to shadow GoDaddy subdomains.

Symantec describes a phishing campaign designed to induce iCloud users to surrender credentials.

AdaptiveMobile finds a worm, "Gazon," spreading through mobile devices via SMS spam: the hook's a bogus Amazon gift card offer.

A MongoDB zero-day exploit is hawked in the black market.

Mobile payment systems are increasingly popular but increasingly vulnerable, and banks are reported "scrambling" for a fix to the systems' lax security.

The US GAO tells the FAA its National Airspace System is vulnerable to cyber attack. The White House releases its annual cyber report card for Federal agencies to Congress: grades are disappointing — if many agencies were middle-schoolers, they'd spend their summer in remedial classes.

China wonders why people object to its surveillance policies, since, China says, they're so American in style.

Former US DCI Petraeus pleads to a misdemeanor. Former Secretary of State Clinton's email accounts are scrutinized.

Notes.

Today's issue includes events affecting China, European Union, Netherlands, New Zealand, South Africa, United Kingdom, United States.

Cyber Attacks, Threats, and Vulnerabilities

Boko Haram releases beheading video, echoing propaganda of ISIL (Al Jazeera America) The footage, similar in production style to recent ISIL videos, may suggest an evolution of the Nigerian group's methods

Anthem Attribution to China: Useful? (BankInfoSecurity) Report links breach to Chinese professor; experts respond

The Anthem Hack: All Roads Lead to China (ThreatConnect Blog) When news of the Anthem breach was reported on February 4th, 2015, the security industry quite understandably went wild. A breach of this magnitude was certainly unprecedented

Bloatware blues not limited to Lenovo (FierceCIO) The Lenovo Superfish debacle is just the tip of the crapware iceberg

Lenovo Only Made Up To $250,000 From Nightmare Superfish Deal, Say Sources (Forbes) Lenovo is about to kill off a small but troublesome source of its revenue: crapware. Some call it adware, some bloatware, others malware, but whatever the correct nomenclature, the PC maker doesn't want anything more to do with it after the debacle over Superfish, the "visual advertising" tech that posed a real security threat to millions of Lenovo PC users. It can certainly afford to get rid of it too

New Freak Attack Threatens Many SSL Clients (Threatpost) For the nth time in the last couple of years, security experts are warning about a new Internet-scale vulnerability, this time in some popular SSL clients. The flaw allows an attacker to force clients to downgrade to weakened ciphers and break their supposedly encrypted communications through a man-in-the-middle attack

Massive FREAK security flaw breaks HTTPS in Android, Apple devices (Extreme Tech) A recently announced security flaw, dubbed FREAK (Factoring RSA Export Keys) has significant implications for Android and Apple devices that connect to other websites via HTTPS — and offers an object lesson in why deliberately weakening cryptographic standards to allow for backdoors or other forms of "protection" is such an emphatically bad idea

FREAK attack: What is it? Here's what you need to know (Graham Cluley) I've heard people talking about a new security flaw called FREAK. What is it?

Attackers target subdomains of GoDaddy customers (CSO) 10,000 malicious subdomains used by exploit kit

Threat Spotlight: Angler Lurking in the Domain Shadows (Cisco Blogs) Over the last several months Talos researchers have been monitoring a massive exploit kit campaign that is utilizing hijacked registrant accounts to create large amounts of subdomains for both initial redirection and exploitation. This campaign has been largely attributed to Angler Exploit Kit with fileless exploits serving various malicious payloads

Cybercriminals phish iCloud credentials from victims of iPhone, iPad theft (Symantec Security Response Blog) Attackers have created phishing sites to trick users whose iOS devices have been lost or stolen into handing over their iCloud credentials

Worm.Gazon: Want Gift Card? Get Malware (AdaptiveMobile Blog) There is a Chinese proverb: 'A small spark can burn across a prairie'. It also applies to the malware world. A simple piece of malware is on the way to become one of the 'spammiest' mobile malware outbreaks seen yet. This malware we have dubbed Gazon spreads via SMS with a shortened link to itself in the spam message, redirecting a potential victim to a webpage that promises an Amazon gift card if you install an APK file hosted on the page

phpMoAdmin MongoDB GUI affected by a Zero-Day Remote Code Execution flaw (Security Affairs) Security experts are alerting on the availability in the underground black market of a zero day exploit for a vulnerability in the phpMoAdmin MongoDB GUI

