skip navigation

More signal. Less noise.

Daily briefing.

The scope of the DNC hack widens as personal accounts—Yahoo Mail and associated smart phones—of Democratic Party campaign consultants show signs of compromise. CNN says Federal authorities warned the Democratic National Committee of a potential network breach “months before” the party acknowledged and addressed the problem; the DNC says the warnings it received were non-specific.

CrowdStrike has attributed the hacking to Russian intelligence services, and most observers concur, although security firms like eSentire and Rook do note that forensic analysis can be more circumstantial than dispositive. Notable demurrals include WikiLeaks founder Julian Assange (“no proof”) and Russian Foreign Minister Lavrov (who denies-by-dismissal).

Russia is widely thought to be seeking influence over US elections. Since the hackers were in the DNC’s systems for a year, more leaks are expected. US officials are investigating; no clear response to the hack has emerged.

Krebs looks at both parties’ and candidates’ email practices and finds them all wanting.

ISIS has claimed responsibility for the partially successful suicide bombing in Ansbach, Germany, releasing a pre-attack video of the apparent attacker “pledging allegiance” to the Caliphate.

F-Secure tells Motherboard they’ve been contacted by a ransomware purveyor who claims to be working for a Fortune 500 company, hitting its competitors. “We have no way of confirming the claims of the operator,” says F-Secure.

Acalvio Technologies has emerged from stealth with $17 million in combined Series A and B funding. Acalvio describes its offering as “fluid deception,” a shifting and less-resource-intensive set of decoys for attackers.


Today's issue includes events affecting Armenia, Germany, Hungary, Iraq, Poland, Russia, Slovakia, Syria, Turkey, Ukraine, United States.

A note to our readers: We'll be at Black Hat this year, talking to people and keeping our ears open, as usual. You'll see coverage in our daily briefing and hear it in the podcast.

The CyberWire's regular daily Podcast will be out later this afternoon, with interviews, educational tips, and more on the stories of the day. Today our editor will talk about what was discussed at Friday's Billington Global Automotive Cybersecurity Summit. And our guest, KnowBe4's Stu Sjouwerman, will offer his take on the hack of the Democratic National Committee, apparently at the hands of Russian intelligence services. (And of course, if you enjoy the podcast, please consider giving it an iTunes review.)

​3rd Annual Senior Executive Cyber Security Conference: Navigating Today’s Cyber Security Terrain​ (Baltimore, MD, September 21, 2016) Hear from industry leaders on cyber security best practices and trends that will help you better secure your organization’s data. This year’s agenda examines the current cyber security landscape, threats, and challenges ahead for organizations and how senior leaders can work towards “shifting their data to being safe and secure.”

Cyber Attacks, Threats, and Vulnerabilities

WikiLeaks leaks DNC emails, setting off political firestorm (Naked Security) On Friday, just days before the Democratic Convention in Philadelphia, WikiLeaks released nearly 20,000 emails that, it says, come from the accounts of Democratic National Committee (DNC) officials

New evidence suggests DNC hackers penetrated deeper than previously thought (Ars Technica) Consultant's Yahoo Mail suspected of being targeted by state-sponsored hackers

Sources: US officials warned DNC of hack months before the party acted (CNN) Federal investigators tried to warn the Democratic National Committee about a potential intrusion in their computer network months before the party moved to try to fix the problem, US officials briefed on the probe tell CNN

Moscow Brings Its Propaganda War to the United States (Foreign Policy) From Ukraine to Germany, Russia has been meddling with elections for years. Now it’s trying to destroy Hillary

FBI Suspects Russia Hacked DNC; U.S. Officials Say It Was to Elect Donald Trump (Daily Beast) Did the Russian government hack the DNC to bring down Hillary Clinton? That’s the view that’s quickly emerging inside American intelligence and law enforcement agencies

Cybersecurity Experts Say Russia Hacked the Democrats (Bloomberg) Is the Kremlin trying to throw the U.S. presidential election to Donald Trump? It sounds like something out of a spy novel. But many cybersecurity experts, as well as the Hillary Clinton campaign, are now saying the Russians are responsible for last month’s hack of the Democratic National Committee

WikiLeaks founder: ‘No proof’ Russians hacked DNC (Politico) There is no evidence that Russian actors are behind the hack of thousands of Democratic National Committee emails leaked to WikiLeaks last week, according to founder Julian Assange

