skip navigation

More signal. Less noise.

Daily briefing.

Nation-state hacking continues to roil international relations. Kaspersky thinks, on the basis of an upswing in "Chinese-speaking APTs," that China's shifting its attention from US to Russian target sets. For his part, US DNI Clapper says Chinese cyber espionage against American targets continues unabated — he characterizes the data theft as a "hemorrhage."

Reports out of Israel again accuse Iran of cyber espionage: accounts of senior officers, scientists, and Gulf-area human rights activists are said to have been targeted in a now-shuttered campaign controlled from Tehran.

The Russian hackers behind a wave of ATM heists — probably the "Metel" gang — are said to have manipulated ruble-dollar exchange rates at a Russian regional bank last year by gaining illicit access to trading terminals.

Ransomware — especially CryptoWall — continues to plague businesses.

Law firms are being targeted by Skype malware (the T9000 backdoor described recently by Palo Alto Networks).

Yesterday was Patch Tuesday. Adobe, Google, and Microsoft all issued fixes. Microsoft published thirteen patches, six of them for critical remote-code execution vulnerabilities.

Investment analysts look at recently depressed share prices of cyber security firms, and many explain the drop as caused by general market nerves, some specific disappointing notes, and collateral damage from a pullback in related IT sectors. Encouraging signs continued strong VC interest in cyber startups.

In the US, Congressional appetite for restricting encryption appears to be waning.

The President's budget includes some big spending on cyber. The White House has also proposed a "National Cyber Security Action Plan," to generally favorable reviews.

Notes.

Today's issue includes events affecting China, Croatia, Indonesia, Iran, Iraq, Israel, New Zealand, Russia, Syria, United Kingdom, United States.

Cyber Attacks, Threats, and Vulnerabilities

Iran said to hack former Israeli army chief-of-staff, access his entire computer (Times of Israel) TV report says cyber-attacker working for Tehran targeted 1,800 key people worldwide; hacker left behind his ID, prompting Iran to halt the assault

Hackers Get Employee Records at Justice and Homeland Security Depts. (New York Times) In the latest cyberattack targeting the federal government, an intruder gained access to information for thousands of employees at the Justice Department and the Department of Homeland Security, but officials said Monday that there was no indication that sensitive information had been stolen

Hacker says he's breached DHS and FBI, leaks claimed staff data (Naked Security) The big breach news of the day is that an unidentified hacker threatened to expose a large stash of employee data allegedly stolen from the US public service

Chinese Cyberspies Pivot To Russia In Wake Of Obama-Xi Pact (Dark Reading) Kaspersky Lab has identified a massive uptick in cyber espionage in Russia by 'Chinese-speaking' APTs

DNI: China Continues Cyber Espionage (Washington Free Beacon) Clapper calls Beijing cyber theft 'hemorrhage'

Russian hackers used malware to manipulate the Dollar/Ruble exchange rate (Help Net Security) Russian-language hackers have managed to break into Russian regional bank Energobank, infect its systems, and gain unsanctioned access to its trading system terminals, which allowed them to manipulate the Dollar/Ruble exchange rate

Russian ATM-popping gang used nation state cybercrook tactics (Register) Be very slow with the brute force, Igor. Three times a week, only on Saturdays

Adwind RAT Bought by 1,800 Criminals and Used Against 443,000 Victims (Softpedia) Shifty RAT takes five different names to avoid takedown

New Skype Malware Mimics E-Discovery on Unsuspecting Users (Legaltech News) A new report explores how a new virus is threatening one of the staple applications of the legal world — and how to best prevent it from getting near your system

Security Alert: Small Websites Compromised by the Thousands, Scatter Angler and CryptoWall (Heimdal Security) I think you'll agree with me when I say that the era of "I'm not important enough to get hacked" is long gone

How cybercrooks made $330K from ransomware without really trying (Register) Ker-ching!