Research Finds 400k Security Camera DVRs with Hardcoded Credentials (A Tech Dad) I've been tinkering with passive research using public scans which are freely available via Project Sonar. I was curious to search and look for any devices which may have username and passwords hardcoded so I decided to search for a few instances where the username and passwords appear hardcoded to admin. I thought that surely there couldn't be many — so I kicked off the scan

Black and White JPEG in PDF Files Can Host a Malicious Script (Softpedia) The code is invisible to some PDF analysis tools

Stealing Keys from PCs using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation (IACR) We present new side-channel attacks on RSA and ElGamal implementations that use the popular sliding-window or fixed-window (m-ary) modular exponentiation algorithms

Major Chip Kit Maker ASML Hit by Cyber Attack (Infosecurity Magazine) Semiconductor equipment maker ASML has played down a recently discovered cyber attack on its systems, claiming that no 'valuable' files were stolen

Brazilian Internauts have Cyber-Crooks Compromise their Internet Connections (Spamfighter News) According to Proofpoint, cyber-criminals by altering the DNS (domain name system) configurations within Internauts' routers in Brazil have been getting hold over such users' online connections recently

Venmo mobile payment service under fire for security carelessness (Naked Security) Venmo under fire for security lapses.Venmo is taking heat after a news report last week revealed security holes you could "drive a truck through," in the words of one aggrieved Venmo user whose account was defrauded to the tune of $2,850

Amid Apple Pay fraud, banks scramble to fix Yellow Path process (TechTarget) Banks are rushing to fix sloppy authentication processes at the heart of rising Apple Pay fraud. Experts also worry about potential fraud with other mobile payment systems

Hackers Breach Perspectives Website for Religious Classes (Softpedia) Advertisements for abortion pills scattered on the site. Cybercriminals leveraged a vulnerability in the Perspectives website and managed to access a database containing eCheck payment information for website transactions

US airspace system vulnerable to cyber attack (Air Traffic Management) While the United States has taken steps to protect its air traffic control systems from cyber-based and other threats, significant security control weaknesses remain, according to a government watchdog

Federal agencies score low on cyberdefense assessment report (FierceCIO) It may be a perfect example of "do as I say, not as I do," as federal government agencies have been revealed to be among the worst violators of good cyberdefense, despite all the rhetoric that comes out of Washington around bolstering IT security

6 Biggest Blunders in Government's Annual Cyber Report Card (Nextgov) The White House has released its yearly assessment of agency compliance with the governmentwide cyber law known as the Federal Information Security Management Act. And given the spate of breaches and hacks that hit both government and the private sector, the results may not be all that surprising

Annual Report to Congress: Federal Informaiton Security Management Act (Office of Management and Budget) As cyber threats continue to evolve, the Federal Government is embarking on a number of initiatives to protect Federal information and assets and improve the resilience of Federal networks

Security Patches, Mitigations, and Software Updates

D-Link fixes critical router flaws (Help Net Security) D-Link has released new firmware for its DIR-820L Wi-Fi dual band cloud router, which fixes a number of security vulnerabilities. One of these can apparently be exploited by attackers to gain full access to the device independently of whether the "WAN management" option is enabled on the device or not

AWS avoids mass cloud reboot to fix Xen bug (FierceITSecurity) Amazon Web Services (AWS) said that it has averted a need for an en masse reboot of its Elastic Compute Cloud (EC2) customers, after engineers found a way to patch most of its cloud servers without rebooting

Patch Tuesday: Microsoft Alters Plans to Deliver SharePoint Updates through Windows Update (Windows IT Pro) In February, Microsoft began delivering both security updates and non-security product updates for SharePoint through Windows Update. This caught a lot of customers by surprise and not in a good way. Delivering non-security updates to critical SharePoint components has the potential to break things if untested. And, considering how bad each patching month has been in the last couple years, customers would rather retrieve the non-security updates themselves and test and install in a controlled manner