Experts: Hard to prove Russians behind DNC hack (USA TODAY) Computer security researchers say it’s difficult to definitively say the cyber theft of files from the Democratic National Committee subsequently posted online by Wikileaks was the work of Russian hackers, as some media outlets have reported

The rush to blame Russia for the DNC email hack is premature (Guardian) There is some circumstantial evidence that the hack may have originated in Russia, but there are many questions that haven’t been resolved

Connecting the dots: How Russia benefits from the DNC email leak (Washington Post) The emails of Sony employees. Top-secret diplomatic cables. The addresses of married people who used a confidential dating service. Every time “secret” information is made public, the focus of attention is always, immediately, on the sensational details. The motives of the hacker, the leaker or the person in possession of the secret tapes are rarely examined. But what to do when that person has an ulterior motive quite far from “the public’s right to know”? And what if that person’s motive is to help throw an American election?

The One Thing Hillary Clinton and the DNC Don't Understand About Secure Email (Inc.) Why encrypted email is what Hillary, the DNC and business owners with sensitive information should be using

Trump, DNC, RNC Flunk Email Security Test (KrebsOnSecurity) Donald J. Trump has repeatedly bashed Sen. Hillary Clinton for handling classified documents on her private email server, suggesting that anyone who is so lax with email security isn’t fit to become president. But a closer look at the Web sites for each candidate shows that in contrast to, has failed to take full advantage of a free and open email security technology designed to stymie email spoofing and phishing attacks

Germany: ISIS Claims Responsibility for Attack in Bavaria ( A Syrian man whose asylum bid had been rejected in Germany recorded a cellphone video of himself pledging allegiance to the Islamic State group before he tried to get into an outdoor concert with a bomb-laden backpack. He was turned away and blew himself up outside a wine bar instead, injuring 15 people, authorities said Monday

Islamic State publishes video of suicide bomber in Germany (Washington Post) The Islamic State released on Tuesday a video of the purported suicide bomber who struck the southern city of Ansbach giving a pre-attack diatribe, prompting German authorities on Tuesday to intensify their investigation into his links with the extremist group

How one man could have owned all your Vine videos (and more) (Naked Security) A security researcher who goes by @avicoder just revealed a security bungle made earlier this year by Vine

Zepto Ransomware Packed into WSF Spam (ThreatTrack Security Labs) ThreatTrack Labs has recently observed a surge of spam containing a zip attachment with a WSF (Windows Scripting File) to deliver Zepto ransomware. This tactic is a change from the common JavaScript and macro documents being spammed previously

Ransomware Gang Claims Fortune 500 Company Hired Them to Hack the Competition (Motherboard) Ransomware—computer viruses that lock a victim’s files and demand a payment to get them back—has become so common that experts believe it’s now an “epidemic.” Security experts have always assumed that ransomware hackers are in it for the ransom. But a shocking claim made by one ransomware agent suggests there may be another motive: corporate sabotage

Health care organizations 114 times more likely to be ransomware victims than financial firms (CSO) Health care organizations were 114 times more likely to hit by ransomware

UAC bypass attack on Windows 10 allows malicious DLL loading (Help Net Security) Security researchers Matt Graeber and Matt Nelson have discovered a way to run a malicious DLL on Windows 10 without the User Account Control (UAC) springing into action and alerting users of the potential danger

Devices with Qualcomm modems safe from critical ASN.1 telecom flaw (CSO) The ASN.1 data parsing vulnerability exists in the baseband of Qualcomm modems, but cannot be exploited

Breaking PHP’s Garbage Collection and Unserialize (Evonide) Hey PHP, those variables look like garbage don’t you agree? No? Well look again

Security threats to watch out for at the 2016 Olympics (Avast! Blog) Athletes aren’t the only ones training for the Olympics, cybercriminals are also stepping up their game! Avast explains which threats you should watch out for!