10 Shocking New Facts About Ransomware (Dark Reading) Ransomware has taken over the cybercriminal world in the last few years and there's no end in sight

Hearthstone cheats and tools spiked with malware (CSO) Symantec researchers say some downloads hurt more than help

Hacking gold in Hearthstone? You're probably just hacking yourself (Guardian) Symantec warns of malware disguised as cheating tools for Blizzard's collectible card game

Virgin Media spoof email mystery: Customers take to Facebook (Register) ISP: There has been no breach, no idea what you mean

Southwest Airlines flight giveaway scams spread on Facebook (We Live Security) Once again Facebook users are being duped into liking and sharing pages, in the belief that they might be rewarded with first class flight tickets to a holiday destination

Microsoft issues a reminder that those unsolicited callers aren't from Microsoft (Digital Trends) Today is Safer Internet Day, and Microsoft wants you to know that it thinks security is a really good thing. That's most of what it has to say, really

New Scandal Involving Croatian Security Intelligence Agency (Total Croatia News) Another day, another scandal in the Croatian intelligence community. Jutarnji List has published an article about the results of an intelligence analysis about the disclosure of the identity of Security Intelligence Agency (SOA) agents to managers of foreign companies, as well as about the leak of information vital to national security

Cyber attack disrupts Oxford School District (Clarion-Ledger) A cyberattack by an unknown hacker has forced a school district to shut down all of its servers

Security Patches, Mitigations, and Software Updates

Vulnerability Response: A Tale of Two Vendors (CyberPoint SRT Blog) It was the best of timelines (the other was the worst of timelines…) Greg Linares of CyberPoint's SRT (Security Research Team) recently had one of the vulnerabilities he discovered patched by the vendor, Microsoft. Having worked directly with Microsoft (specifically with its MSRC unit) for almost a decade, we've seen Microsoft improve their responsiveness on behalf of their customers, and we've also seen them respond very positively towards vulnerabilities researchers who submit issues

Microsoft Security Bulletin Summary for February 2016 (Microsoft Security TechCenter) This bulletin summary lists security bulletins released for February 2016

Microsoft February 2016 Patch Tuesday Delivers Unlucky 13 Security Fixes (WindowsITPro) In addition to the two cumulative updates for Windows 10 rolling out now over Windows Update, Microsoft is also delivering 13 separate security fixes this month

Stable Channel Update (Chrome Releases) The stable channel has been updated to 48.0.2564.109 for Windows, Mac, and Linux

Adobe Releases Security Updates (US-CERT) Adobe has released security updates to address vulnerabilities in Connect, Experience Manager, Flash Player, and Photoshop CC and Bridge CC

Twitter announces Trust & Safety Council to deal with the harassment, cyber bullying (Australian Broadcasting Corporation) Twitter has announced it will set up what its calling a Trust & Safety Council to deal with the harassment and cyber bullying that occurs on its service

Cyber Trends

Why the Internet of Things is a can of worms and how to keep it sealed (Security News Desk) Security providers need to rethink basic security functions of IoT-enabled applications before they are put to market

The internet of military things: Logistics dream, security nightmare? (ZDNet) IoT is a natural for the military, not just on equipment but for health monitoring on soldiers. But oh, what an attack surface!

IoT security breaches a 'building' concern for industries (Business Vancouver) Internet of Things network increasing vulnerability of industrial sites to cyberattacks

Small businesses warned of cyber attack impact (PRW) New research out today from cross-government campaign Cyber Streetwise and professional service firm KPMG has claimed small businesses are underestimating the impact a cyber attack could have on their reputation

How Much Would You Pay to Prevent a Breach? (re/code) In a country divided by the upcoming election, President Obama garnered bipartisan support for a significant budget increase this week: $5 billion in additional cyber security spending

Most IT pros have seen potentially embarrassing information about their colleagues (Help Net Security) More than three-quarters of IT professionals have seen and kept secret potentially embarrassing information about their colleagues, according to new research conducted by AlienVault

Why Cybersecurity Isn't So Complicated (Fortune) Here's what it takes to protect our data, identities and money

Marketplace

Cyber market lacks expertise to cover physical damage (Insurance Insider) The cyber liability insurance market is not the proper home for property cover arising from cyber attacks, experts claimed during an industry conference today

Why Cyber Security Stocks Got Smacked on Monday (Motley Fool) The pain in the cyber-security space doesn't seem to be letting up

Why FireEye Inc. Plunged 32% in January (Motley Fool) The cybersecurity leader has failed to protect its investors in recent months

FireEye up 9% following pre-earnings BTIG upgrade (Seeking Alpha) Believing the company can turn cash-flow positive in 2016 as its reigns in spending growth, BTIG's Joel Fishbein has upgraded FireEye (NASDAQ:FEYE) to Buy ahead of tomorrow afternoon's Q4 report

Why Qualys, Inc. Shares Tanked (Motley Fool) Understanding the big pullback in Qualys' stock price on Tuesday