Microsoft Revamps Azure Preview Portal, Upgrades Database Security (eWeek) Microsoft issues new quality of life improvements for its cloud application management and monitoring toolset and rolls out a new Azure SQL Database security feature

Cyber Trends

Cyberspace Conflict Growing More Destructive, NSA's Chief Says (Bloomberg) Conflict in cyberspace will worsen as governments, criminals and others carry out more sophisticated and destructive hacking attacks, creating a threat comparable to what the U.S. faced during the Cold War, according to the head of the National Security Agency

What's Next in Government Surveillance (The Atlantic) A future awaits where countries share intelligence one minute, and hack and cyberattack each other the next

Breach Victims Three Times Likelier To Be Identity Theft Victims (Dark Reading) Twenty-eight percent of them say they later avoided the merchants that failed to protect their personal information

This Article Was Written With the Help of a 'Cyber' Machine (Wall Street Journal) Overuse of prefix sparks a backlash, but alternatives are few; 'computery'

Firewalls: The Once and Future King of Network Security (MarketWired) FireMon report finds 90 percent of practitioners still view firewalls as a strategic security pillar; highlights firewalls' significant role in securing SDN, cloud and DevOps environments

Half of Businesses Lack Security Intelligence to Protect Against Cyber Threats according to Symantec and Deloitte Research (Zawya) Lack of security intelligence is leading to cyber-attack security false alarms and vulnerable, exposed organizations

Security threats and the retail industry (Help Net Security) Only 18 percent of retail IT security professionals are concerned that point of sale devices are being targeted by cyber criminals, and only 20 percent are "confident" that point of sale devices are securely configured, according to Tripwire

Marketplace

Lockheed sees shift in focus on infrastructure cyber security (Reuters) Lockheed Martin Corp, the Pentagon's No. 1 supplier, said it has seen a "sea change" in demand for cyber security services in critical infrastructure areas such as energy, oil and gas, and financial institutions over the past 18 months

Technology is not to blame for online attacks: FireEye (ZDNet) FireEye's Dave Merkel said investment in technology, intelligence, and expertise will ensure that online attacks become 'manageable' for businesses

Palo Alto rallies to new highs after analysts praise results/guidance (Seeking Alpha) Though Palo Alto Networks (NYSE:PANW) opened lower today in the wake of its FQ2 beat and strong FQ3 guidance, shares gradually moved higher and finished up 2%, making new highs in the process. A slew of positive analyst notes — at least 11 firms hiked their targets, many to the $165-$170 range — helped the next-gen firewall vendor's cause

Palo Alto CEO High-Fives Partners For Better-Than-Expected Results (CRN) Palo Alto Networks reported a net loss for its fiscal second quarter, but said earnings were up, thanks to partners such as Dimension Data that helped nab market share from rivals for positive growth

Symantec Exec: Split Is Underway, And We See Massive Opportunity Ahead For Partners (CRN) As Symantec navigates the first major steps in its split in two, the company is preparing its partners for what it sees as a massive opportunity ahead

Tempered Networks wants to secure critical infrastructure so hacks don't lead to sewage spills (Gigaom) Although the rise of the internet of things means that organizations could gather enormous quantities of data through the billions of connected devices out there today, the big elephant in the room is that security is not where it needs to be, which means there's a lot more access points for thieves to hack into

Here Are the 5 Cybersecurity Startups in the New Mach37 Class (DCInno) Virginia is seeking to establish itself as a cybersecurity mecca

Huawei preps to drop mobile & wearables lovebombs on U.S. (Register) C'mon Americans, pleeeeease love our cuddly Chinese firm

Raytheon Opens Anti-Cyber Threat Center in England (ExecutiveBiz) Raytheon has opened a $4.6 million Gloucester, England-based cyber crime prevention center in an effort to help protect computer networks

WhiteHat gets dressed for channel success (CRN) Security vendor looking to double UK partner base for its 'cybersecurity in a box' offering

Farry Launches WhiteHat Security Training Academy (Northern Ireland Executive) Employment and Learning Minister Dr Stephen Farry today launched the first WhiteHat Training Academy in conjunction with WhiteHat Security

