skip navigation

More signal. Less noise.

Daily briefing.

Anonymous claims to have taken down 5500 ISIS-affiliated Twitter accounts. Opinions differ over how effective an Anonymous cyber offensive against the Caliphate will prove to be (many predict that rickrolling with a Guy Fawkes mask will be of small consequence). Some of the breathless denizens of Fleet Street look at attack maps and see Britain suffering in an ISIS-Anonymous cyber crossfire, but this appears much exaggerated.

Observers wonder why ISIS hasn't undertaken cyber terrorism, by which they mean cyber attacks with physical consequences. (ISIS sympathizers have certainly engaged in cyber-vandalism against soft targets like Jewish schools and small-market US media outlets, but that's a different matter.) In all probability ISIS lacks capability and is more interested in direct massacre than SCADA takedowns.

Some experts, speaking more-or-less on behalf of Western security services, think ISIS profited from Snowden's revelations, but how much terrorists actually use encrypted communications remains unclear. French authorities appear to have foreseen an attack based on their own surveillance capabilities, but were off in predicting dates and places — the familiar difficulty of extracting signal from noise. The encryption debate continues, with the tech industry (minus Blackberry but plus some US Representatives) largely pro-encryption and law enforcement (especially in the UK, and supported by the Manhattan DA) often anti.

Criminals resort to some familiar, albeit upgraded, malware: Blackhole is back, as are Destover and Dark Seoul.

Analysts think Microsoft has upped its security credibility.

Nations continue to grope toward cyber norms, but many think recent diplomacy has changed little.


Today's issue includes events affecting Belgium, Canada, China, France, Iraq, Republic of Korea, Mexico, Russia, Singapore, Switzerland, Syria, United Kingdom, United States.

Cyber Attacks, Threats, and Vulnerabilities

ISIL releases video threatening attack on New York City (USA Today) The Islamic State released a new propaganda video threatening attacks on New York City, city officials confirmed Thursday

French Intel Predicted Paris Attack, but Got the Timing Wrong (Haaretz) They thought ISIS would aim for UN Climate Change Conference in the French capital on November 30, when dozens of world leaders would be in town

'It's All Back in Snowden's Lap' (Politico) Former CIA Acting Director Michael Morell on how the NSA leaker's revelations might have led to the Paris attacks

Anonymous claims it has eliminated 5,500 ISIS Twitter accounts (The Hill) The hacking group Anonymous said Tuesday it has taken down 5,500 Twitter accounts tied to the Islamic State in Iraq and Syria (ISIS)

Hackers To Destroy ISIS By Unleashing Waves Of Cyber Attacks? [VIDEO] Islamic State Laughs Off 'Idiotic' Threats (Jobs & Hire) A war has officially begun in the cyber world realm as an international team of brave hackers known as Anonymous threatened to unleash series of cyber-attacks against the vicious terrorist group, ISIS

Islamic State goes cyber: OPSEC, app ratings and a 'Jihadi Help Desk' (Army Times) As attacks sponsored by the Islamic State group spread beyond its ill-defined borders, its members continue to communicate using the same types of messaging applications, forums and social media sites familiar to tech users worldwide

Security experts: ISIS' favorite messaging app is no match for feds (ZDNet) The app's cryptography is like "being stabbed in the eye with a fork," according to one leading cryptographer

How Anonymous really targets ISIS (CSO) With the ISIS attacks on Paris, Anonymous declared war on ISIS. The reality is that is more hype than fact, and misleading

Will Anonymous' plot against Islamic State make any difference? (+video) (Christian Science Monitor Passcode) Or are digital vigilantes just hindering government efforts to pursue and disrupt the militant group?