Medical records data breach reported at Athens Orthopedic Clinic (Online Athens) Athens Orthopedic Clinic reported Monday it suffered a breach of its electronic medical records. The data accessed may include names, addresses, Social Security numbers, telephone numbers, and some medical data, according to a release from the clinic

Pornhub Hacked to Access Billions of Users' Information (Infosecurity Magazine) One of the largest adult websites, Pornhub, has been hacked, with the perps raking in $22,000 for the accomplishment

Security Patches, Mitigations, and Software Updates

Dell’s latest security patch addresses recently found vulnerability in company’s hardware (Windows Report) According to various reports from all over the web, Dell’s GMS has one vulnerability that could allow hackers to gain the full control over an affected PC. In case you’re not familiar with the GMS, its purpose is to give business and enterprise users the ability to control connected devices within an established, internal network

Excel refusing to open files? Blame the KB 3115322, 3115262 security updates (Infoworld) This month's monster security patch for Office breaks Excel when it tries to open HTML files, and it seems unlikely Microsoft will fix the problem

Who's to blame when Microsoft security updates go bad? (TechTarget) A bad Microsoft patch is not an uncommon event, but without the resources to test it adequately, what's an overworked IT staff supposed to do?

Amazon Silk browser removes Google’s default encryption (Help Net Security) Google’s good intentions of keeping searches made via its search engine protected through default encryption have been stymied by Amazon

Cyber Trends

Cyber Fight Requires Industry, Government Unity (WardsAuto) NHTSA Administrator Mark Rosekind says he understands the safety threat posed by hackers as automakers veer toward self-driving cars in the future, and he supports expanded collaboration between the industry and government to fight it

Cybersecurity Threat Arrives at Auto Industry’s Doorstep (WardsAuto) When Delphi Vice President and Chief Technology Officer Andrew Brown Jr. talks about the cybersecurity threat to connected and automated vehicles, he recalls a recent event hosted by the global parts supplier where hackers were invited to try their hands at breaking into a car remotely

Only a third of sensitive data stored in cloud-based applications is encrypted (Help Net Security) Despite the continued importance of cloud computing resources to organisations, companies are not adopting appropriate governance and security measures to protect sensitive data in the cloud, according to a new Ponemon Institute study that surveyed more than 3,400 IT and IT security practitioners worldwide

The future is a smarter world of dumber devices (TechCrunch) With smartphones in all of our pockets, it’s easy to laugh at Thomas Watson’s reputed remark that “there is a world market for about five computers.” But what if he was off by only four computers instead of four billion?

Machines v. hackers: Cybersecurity's artificial intelligence future (Christian Science Monitor Passcode) The US is short hundreds of thousands of information security professionals. But that gap is driving investments in artificial intelligence that may make armies of cybersecurity workers unnecessary


The hidden costs of a data breach (Journal of Accountancy) Much of the business discussion around cybersecurity relates to protection of key assets such as customer information and intellectual property, often after the news that another company has suffered a large data breach. While strengthening defenses against cyberattackers is important, companies also must be prepared to handle the reputational and financial hits that a cyber incident can produce for years down the road

Lloyd’s Has Potentially Large Exposure to Catastrophic Cyber Attack: Adsensa Review July 25, 2016 (Insurance Journal) A review of almost 400 reinsurance contracts underwritten at Lloyd’s of London has revealed potentially significant vulnerabilities and exposures if a catastrophic cyber attack should occur

GM’s Top Cyber Cop Ratchets Up Product Security (WardsAuto) After nearly nine months studying the most nefarious corners of cyberspace, General Motors executive Jeff Massimilla says, remarkably enough, he’s not having nightmares

Acalvio emerges from stealth with $17M to bring its deception-based cybersecurity system to market (TechCrunch) Acalvio Technologies, a new start-up stocked with cybersecurity veterans, is emerging from some two years of stealth with $17 million in combined series A and B funding and a security product which the team claims leapfrogs existing solutions

IBM SoftLayer Chief Reveals New Security Startup StackPath With $150 Million Already Raised (Forbes) Entrepreneur Lance Crosby is taking the coming out party for a stealth startup to a new extreme. His new startup, StackPath, publicly launched on Monday with attributes more typical of a veteran firm: 30,000 customers, three acquisitions already made and $150 million in investor funding

Now Is A Good Time To Buy IBM (Seeking Alpha) IBM has over 10% upside potential in the current market. Growth in IBM’s strategic imperatives will drive the stock price higher. IBM is a leading cloud technology investment. IBM’s interconnectivity in cloud and cognitive are giving it superior upside potential in technology. IBM’s dividend also makes it an even more attractive investment as yields fall