Northrop's Kathy Warden Selected to Wash100 for Her Leadership in Cybersecurity (GovConWire) Kathy Warden, Northrop Grumman corporate vice president and president of information systems, has been chosen as one of this year's Wash100 most influential leaders in GovCon for her leadership in cyber and homeland security

CrowdStrike Appoints President of AppDynamics and Sales Veteran Joe Sexton to its Board of Directors (PRNewswire) CrowdStrike Inc., a leading provider of next-generation endpoint protection, threat intelligence, and services, today announced that Joe Sexton has been appointed to the company's board of directors. Sexton joins CrowdStrike's board as the company experiences rapid growth and expands globally

Camber Announces New Executive Leadership Team (PRNewswire) Company names new President and Chief Financial Officer

Products, Services, and Solutions

Blue Coat Launches Encrypted Traffic Management Ready Certification Program (CNN Money) ETM ready will generate best-in-class solutions for combating security threats hidden in encrypted traffic

Darktrace: The enterprise immune system (IT World Canada) I understand that many of you reading this have never worked in a security operations centre (SOC), but there's a good chance you've seen them in movies

Rapid7 Launches Incident Response Services to Help Enterprises Respond Confidently to Advanced Attacks (BusinessWire) Rapid7 provides world-class expertise to improve incident response planning and manage breach investigations

Cylance Embarks on 'Unbelievable' Nationwide Roadshow (MarketWired) Attendees across the U.S. will have the opportunity to live test their own malware against the leading endpoint security solution, CylancePROTECT

Radware Introduces New Attack Mitigation Platform for High Volume Cyber-Attacks (GlobeNewswire via Nasdaq) Latest Radware platform boasts up to 300gbps mitigation capacity and handles 230 million packets per second of attack traffic to defend against evolving and growing cyber-attacks

Avast Announce The Launch Of SecureMe Designed To Protect From WiFi Hacking (Android Headlines) MWC has been in full swing over the last few days and there have been a number of big announcements. Today though, known security and internet virus protection company, Avast were making a few announcements of their own. One of those in particular was the launch of a new service from Avast which is being dubbed 'SecureMe'. For those, who are worried about connecting to WiFi networks securely and especially those in public places, then this might be the announcement for you. There has been much press recently surrounding the notion of WiFi hacking, where criminals use unsecured connections to reroute web traffic to fake internet sites. Once the user enters their credentials, the criminals then know. As such, this is a useful feature for those that often connect to WiFi networks in airports, cafes, hotels and the likes

Healthcare Organizations Lack Tools for Cyber Situational Awareness and Threat Assessment (BusinessWire) HITRUST transforms model for effective cyber risk management

New AVG Zen security platform is ready for the Internet of Things (ITProPortal) AVG has unveiled the latest version of its multi-platform security tool hoping to prepare and safeguard individuals against the growth of the Internet of Things

Brocade: The fabric that holds everything together (Federal News Radio) Judson Walker is the Systems Engineering director for Brocade. He helps federal information professionals improve speed and security on federal networks

AnchorFree Documents the Danger to Cellular Service Providers of Offloading Subscribers to Wi-Fi (BusinessWire) Ninety-two percent of Mobile World Congress participants are not protecting themselves while using public Wi-Fi; new product safeguards users

Arxan launches security support for mobile gamesArxan launches security support for mobile games (Develop) App protection firm's latest release will help devs fight clones and hacking

Aruba all-in-one box simplifies branch office communications (Network World) The 7000 series combines a host of capabilities into a single unit, featuring a stateful firewall, deep packet inspection, WAN optimization, RF interference control and user access control

M2Mi Announced as Winner of the IoT/M2M Innovation World Cup 2014/2015 in the Security Category (PRWeb) Machine-to-Machine Intelligence (M2Mi) Corporation today announced that M2M Intelligence®, the essential platform for the M2M and IoT economy, is the winner of the IoT/M2M Innovation World Cup 2014/2015 in the Security category for its unique Lockbox security technology