IT security specialist Sophos slides despite positive results (Guardian) Company hit by concerns about sector being overvalued

Subscribe with caution to Quick Heal IPO: Choice Broking (CNBC Money Control) Choice Broking has come out with its report on Quick heal technologies IPO. The research firm has recommended to "SUBSCRIBE" the IPO with Cautions in its research report as on Feburary 08, 2016

9-Figure Deals Lift Cybersecurity Investments To An All-Time High (In Homeland Security) Investments into cybersecurity startups and emerging players grew by 235% over the past five years, reaching an all-time high of $3.8 billion in 2015 — according to CB Insights. VCs and corporate investors moved the needle to nine-figures on some of the larger deals

Small Cyber Firm May Be Worth Billions To Northrop Grumman Or Another Top U.S. Defense Contractor (Forbes) A recent article on Nasdaq.com speculates merger and acquisition possibilities for Northrop Grumman, a top-five U.S. defense contractor. Popping up on the radar screen is Long Island, N.Y. based Code Dx, a small firm specializing in the fast growing cybersecurity market — which is expected to reach $170 billion by 2020

Hexadite Secures $8 Million Series A To Grow Cyber Security Company (TechCrunch) Hexadite, a company that analyzes cyber threats and helps determine whether they require action or are false alarms, announced an $8 million Series A round today

Fireglass Emerges From Stealth with a Military-Grade, Enterprise-Ready Threat Isolation Platform to Put an End to Security Challenges (PRNewswire) Israeli cybersecurity startup ignites interest from Fortune 500 companies for non-compromising, future-proof solution

Check Point co-founder backs cyber security start-up (Financial Times) Shlomo Kramer, co-founder of Check Point and Imperva, two of the country's biggest cyber security companies, has raised $20m for the new Tel Aviv-based start-up Cato Networks

In Nod to Cybersecurity Demand, Avalon Announces Merger with DIGITS (Legaltech News) The new merger will see Avalon bundle cybersecurity tools with its branded e-discovery and service products

CyberTech — The Golden Globes of information security (CSO) So many information security start-ups, so little time. Here's some of the most interesting firms I met with while at the CyberTech conference

With over 500 pc growth in bookings, Darktrace makes its mark in the cyber security space (Economic Times CIO) Company has reported over 750 installations of its Enterprise Immune System technology largely dominated by financial services industry followed by utilities, manufacturing and energy sectors

Wynyard signs $2.8m three-year deal with state policing agency (NBR) Wynyard Group [NZX: WYN], whose shareholders will vote next week on giving the board more freedom to issue shares, has signed a $2.8 million deal to provide its intelligence software services to a foreign state policing agency

INSIGHT: Growing hacker threats make cybersecurity a great career choice (Argus Leader) There are few jobs as cool and necessary as those in the cybersecurity realm

Solutionary Appoints Former Secret Service Assistant Special Agent in Charge Steven Bullitt as Vice President, Cyber Forensics and Investigations (CNN Money) Cyber security pioneer to lead client-facing threat response and forensic initiatives

Products, Services, and Solutions

BIOS Hack Detection Added To Dell Enterprise Security Suite (InformationWeek) With millions of machines potentially vulnerable to attacks on their BIOS firmware, Dell has introduced a verification tool designed for enterprise IT to monitor users' machines and intervene if an attack is detected

Indegy Introduces Industrial Cyber Security Platform for Protecting Critical Infrastructures (BusinessWire) Provides deep visibility into control-layer activity to ensure operational safety, reliability and security of industrial systems

Cato Networks Launches Network Security-As-A-Service Platform To Channel (CRN) Cato Networks, the newest startup from security investor Shlomo Kramer, is launching into the market Tuesday with a Network Security-as-a-Service platform that it says will shake up the perception that security has to be complicated

Pulse Secure Eliminates Security Silos for the Next Generation of Workers, Applications, Networks and Things (Broadway World) Pulse Secure, the leader in secure access solutions, today announced enhancements to its core product portfolio to help organizations secure access to applications in the data center and the cloud

Bitdefender Releases New LabTech® Integrated MSP Security Solution (BusinessWire) Integration to LabTech, ConnectWise's RMM Solution, strengthens Bitdefender's already impressive presence in MSP market