Britain hit by massive cyber-attack as Islamic State hackers launch assault against Anonymous (Mirror) Britain has come under sustained cyber-attack as Islamist hackers launch revenge attacks against Anonymous, the shadowy group which has vowed to wipe "ISIS off the internet"

Why Aren't Terrorists Committing More Cyberattacks? (Nextgov) The fear of terrorist organizations flexing their cyber muscles by launching a debilitating cyberattack is far greater than the actual reality of the situation, said Tricia Bacon, former counterterrorism official for the State Department at an event Tuesday

Hacktivists Threaten to Target Law Enforcement Personnel and Public Officials (US Federal Bureau of Investigation) Law enforcement personnel and public officials may be at increased risk of being targeted by hacktivists

Blackhole exploit kit makes a surprising encore appearance (IDG via CSO) Malwarebytes saw an attack that reused old exploits, probably limiting its effectiveness

Hacking group that hit South Korea may be at it again with new target (IDG via CSO) It appears the same malware was recently used against an organization based in Europe

Damballa discovers new toolset linked to Destover (Damballa: Day Before Zero) Attacker's arsenal helps them to broaden attack surface

Sakula Reloaded (Crowdstrike: the Adversary Manifesto) Often during the investigation of sophisticated threat actors, the demarcation between the different attackers and campaigns are blurry

Siri's Flaw: Apple's Personal Assistant Leaks Personal Data (TrendLabs Security Intelligence Blog) Siri for iOS devices has made everyday tasks easier; whether it is getting directions to the nearest gas station or staying in contact with growing social media networks

Trend Micro warns of Ashley Madison fallout and rise in data breaches (Inquirer) A range of problems, and a breach is more than one

Googlebot May Accidentally DDoS Your Spam-Infected Website (Softpedia) Webmasters that remove large-scale spam infections from their website may sometimes be DDoSed by Google's search engine crawling bot, a.k.a. Googlebot

Mixing ERP and production systems: Oil industry at risk, say infosec bods (Register) There will be pwnage

BIMCO Conference Hears There Is "Significant Potential For Cyber Disruption" And "Malicious Takeover" Of Systems Onboard Ships (Hellenic Shipping News) Attendees of BIMCO's Annual Conference in Hamburg will today hear the very latest findings on the potential vulnerabilities of ships to cyber attacks

Child Porn and Malware in Facebook Scam (Check & Secure) As reported on by Cybercrime Coordination Unit Switzerland (CYCO), ever more pictures are emerging on Facebook with worrying scenes of child pornography depicted. These are the result of hacked Facebook accounts

UC Health investigating possible data breach (WLWT 5) Officials: Email mishap affected more than 1,000 people

Security Patches, Mitigations, and Software Updates

Gmail: "Warning! That email was not sent through an encrypted connection." (Naked Security) Google has announced plans to tell Gmail users which emails have been sent through an encrypted connection and which have not

Cyber Trends

Security in 2016: The death of advanced persistent threats (ZDNet) Kaspersky predicts that APTs will cease to exist next year — but what will take their place?

Cyberattacks on vehicles to increase sharply in 2016, McAfee Labs predicts (Canadian Underwriter) Cyberattacks on automobiles will increase sharply in 2016 due to the rapid increase in connected automobile hardware built without foundational security principles, suggests the McAfee Labs 2016 Threats Predictions report released earlier this week

PHI breaches not limited to healthcare organizations (FierceHealthIT) Verizon's Suzanne Widup: Many entities don't understand they have that kind of data


Cybersecurity driving federal IT markets (C4ISR & Networks) Cybersecurity in its many forms — safeguarding IT networks and data, establishing governance and policies, negotiating acquisition — continues to act as a major force behind a huge slice of the U.S. economy, the federal government

Army Requires Consortium Membership for Cyber Innovation Challenge Participants (ExecutiveBiz) The U.S. Army has announced that industry stakeholders should become a member of the Consortium for Command, Control, Communications and Computer Technologies in order to participate in the proposed Cyber Innovation Challenge

Cybersecurity for the insecure RIA (Investment News) Ways to prevent a bad outcome when examiners come to assess your cybersecurity efforts

Symantec: Moving ahead, by returning to its roots (ITWire) Symantec is seeking to dedicate the next 18 months to regaining its 'fighting weight' and becoming the new leader in enterprise security

Microsoft spending on security R&D rivals Symantec (ZDNet) Microsoft is spending more than $1 billion on security research and development. Will that funding mean enterprises will curtail spending with independent security vendors?