How will Samsung Pay compare to Apple Pay? (Macworld via CSO) As soon as Tim Cook unveiled Apple Pay back in September, two things were instantly clear: 1) Contactless payments had arrived; and 2) Samsung was going to copy it. So when Samsung unveiled its next flagship phones, the Galaxy S6 and Galaxy S6 Edge, on Sunday in Barcelona, I followed along with great interest, ready to snicker at its iPhone-like curved edges, fingerprint sensor, and perfectly circular speaker grilles

Technologies, Techniques, and Standards

Geofencing could add security layer for mobile devices (CSO) Geofencing could offer an extra layer of security but some worry about privacy and battery life

Academia

Cerovsky named director of UWF Center for Cybersecurity (Pensacola News Journal) The University of West Florida has named retired Navy Capt. Susan K. Cerovsky as director of the Center for Cybersecurity, effective March 16, 2015. Cerovsky joins UWF after nearly 30 years as an officer in the U.S. Navy

Norwich University Partners with New Cyber Intelligence Tool (Vermont Digger) Norwich University, the oldest private military college in the U.S. and ranked second best in the country for cyber security courses and degree programs, has partnered with Silobreaker to use their online threat intelligence product in their cyber forensics classes

Northrop Grumman Foundation Renews Commitment as Presenting Sponsor of AFA's CyberPatriot with $5.4 Million Grant (PRNewswire) The Air Force Association today announced that the Northrop Grumman Foundation has renewed their commitment as presenting sponsor of AFA's CyberPatriot National Youth Cyber Education Program. The Northrop Grumman Foundation, presenting sponsor of the program since 2010, pledged $5.4 million dollars to extend their support through 2019

GCHQ experts to teach university students about ethical hacking, penetration testing and security networks (Computing) British spy agency GCHQ is looking to attract the cream of the crop of budding computer scientists to attend a new summer school in which its own experts will teach students about ethical hacking, penetration testing and security networks

Legislation, Policy, and Regulation

China says new cybersurveillance proposal follows US security practices (IDG via CSO) China is scratching its head over why the U.S. is opposing a new anti-terror law relating to cybersurveillance when the U.S. and other countries have also requested that tech companies hand over data to help stop terrorists

Protect society against cyber crimes: Experts (Arab News) A security expert has emphasized the need for collaboration in order to protect society against cybertattacks during the 6th annual Cyber Defense Summit in Riyadh on Monday

Build A 'Department Of Cyber:' Former DNI McConnell (Breaking Defense) Sen. Susan Collins has a bill about how to improve cyber sharing that should go to markup next week and she spoke about the challenges cyber poses to the government this morning at the Intelligence and National Security Alliance annual conference here. Three former directors of National Intelligence — John Negroponte, Mike McConnell and Dennis Blair — also spoke about those challenges before an audience of more than 700 people at INSA

GAO: Require states to show cost benefits of anti-fraud systems (FierceHealthPayer) While the Centers for Medicare & Medicaid Services supports states' efforts to use technology to root out improper payments, its failure to require states to document the effectiveness of these systems means no one knows whether they really work, a Government Accountability Office report finds

Calif. Would Tighten Cyber Porn Laws (Courthouse News Service) California legislators have proposed bills that would make revenge porn a new crime and increase protections for its victims

Litigation, Investigation, and Law Enforcement

Exposing the organized crime of tomorrow (Help Net Security) Europol identified a series of key driving factors that will impact the future landscape of serious and organized crime in Europe

Petraeus reaches deal to plead guilty to misdemeanor; likely won't face prison (Washington Post) David H. Petraeus, the retired general and former CIA director, has reached an agreement with federal prosecutors to plead guilty to a misdemeanor charge for mishandling classified material

'There's code-word stuff in there': Case against David Petraeus laid out in court documents (Washington Post) David H. Petraeus, a legendary U.S. general who resigned as director of the CIA in shame in 2012, has reached an agreement with federal prosecutors to avoid jail time for sharing classified information with a biographer with whom he had an extramarital affair

Petraeus Is Getting Off Easy, But Not All Intel Leakers Are So Lucky (The Atlantic via Defense One) The former CIA director is receiving a $40,000 fine and two years probation for leaking classified information, but many others have been jailed for years for their offenses