Technologies, Techniques, and Standards

Insider threat: It's not just about the malcontent anymore (FierceITSecurity) I sat down recently with Steve Durbin, managing director of the Information Security Forum (ISF), to discuss the threat that insiders pose to organizations and what can be done to stop them

Harnessing SSL Certificates Using Infrastructure Chaining (PassiveTotal Blog) Infrastructure chaining leverages the relationships between highly-connected datasets to build out an investigation

Stay safe with our Facebook cheat sheet (We Live Security) Once upon a time, it was possible to prevent personal data from getting into the hands of the wrong person by using a paper shredder and a bit of common sense

Design and Innovation

Android's inventor has creepy plans to suck up data from your dashcam (Graham Cluley) Andy Rubin is the guy behind the Android operating system. He co-founded Android Inc, the firm that Google bought in 2005 because it realised it needed a mobile operating system

Academia

CACI Becomes Anchor Partner in Cyber-Physical System Security Program With Virginia Tech Hume Center (BusinessWire) Partnership focused on the convergence of cyber security and UAVs

WGU Adds Master's in Cybersecurity & Information Assurance (PRNewswire) New online degree program offers new cybersecurity curriculum

Legislation, Policy, and Regulation

Intelligence Committee marks Gov's Snoopers' Charter: See me after class (Register) Needs more clarity, Theresa, but otherwise a very good effort

British Effort to Identify Potential Radicals Spurs Debate Over Profiling (New York Times) The boy's teachers were growing increasingly concerned

State Department: Kerry recognizes that calling ISIS 'apostates' was not 'the best choice' (Washington Post) The debate over what to call the Islamic State, the extremist organization that has created chaos in the Middle East over the past few years, is convoluted and controversial

New bipartisan bill would prevent states from weakening encryption (ZDNet) The bill, just three short pages in length, will prevent local legislatures from passing laws that ban encryption on a state level

A BILL To preempt State data security vulnerability mandates and decryption requirements (US House of Representatives) This Act may be cited as the "Ensuring National 5 Constitutional Rights for Your Private Telecommunications Act of 2016" or the "ENCRYPT Act of 2016"

Islamic State supporters share Edward Snowden video to explain need for encryption (Washington Times) Islamic State supporters are using Edward Snowden and his revelations about the U.S. government's surveillance capabilities to urge followers of the terror group to adopt digital security practices, including the use of strong encryption

Senator John McCain Weighs In On 'Going Dark' Debate — Insists That He Understands Cryptography Better Than Cryptographers (TechDirt) Who knew that Senator John McCain understood encryption better than actual cryptographers?

The President's Cybersecurity Plan Is More of the Same (And That's a Good Thing) (Council on Foreign Relations) Today, the Obama administration announced the Cybersecurity National Action Plan

Obama to seek dramatic boost in cyber funding (The Hill) President Obama on Tuesday is expected to request a dramatic boost in federal funding for cybersecurity, according to multiple Hill offices, industry representatives and digital privacy advocates

FACT SHEET: Cybersecurity National Action Plan (The White House) Taking bold actions to protect Americans in today's digital world

White House reveals plan to bolster American cybersecurity (Christian Science Monitor Passcode) The Cybersecurity National Action Plan, which will be announced Tuesday, comes as the government scrambles to improve its own cybersecurity in the wake of the massive breach on the Office of Personnel Management

Obama's cyber security plan puts spotlight on users (San Jose Mercury News) President Obama's new $19 billion information technology budget could be a boon to Silicon Valley security companies but also reflects the realization that the weakest point of many computer networks is the user

White House Strikes Right Chord on Privacy and Individual Security (Center for Democracy and Technology) Today, the White House announced a new federal initiative called the Cybersecurity National Action Plan (CNAP) encompassing a substantial new cybersecurity budget request and two new Executive Orders that would establish a Cybersecurity Commission and a cross-government Privacy Council

White House hiring its first ever chief information security officer (IT Governance) Apparently the White House doesn't already have a CISO

We're going to use your toothbrush to snoop on you, says US spy boss (Register) The Internet of Things is great for us, says James Clapper

NSA to shake up its defensive, offensive game (Christian Science Monitor Passcode) The NSA is shifting toward a fully integrated offensive and defensive operation, meaning its spies could be brushing shoulders with its cybersecurity agents

Pentagon looks to mature Cyber Command with FY17 budget (FCW) The Defense Department's fiscal 2017 base budget request for cyberspace operations is $6.7 billion, an approximately 16 percent increase from the fiscal 2016 enacted level