Microsoft Sheds Reputation as an Easy Mark for Hackers (New York Times) Microsoft was once the epitome of everything wrong with security in technology

Has Microsoft Really Rebuilt its Security Cred? (Fortune) Adding some of the security market's brightest minds and Satya Nadella certainly didn't hurt matters

Microsoft's Biggest Contribution to Security Is Free Windows Upgrades (Wall Street Journal) Microsoft Corp.MSFT +1.19% CEO Satya Nadella on Tuesday described his company's bold moves to protect Windows users from digital security threats. But the company has already made its most significant contribution to cyber security: free Windows 10 upgrades

BlackBerry believes in encryption backdoors — believes it's good for business (Bitdefender) BlackBerry, once the darling of corporations the world over, is trying to rebuild itself and seize marketshare back from the iPhone and Android smartphones that have so dramatically overtaken it in recent years

Akamai (AKAM) Looks Broken, But It's Not — UBS (Street Insider) UBS analyst, Steve Milunovich, published a research note describing a conversation with Akamai Technologies (NASDAQ: AKAM) management that highlights growth headwinds near term but upside opportunity through new products and Over The Top programming longer term

Israeli cyber start-up SAFE-T files for Tel Aviv IPO (Reuters) Nov 17 Israeli cyber security start-up SAFE-T plans to become the first tech company to go public on the Tel Aviv Stock Exchange in 2015 after it issued a prospectus to raise 22 million shekels ($5.6 million)

Cloud Cybersecurity Firm ProtectWise Raises $20M In Series B Funding (TechCrunch) When a company's security is breached a critical step of the recovery process is seeing exactly what happened, including where the vulnerability was exposed and what exactly the hackers had access to

This cyber-security start-up is trying to get corporations to open up about their issues (Washington Post) TruSTAR, a start-up headed by a former Bush Administration cyber-security advisor, announced Monday that it has raised $2 million from West Coast investors for a platform that allows companies to anonymously compare notes on cyber-threats

Darktrace says business must heed alert on cyber terror (Business Weekly) Cambridge cyber security specialist Darktrace was at GCHQ this morning as UK Chancellor George Osborne announced a £2 billion war chest to accelerate the fight against global terrorism

Cyber security mission takes Darktrace to Mexico (Cambridge News) Darktrace is one of five British companies to participate in the cyber security trade mission to Mexico City, which starts today, organised by the UK Trade and Investment's Defence and Security Organisation and the Home Office

Kordia bolsters cyber security clout with $10 million Wellington acquisition (Computerworld) "This acquisition equips Kordia to further advance our security strategy and meet the demands of our current and potential customer base"

SuperCom Completes Acquisition of Cyber Security Company — Prevision Ltd. (PRNewsire) Accretive and synergistic acquisition broadens solutions offering with complimentary cyber security capabilities

Hacking Drives Cybersecurity M&A (Payments Source) The recent uptick in cyberattacks, including the hack of extramarital dating site Ashley Madison, is making companies tighten their Web security and driving up demand for cybersecurity providers

MACH37 Cyber Accelerator accepting applications for Spring 2016 session (Augusta Free Press) The MACH37™ Cyber Accelerator has officially announced it will begin accepting applications from information security product startups and security entrepreneurs for its Spring 2016 (S16) Cohort that begins on March 14

Cyber security sector struggles to fill skills gap (Financial Times) Global demand for cyber security experts is forecast to outstrip supply by a third before the end of the decade, with companies struggling against what one senior industry figure has called the "largest human capital shortage in the world"

Can the 'CSI Effect' Help Tackle the Cyber Security Skills Gap? (Team Cymru) Much (virtual) ink has been spent describing the cyber security 'skills gap' — the lack of experienced candidates available to fill the ever expanding number of security related roles that organizations are attempting to recruit for

Closing the cybersecurity talent gap, one woman at a time (CIO) The severe shortage of cybersecurity talent is leaving the U.S. vulnerable to attacks. Women, in particular, are key to closing the security skills gap

Wedge Networks announces industry leader James Hamilton as CEO (PRNewswire) New CEO to accelerate global growth in cloud security sector