Clinton defends use of personal e-mail at State (USA TODAY) Hillary Clinton's exclusive use of a personal e-mail account to conduct government business during her four-year tenure as secretary of State may have violated federal regulations, The New York Times reported Monday night

How Secure Could Hillary Clinton's Personal Email Be? (National Journal) Beyond the transparency concerns, security experts wonder whether the former secretary of State's emails were protected from foreign hackers

Edward Snowden wants to return to U.S. if he's guaranteed fair trial (AP via CTV News) NSA systems analyst Edward Snowden wants to return to the United States from Russia if he's guaranteed a fair trial, his Russian lawyer said Tuesday

Hospital Sues Bank of America Over Million-Dollar Cyberheist (KrebsOnSecurity) A public hospital in Washington state is suing Bank of America to recoup some of the losses from a $1.03 million cyberheist that the healthcare organization suffered in 2013

Fines are few, but healthcare data breaches aren't (Helathcare Finance) Federal overseers have seldom penalized the health care organizations responsible for safeguarding this data

Uber subpoenas GitHub in search for hacker of driver database (Naked Security) Uber is a darling of the investor class, most recently raising $1.6 billion from Goldman Sachs, as it's raced out ahead of competitors like Lyft to cement market dominance in the US, all the while aiming for global domination

Markman Order Entered in Finjan v. Sophos (MarketWatch) Court adopts all of Finjan's claim constructions

Is this the ultimate spam fail? (Naked Security) We're not sure whether we're supposed to laugh at cybercrime, because that would mean we're deriving delight from crookery

Gunshots hit building at National Security Agency campus in Fort Meade (Washington Post) Gunshots struck a building at the National Security Agency campus on Tuesday, a U.S. Park Police spokeswoman said

For a complete running list of events, please visit the Event Tracker on the CyberWire website.

Newly Noted Events

Cyber Security Opportunities in Japan, S. Korea and Taiwan Webinar (Online, March 10, 2015) Export.gov, of the US Department of Commerce, invites you to listen to experts from the Japan, South Korea and Taiwan and learn how to position your company for success in these countries. Learn about...

Upcoming Events

Boston SecureWorld (Boston, Massachusetts, USA, March 4 - 5, 2015) Join your fellow security professional for affordable, high-quality cybersecurity training and education at a regional conference near you. Earn CPE credits while learning from nationally recognized industry...

Mercury Proposers' Day Conference (IARPA1, Washington, DC, March 5, 2015) The Intelligence Advanced Research Projects Activity (IARPA) will host a Proposers' Day Conference for the Mercury Program on March 5, in anticipation of the release of a new solicitation in support of...

Financial Services Cyber Security Summit: Middle East and North Africa (Dubai, UAE, March 9 - 10, 2015) Building on the success and feedback of our Cyber Security Summit in Europe — 180 attendees, 3 streams, CPE certified — we are pleased to invite you to the Financial Services Cyber Security...

The Vulnerability Economy: Zero-Days, Commerce and National Security (Rockville, Maryland, USA, March 10, 2015) Dr. Ryan Ellis (Belfer Center, Harvard University) will explore a series of topics around cybersecurity including the challenges and opportunities associated with the growing trade in previously unknown...

OISC: Ohio Information Security Conference (Dayton, Ohio, USA, March 11, 2015) Technology First invites you to participate in the 12th Annual Ohio Information Security Conference Wednesday, March 11, at the Sinclair Community College Ponitz Center in Dayton, Ohio. The conference...

RiSK Conference 2015 (Lasko, Slovenia, March 11 - 12, 2015) In recent years RISK conference has become one of the leading events on computer security in the Adriatic region and is attended by engineering as well as executive staff of companies from the region.

B-Sides Vancouver (Vaqncouver, British Columbia, Canada, March 16 - 17, 2015) The third annual Security B-Sides Vancouver is an information security conference that will be held March 16th and 17th. We love to see brand new speakers, seasoned speakers, and everyone in between

Insider Threat 2015 Summit (Monterey, California, USA, March 16 - 17, 2015) The Insider Threat 2015 Summit is about bringing Government and Industry organizations and their cybersecurity leaders together in order to better understand the type of threats that may impact their infrastructure...