Pentagon budget targets futuristic capabilities (C4ISR & Networks) Seeking to strike a balance between current operations, fiscal uncertainty and next-generation weapons and systems, the Defense Department is aiming for a "healthy" science and technology program in its fiscal 2017 budget to develop future technologies

What Obama's Air Force Budget Request Says About the Future of Warfare (Defense One) The Defense Department budget request is full of high tech-items aimed at countering the capabilities of technologically advanced adversaries

Cyber training a key point in 2017 DoD budget (C4ISR & Networks) To take on changing types of enemies and evolving forms of warfare, Defense Department officials are moving ahead with at least three major joint training programs in the fiscal 2017 budget request as part of a broader redirection of resources to cyber

Enterprise IT, advanced tech top intel budget goals (C4ISR & Networks) The intelligence community's budget priorities look similar to those leading the funding wish lists across the Defense Department: cutting-edge technology to take on evolving enemies, investment in future capabilities and balancing sustainment with leaning forward

Spies ask for increase in 'black budget' (The Hill) The Obama administration asked for Congress to fund federal intelligence agencies $3 billion more in 2017 than it did last year

$50B homeland security budget focused on terrorism, critical infrastructure (Federal Times) President Barack Obama's $4.15 trillion budget request includes $50.4 billion for civilian agencies engaged in homeland security activities, most notably the Department of Homeland Security

President asks for $89.9B for IT in 2017 budget (Federal Times) The budget request released by President Barack Obama on Feb. 9 includes just shy of $90 billion for IT programs and operations, representing approximately 2.2 percent of the $4.15 trillion proposal

'We don't have the gear': How the Pentagon is struggling with electronic warfare (Washington Post) In the future, many of the most effective weapons used against the U.S. military are likely to be unseen: electromagnetic waves that disrupt radios or jam global positioning systems, paralyzing units

Senate health committee unanimously passes HIT bill (FierceHealthIT) The Improving Health Information Technology Act and six other bills cleared the Senate health committee with bipartisan support at a hearing on Tuesday

Give Up Your Data to Cure Disease (New York Times) How far would you go to protect your health records? Your privacy matters, of course, but consider this: Mass data can inform medicine like nothing else and save countless lives, including, perhaps, your own

Litigation, Investigation, and Law Enforcement

FBI Still Can't Unlock San Bernardino Shooter's Encrypted Cellphone (Time) "We are still working on it"

Indonesia imprisons seven Islamic State supporters (BBC) A court in Indonesia has sentenced seven men to between three and five years in jail for supporting the so-called Islamic State (IS) group

US Education CIO Admits To 'Unacceptable' Behavior (InformationWeek) US Department of Education CIO Danny Harris was grilled by lawmakers about possible ethics violations. Meanwhile the department, which has a lending budget the size of Citibank, was still said to be vulnerable to security threats

Clinton Asked Aide to Print 'Classified' Information, Emails Show (Washington Free Beacon) Hillary Clinton forwarded two emails that included "foreign government" information to a top State Department aide and asked for the messages to be printed out, according to correspondence obtained by the watchdog group Judicial Watch

Litigation Watch: Can a Third-Party Vendor Be Left Holding the Bag After a Breach? (JDSupra) Many organizations, particularly those outside of the technology sector, rely heavily on third-parties — including cyber security specialists, lawyers, and public relations firms — to help pick up the pieces after a data breach. But what happens when a third-party vendor doesn't fix the problem?

How "gag clauses" are used to squash negative reviews and punish reviewers (Naked Security) No one likes a bad review, especially businesses that can be harmed by negative word-of-mouth

Teen sues TV station for broadcasting sexting video along with his name (Naked Security) A Colorado TV station is being sued over allegedly broadcasting a mobile phone video of a 14-year-old's

Sexting and cyber-crime? Welcome to the teenage internet (Trusted Reviews) Today is Safer Internet Day, but do any of us actually know what Britain's youth are getting up to online?

For a complete running list of events, please visit the Event Tracker on the CyberWire website.

Upcoming Events

SANS Cyber Threat Intelligence Summit & Training 2016 (Alexandria, Virginia, USA, February 3 - 10, 2016) This Summit will focus on specific analysis techniques and capabilities that can be used to properly create and maintain Cyber Threat Intelligence in your organization. Attend this summit to learn and...