BrightPoint Security CEO Anne Bonaparte Wins Female Executive of the Year (TopTechNews) BrightPoint Security™, a leading Threat Intelligence Platform provider for automation, curation and sharing of threat intelligence Relevant Products/Services to fight cyber attacks, today announced that President and CEO Anne Bonaparte was named a Female Executive of the Year Silver Stevie® Award winner in the 12th annual Stevie Awards for Women in Business

Products, Services, and Solutions

New Cybrary Mobile App Provides Hacking Training to Developing Nations with Limited Web Access (KLTV) Cybrary, the world's first and only no-cost cyber security massive open online course (MOOC) provider, announced the availability of its Android-based mobile app that allows users with limited Web access — particularly in developing countries — to learn hacking, forensics and other cyber security skills on the go

CyberTech Unveils Azure-Powered Public Safety Incident Mgmt Platform; Vince Rosales Comments (ExecutiveBiz) CyberTech Systems and Software has rolled out a cloud-based public safety technology that works to help law enforcement agencies detect and investigate criminal activities

Cryptzone Announces Dynamic 'Segment of One' Solution for Cloud and Hybrid Environment Access Control, Reducing Attack Surfaces By Up To 95% (Cryptzone) New AppGate XDP release simplifies access security and ensures that all resources — private cloud, public cloud and on-premises — remain invisible until authorized

Want to stop apps from sharing your data? There's an app for that, too (Christian Science Monitor Passcode) Northeastern University researchers launched an app called ReCon to track and limit the personal information that's collected and shared by other smartphone apps

Imperva CounterBreach Uses Machine Learning to Protect Against Insider Threats (Nasdaq) New solution designed to protect global organizations from rising tide of data theft and loss due to compromised, malicious and careless users

Here's a Spy Firm's Price List for Secret Hacker Techniques (Wired) The trade in the secret hacker techniques known as "zero day exploits" has long taken place in the dark, hidden from the companies whose software those exploits target, and from the privacy advocates who revile the practice. But one zero-day broker is taking the market for these hacking techniques into the open, complete with a full price list

Massive & Widespread Java Zero-Day Exploit Makes Heartbleed Look Tame (PRNewswire) Contrast Security offers free, automated remediation, available now

Observable Networks' Dynamic Endpoint Modeling Solution Now Available On AWS Marketplace (PRNewswire) Observable Networks Inc., an emerging leader of advanced threat detection services, today announced the availability of its Dynamic Endpoint Modeling solution on the Amazon Web Services (AWS) Marketplace

Thales Launches Data Security Platform (ExecutiveBiz) Thales has introduced a new security platform for commercial and government customers to protect data in transit

Singapore Adopts Gemalto Authentication Tech for E-Gov Services (ExecutiveBiz) Digital security company Gemalto has provided its two-factor authentication and password encryption technologies to support Singapore's government e-services system

How to crowdsource your way to better security (CIO via CSO) Synack, a company founded by former NSA analysts, attempts to leverage the best of man and machine approaches to provide enterprise cybersecurity protection

AVG launches a Tor- and VPN-enabled router that you can only get on Indiegogo (International Business Times) Software security provider AVG Technologies is trying its hand at something new

SentinelOne adds feature to restore files hit by ransomware (Computerworld) If the worst-case scenario happens, files can be restored

ESET's latest app allows parents to manage child's online mobile experience (PRNewswire) ESET®, a global pioneer in proactive digital protection for more than two decades, today announced the launch of the ESET Parental Control for Android app, which helps parents ensure their children enjoy their mobile devices safely and appropriately

Technologies, Techniques, and Standards

Lessons For Security Sector From The Paris Attacks: The Value Of Sharing Data And Vigilant Guarding (Source Security) Let's say it up front: The physical security sector has limited solutions to address events like those in Paris on the 13th November

Report: Everyone Should Get a Security Freeze (KrebsOnSecurity) This author has frequently urged readers to place a security freeze on their credit files as a means of proactively preventing identity theft

How to deal with the blind spots in your security created by SSL encrypted traffic (Network World) SSL/TLS encryption is widely used to secure communications to internal and external servers, but can blind security mechanisms by preventing inspection of network traffic, increasing risk