2015 North Dakota Cyber Security Conference (Fargo, North Dakota, USA, March 17, 2015) The North Dakota Cyber Security Conference brings together community members from academia, government and industry to share strategies, best practices and innovative solutions to address today's challenges...

IT Security Entrepreneurs Forum: Bridging the Gap Between Silicon Valley & the Beltway (Mountain View, California, USA, March 17 - 18, 2015) IT Security Entrepreneurs Forum (ITSEF) — SINET's flagship event — is designed to bridge the gap between the Federal Government and private industry. ITSEF provides a venue where entrepreneurs...

Philadelphia SecureWorld (Philadelphia, Pennsylvania, USA, March 18 - 19, 2015) Join your fellow security professional for affordable, high-quality cybersecurity training and education at a regional conference near you. Earn CPE credits while learning from nationally recognized industry...

2015 Cyber Security Summit (McLean, Virginia, USA, March 19, 2015) During Congressman Mike Rogers' "The Code War in America" talk at the June 2013 POC breakfast, he challenged all of us to "recognize that every day U.S. businesses are targeted by governments like China...

BSides Salt Lake City (Salt Lake City, Utah, USA, March 20 - 21, 2015) BSides is a community-driven framework for building events for and by information security community members. The goal is to expand the spectrum of conversation

CarolinaCon-11 (Raleigh, North Carolina, USA, March 20 - 22, 2015) CarolinaCon-11 (also hereby referred to as "The Last CarolinaCon As We Know It") will occur on March 20th-22nd 2015 in Raleigh NC (USA). We are now officially accepting speaker/paper/demo submissions...

Cyber Security Conference 2015 (Bolton, UK, March 23 - 24, 2015) Cyber Security Conference 2015 is a coming together of the North of England's two most successful Cyber Security Conferences; BEC Information & Data Security Conference and Lancaster University's North...

CyberTech Israel 2015 (Tel Aviv, Israel, March 24 - 25, 2015) In the face of these enemies and threats, individuals, organizations and states are required to produce innovative, unique solutions that would improve the resistance and resilience of the sensitive systems...

2nd Annual ISSA COS Cyber Focus Day (Colorado Springs, Colorado, USA, March 25, 2015) Join us for the Information Systems Security Association (ISSA) — Colorado Springs Chapter — Cyber Focus Day set to take on Wednesday, March 25, 2015 at the University of Colorado Colorado...

28th Annual FISSEA Expo (Gaithersburg, Maryland, USA, March 25, 2015) This year's theme is "Changes, Challenges, and Collaborations: Effective Cybersecurity Training." Through numerous high quality sessions, over 100 attendees will learn new ways to improve their IT security...

CYBERWEST: the Southwest Cybersecurity Summit (Phoenix, Arizona, USA, March 25 - 26, 2015) The purpose of CYBERWEST is to bring together Government and businesses to: Exchange information and learn in areas of policy and strategy; technology and R&D; workforce training and education; and economic,...

Women in Cyber Security (Atlanta, Georgia, USA, March 27 - 28, 2015) Despite the growing demand and tremendous opportunities in the job market, cybersecurity remains an area where there is significant shortage of skilled professionals regionally, nationally and internationally.

Automotive Cyber Security Summit (Detroit, Michigan, USA, March 30 - April 1, 2015) The debut Automotive Cyber Security Summit will bring together CTOs, CSOs, Engineers and IT professionals from GM, KIA, Nissan, Bosch, Qualcomm and more for three days of case studies, workshops, panel...

Insider Threat Symposium & Expo (Laurel, Maryland, USA, March 31, 2015) The National Insider Threat Special Interest Group (NITSIG) announced that it will hold FREE 1 day Insider Threat Symposium & Expo (ITS&E) on March 31, 2015 in Laurel, Maryland. The symposium is exclusively...

Grow your brand and reach new customers.

Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.

Be a part of the CyberWire story.

People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.