Insider Threat Program Development Training — California (Carlsbad, California, USA, February 8 - 10, 2016) The National Insider Threat Special Interest Group website has some very "eye opening" examples of how "damaging and costly" an "insider threat incident" can be. The FBI Insider Threat Alert states companies...

Secure Rail (Orlando, Florida, USA, February 9 - 10, 2016) The first conference to address physical and cyber rail security in North America

Cyber Security Breakdown: Dallas (Dallas, Texas, USA, February 10, 2016) This half day session will provide you with the critical information you need to start formulating an effective response in the eventuality of a cyber security event. Rather than try and handle the breach...

SecureWorld Charlotte (Charlotte, North Carolina, USA, February 11, 2016) Join your fellow security professionals for affordable, high-quality cybersecurity training and education. Earn 6-12 CPE credits through 30+ educational elements learning from nationally recognized industry...

Suits and Spooks (Washington, DC, USA, February 4 - 5, 2015) Suits and Spooks DC (Feb 4-5, 2015) is moving to the Ritz Carlton hotel in Pentagon City! We're expanding our attendee capacity to 200 and for the first time will be including space for exhibitors. We...

2016 Cyber Security Division R&D Showcase and Technical Workshop (Washington, DC, USA, February 17 - 19, 2016) The cybersecurity threat continues to evolve and in order to keep ahead of the threat; new cutting-edge cybersecurity technologies are needed. The Cyber Security Division (CSD) within the Department of...

Department of the Navy (DON) IT Conference, West Coast 2016 (San Deigo, California, USA, February 17 - 19, 2016) The purpose of the DON IT conference is to: (1) Explain the new and invigorated DUSN (M), DON/AA, and DON CIO organization and its business and IT transformation priorities. (2) Share information that...

National Insider Threat Special Interest Workding Group: Insider Threats From A Human Resources & Legal Perspective (Laurel, Maryland, USA, February 18, 2016) This meeting will be focused on "Insider Threats From A Human Resources & Legal Perspective." Mrs. Jordan C. Meadows, Security Program Analyst at Rolls-Royce North America will present from the Human Resources...

ICISSP 2016 (Rome, Italy, February 19 - 21, 2016) The International Conference on Information Systems Security and Privacy aims at creating a meeting point for researchers and practitioners that address security and privacy challenges that concern information...

Interconnect2016 (Las Vegas, Nevada, USA, February 21 - 25, 2016) IBM InterConnect 2016 is for those who are building new business models, transforming industries, and creating better outcomes. Whether you're a C-suite executive, IT leader, developer, designer, architect,...

CISO Canada Summit (Montréal, Québec, Canada, February 21 - 23, 2016) Tactics and best practices for taking on enterprise IT security threats. The CISO Summit will bring together C-level IT security executives, industry analysts and solution providers to discuss challenges...

cybergamut Tech Tuesday: Neuro Cyber Analytics: Understanding the Patterns of Human Cognition in the Cyber Domain (Elkridge, Maryland, Middletown, February 23, 2016) This presentation will discuss Neuro Cyber Analytics. Humans use context-specific neurocognitive patterns for receiving and processing internal and external sensory information. Stated differently, people...

Insider Threat Program Development Training Course — Maryland (Annapolis, Maryland, USA, February 23 - 25, 2016) The National Insider Threat Special Interest Group website has some very "eye opening" examples of how "damaging and costly" an "insider threat incident" can be. The FBI Insider Threat Alert states companies...

CISO New York Summit (New York, New York, USA, February 25, 2016) A data breach is not only a PR nightmare, but cause for customers to turn to competitors, exposing sensitive company information and racking up fines from industry regulators. In order for organizations...

BSides San Francisco (San Francisco, California, USA, February 28 - 29, 2016) BSides San Francisco is an Information / Security conference that's different. We're a 100% volunteer organized event, put on by and for the community, and we truly strive to keep information free. There...

CISO Summit Europe (London, England, UK, February 28 - March 1, 2016) With the media covering the latest data breaches, cloud computing security questions going unanswered and hackers developing more sophisticated attacks, the IT department has a growing responsibility to...

RSA Conference 2016 (San Francisco, California, USA, February 29 - March 4, 2016) Celebrating its 25th anniversary, RSA Conference continues to drive the information security agenda forward. Connect with industry leaders at RSA Conference 2016

Grow your brand and reach new customers.

Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.

Be a part of the CyberWire story.

People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.