Protecting Microsoft Edge against binary injection (Windows Blog) In May, we announced that Microsoft Edge was saying goodbye to binary extensibility models such as ActiveX and Browser Helper Objects

How to enable two-factor authentication on your Amazon account (Hot for Security) One of the internet's biggest online stores, Amazon, appears to have finally started giving its users an additional way to protect their accounts

Inside the largely unexplored world of mainframe security (Help Net Security) The security of mainframe computers — the so-called "big iron", which is mainly used by large organizations for critical applications, bulk data and transaction processing — is not a topic that has garnered much interest from the public

Guidelines for smart city technology adoption (Help Net Security) Securing Smart Cities, the not-for-profit global initiative addressing the cyber security challenges of smart cities, released guidelines jointly developed by Securing Smart Cities and the Cloud Security Alliance (CSA) for the adoption of smart city technology

Insider Threats: 10 Ways To Protect Your Data (InformationWeek) While IT focuses on outside threats, danger lurks from within — your employees. Whether intentional or unintentional, data breaches resulting from workers mishandling data can be prevented. Here's a look at 10 ways it can be done effectively

Don't Just Turn It On (Alert Logic Blog) Most businesses do a pretty thorough job of planning and researching their security purchases

10 dumb security mistakes sys admins make (InfoWorld via CSO) Do as I say, not as I do: Admin mistakes often surpass the severity of those made by users. Here are 10 of the most common — and their remedies

5 tips for winning a bigger cybersecurity budget (HealthCareITNews) Hint: Getting breached, while far from ideal, will almost always work

Research and Development

U.S. may be financing encryption apps to stay ahead of terrorists (Computerworld via CSO) The U.S. government's financial support for the development of smartphone encryption apps doesn't surprise security experts

Legislation, Policy, and Regulation

Norms of cyberwar in peacetime (Brookings) Cyberattacks and the appropriate response are new territories in national security. While most attacks do little damage and their perpetrators are often unclear, the potential risk is growing

U.S. counterintelligence chief skeptical China has curbed spying on U.S. (Reuters) U.S. counterintelligence chief Bill Evanina said on Wednesday he was skeptical China had followed through on recent promises to curb spying on the United States

Russia says has stepped up all types of intelligence gathering in Middle East (Reuters) Russia has stepped up all types of intelligence gathering in the Middle East, including satellite reconnaissance, a senior representative of the Russian Army's General Staff said on Wednesday, Russian news agencies reported

Opinion: 5 strategies for hacking the Islamic State (MarketWatch) The terrorist group is digital-savvy, so that's where intelligence services can make inroads

Why it's better to fight terrorists than terrorism (Washington Post) People don't become terrorists because they're poor or uneducated

How the Islamic State makes its money (Washington Post) Weapons, vehicles, employee salaries, propaganda videos, international travel — all of these things cost money

Paris attacks stir global debate over online encryption (Christian Science Monitor Passcode) Intelligence sources say Islamic State attackers may have planned the Paris terrorist attacks using easily available encrypted communication tools

Could The Paris Attacks Have Been Prevented If Officials Read Encrypted Communications? (Legaltech News) Many lawyers and policy analysts are cautious about giving the government broad authority to read encrypted communications. But law enforcement officers say access is vital

Opinion: Poisoning the Internet won't stop more Paris attacks (Christian Science Monitor Passcode) While it's more expedient to advocate for backdoors into secure communications and online surveillance to spot terrorists, the real answer may be investing in more old fashioned police work

The danger of 'exceptional access' (CNN) In the wake of the horrific attacks in Paris on Friday, there have been renewed calls to find some way to allow the government to read encrypted communications

New York prosecutor seeks U.S. law to weaken smartphone encryption (Reuters) Manhattan District Attorney Cyrus Vance Jr. on Wednesday called for federal legislation requiring tech companies such as Google and Apple to design smartphone operating systems so law enforcement can unlock data stored on them

'Difficult conversation' on encryption needed in wake of Paris attack, says Hurd (FierceGovernmentIT) Security is one of the most critical hurdles for federal chief information officers who have yet to fully commit to the cloud, said Rep. Will Hurd (R-Texas)

DoD's buildings are vulnerable to cyber attacks (Federal News Radio) The Defense Department is lacking strategy, funding and skilled labor to protect its buildings and building systems from cyber attacks

Litigation, Investigation, and Law Enforcement

U.S. Investigators Struggle to Track Homegrown ISIS Suspects (New York Times) At least three dozen people in the United States suspected of ties to the Islamic State were under heavy electronic or physical surveillance even before the Paris attacks, senior American officials say

Canada quietly ramped up security: Expert (Ottawa Sun) A noted terrorism expert believes domestic security forces have quietly ramped up their efforts in the wake of the Paris attacks, despite terrorists making no specific threat against Canada

EFF seizes deceptive website used for high-level phishing attacks (SC Magazine) Electronic Frontier Foundation wins control of fake .org website which may have been under the control of the Russian APT28 group

University Responds to Accusations of FBI Funding for Tor Hack (SecurityWeek) Carnegie Mellon University released a statement on Wednesday in response to recent allegations that the organization was paid by the FBI for help in unmasking individuals suspected of using the Tor anonymity network for illegal activities

Is the FBI Using Zero-Days in Criminal Investigations? (Just Security) We have known for a while now that the FBI uses hacking techniques to conduct remote computer searches in criminal investigations — particularly those that involve the dark web

Shareholder Cybersecurity Lawsuits Expected to Increase in 2016 (Legaltech News) Almost 90 percent of 276 board members think companies should be held liable for security breaches in the event reasonable care is not taken to protect customer data

Education Department CIO says FITARA Scorecard is bogus (FierceGovernmentIT) The Education and Energy departments were ranked the worst among federal agencies for their failure to execute the Federal Information Technology Acquisition Reform Act, or FITARA, in a scorecard issued by lawmakers earlier this month

Connolly, Chaffetz can't have it both ways on FITARA Scorecard (FierceGovernmentIT) Compliance and implementation are difficult things to measure in the world of federal information technology, so the government relies on inspectors general, the Government Accountability Office, Congress and others to ensure agencies are minding their Ps and Qs

Plymouth boy, 15, charged over global cyber-attacks (BBC) A 15-year-old British boy has been charged over cyber-attacks on international websites and bomb hoaxes against US airlines, police have said

California woman pleads guilty over Michaels retailer cards theft (Business Insurance) A California woman pleaded guilty on Tuesday to participating in a conspiracy to steal 94,000 credit and debit card numbers from Michaels Cos. Inc. customers in a massive nationwide breach at the U.S. arts and crafts retailer

For a complete running list of events, please visit the Event Tracker on the CyberWire website.

Upcoming Events

Internet-of-Things World Forum 2015 (London, England, UK, November 18 - 19, 2015) This conference features speakers from leading IoT companies and their customers. Learn how the Internet-of-Things is creating new markets for products, services, and solutions

2015 U.S. Cyber Crime Conference (National Harbor, Maryland, USA, November 14, 2015) The 2015 U.S. Cyber Crime Conference (Formerly the DoD Cyber Crime Conference) has brought world-class forensics and incident response training combined with outstanding community networking for over 15...

CyberPoint 2nd Annual Women in Cyber Security Reception (Baltimore, Maryland, USA, November 19, 2015) CyberPoint International announces its 2nd Annual Women in Cyber Security Reception to be held on November 19, 2015. Bringing together women from across the region and all different points on the career...

Pen Test Hackfest Summit & Training (Alexandria, Virgina, USA, November 16 - 23, 2015) SANS Pen Test Hackfest Training Event and Summit is coming back to Washington DC, bigger and better than ever! The Hackfest is an ideal way to learn offensive techniques so you can better defend your environment.

Energy Tech 2015 (Cleveland, Ohio, USA, November 30 - December 2, 2015) Now in its 5th year, EnergyTech 2015 seeks the convergence of the best minds in policy, systems engineering and applied technology to address some of the critical issues of our time. In addition to its...

cybergamut Technical Tuesday: It's a Target Rich Environment: Understanding the IIoT Attack Surface (Elkridge, Maryland, USA, December 1, 2015) The Internet of Things (IoT) has received an incredible amount of press as of late. But, most of that has been associated with consumer electronics in the form of wearables and home monitoring devices...

IoT Security Foundation Conference (London, England, UK, December 1, 2015) The is the first official conference of IoTSF. It follows on from the IoT Security Summit earlier in the year, maintaining the momentum of the theme. Delegates can expect a similar level of quality of...

Public Sector Cybersecurity Summit 2015 (Reston, Virginia, USA, December 1 - 2, 2015) The Raytheon|Websense 6th Annual Public Sector Cybersecurity Summit is a unique opportunity to learn about the state of cybersecurity and how to prepare for future threats from many thought provoking government...

Enterprise Security and Risk Management (London, England, UK, December 2, 2015) Whitehall Media's 4th ESRM conference will bring together hundreds of leading InfoSec, cyber security and risk management professionals to discuss the latest industry developments and identify the most...

Cargo Logistics America (San Diego, California, USA, December 2 - 3, 2015) Cargo Logistics America (CLA) connects freight owners with freight movers, fostering multimodal synergy between diverse stakeholders in import, export and domestic supply chains. This year's conference...

NG Security Summit US (Austin, Texas, USA, December 2 - 4, 2015) The NG Security Summit US will bring together 65 senior decision makers and business leaders from across the region. The event aims to solve key business challenges. In particular, the ability to network...

Cyber Security Opportunities for U.S. Firms in Japan, S. Korea, and Taiwan (Online, December 2, 2015) Listen to experts from Japan, S. Korea and Taiwan and learn how to position your company for success in these countries. Sponsored by the US Department of Commerce

Program on Cyber Security Studies (PCSS) (Garmisch-Partenkirchen, Germany, December 2 - 17, 2015) The Marshall Center has developed a comprehensive program to explore the increasing domestic, international and transnational challenges in cyber security. Our goal is to provide a comprehensive, policy-focused,...

Cloud Security Alliance Summit Los Angeles 2015 (Los Angeles, California, USA, December 3, 2015) The full day Cloud Security Alliance LA Summit is a standalone event in the greater Los Angeles area. Hosted by the CSA LA/SoCal chapter, some 200 well-qualified attendees are expected. The theme is "Enterprise...

2015 Cyber Security Exchange (Orlando, Florida, USA, December 6 - 8, 2015) This dynamic, three-day event will provide Cyber Security executives with valuable insights to reach their full potential by exploring security leadership strategies, heightened data privacy concerns,...

Disrupt London 2015 (London, England, UK, December 7 - 8, 2015) TechCrunch Disrupt is one of the most anticipated technology conferences of the year. Join us at this iconic startup and thought leadership event in London on December 7 and 8. What happens at Disrupt?...

Passwords 2015 (University of Cambridge, England, UK, December 7 - 9, 2015) More than half a billion user passwords have been compromised over the last five years, including breaches at internet companies such as Target, Adobe, Heartland, Forbes, LinkedIn, Yahoo, and LivingSocial.

ACSAC (Annual Computer Security Applications Conference) (Los Angeles, California, USA, December 7 - 11, 2015) ACSAC is one of the most important cyber security conferences in the world, and the oldest information security conference held annually. Researchers, government representatives, academia and security...

NSA RCTCON (Fort Meade, Maryland, USA, December 9, 2015) The NSA RCTCON industry exposition will be attended by 250-300 IC (Intelligence Community) cyber personnel working on solutions to the current cyber threats that face the U.S

SANS Institute: Information Security Training (Las Vegas, Nevada, USA, September 12 - 21, 2015) Information security training in Las Vegas from SANS Institute, the global leader in information security training. At SANS Network Security 2015, SANS offers more than 40 hands-on, immersion-style security...

cyberSecure (New York, New York, USA, December 15 - 16, 2015) Today's business leaders recognize that a multi-disciplinary approach is critical to protecting the bottom line. What's too often missed is a vision that incorporates best practices that allow you add...

Grow your brand and reach new customers.

Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.

Be a part of the CyberWire story.

People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.