Swiss cyber security firms Wisekey, OpenLimit to merge (Telecompaper) Swiss cyber security companies Wisekey and OpenLimit have signed an MoU to merge their operations. Under the terms of the deal, OpenLimit would be merged with and into Wisekey, with Wisekey being the surviving entity. The signing of definitive agreements is subject to satisfactory reciprocal confirmatory due diligence, to be conducted over the next month, and other conditions as are customary

Armenia to deepen cooperation with Kaspersky Lab to improve its cyber security (ARKA Telecom) Members of the Armenian defense ministry’s Hi-Tech Cyber Security Center met Thursday with Eugene Kaspersky, a Russian cybersecurity expert and the CEO of Kaspersky Lab, the defense ministry’s press office reports

CACI Awarded Prime Position on $460 Million Multiple-Award Contract to Support U.S. Cyber Command (BusinessWire) Company offers innovative cyber mission support solutions

Belden Industrial Cyber Security Initiative Builds Momentum (BusinessWire) Belden Inc. (NYSE: BDC), a global leader in high quality, end-to-end signal transmission solutions for mission-critical applications, today announced the achievement of four strategic milestones of its industrial cyber security initiative over the first half of 2016. Together, these milestones demonstrate Belden’s commitment to the emerging industrial cyber security market and realization of its strategic vision for this market segment

Cylance Named One of the 2016 Best Places to Work in Orange County (PRNewswire) Cylance®, the company that is revolutionizing cybersecurity through the use of artificial intelligence to proactively prevent advanced persistent threats and malware, today announced that it has been named as one of the 2016 Best Places to Work in Orange County. The awards program was created in 2009 and is a project of the Orange County Business Journal and Best Companies Group

Digital Guardian Mourns the Passing of Chief Technology Officer, Salo Fajer (Sys-Con Media) Digital Guardian sadly announced today that Chief Technology Officer, Salo Fajer, died suddenly and unexpectedly on July 24, 2016. In response to this tragic event, the Company's Executive Team will meet to discuss the plan for succession to ensure the continuity of the Company's technology vision and direction

Products, Services, and Solutions

Databarracks launches Cyber-DRaaS to protect against ransomware (Realwire) Disaster recovery specialist Databarracks has launched a new DR service designed specifically to target cyber threats. Cyber-Disaster Recovery as a Service (Cyber-DRaaS) identifies cyber-attacks early and enables users to roll back to the last clean replication point in Databarracks’ secure DR environment

Try a password manager: how to get started with LastPass (Naked Security) A few days ago I wrote my plea to those of you who may still be on the fence about using a password manager. I hope I’ve convinced you to at least give it some serious thought. If you’re ready to give one a try, today I’ll introduce you one of the many available password managers out there

Dashlane brings an enterprise password management tool to mobile devices (TechCrunch) The popular password management utility Dashlane is going after the larger enterprise market today with the announcement of a new tool that will allow mobile employees to switch access between both their personal passwords, as well as those assigned to them by their workplace, in the company’s mobile app

Machine Learning Breaks Away From the Pack at the Gartner Security and Risk Summit (Cylance) A few weeks back, Cylance was granted the opportunity to participate in the annual Gartner Security and Risk Summit in Washington DC. For those who haven’t attended this event before, it’s the biggest analytical agency-led security show in the nation. There are two main things that make this show important to the industry. First, because Gartner places a heavy focus on end-user advisory, their four-hundred-plus educational sessions help buyers better understand the technological challenges they face on a daily basis. Second, the event showcases new and upcoming technology trends, discusses industry inflection points and suggests better solutions for real-world problems

Unisys Adds LogRhythm Security Intelligence Technology into Expanded Managed Security Services Offering (PRNewswire) Companies team to offer improved visibility and more efficient management of modern security threats for all Unisys Managed Security Services clients globally

Ransomware protection guarantee is offered by SentinelOne (Network World) $1,000 per machine hit by ransomware that SentinelOne misses or can’t undo the damage done by it

Yorkshire Building Society Group selects Unisys to secure customer data (Finextra) Unisys Corporation (NYSE: UIS) today announced that its UK subsidiary has been selected by Yorkshire Building Society Group (YBSG), the UK’s second largest building society, to provide its Unisys Stealth® data protection product to secure customer information and facilitate compliance with the new Payment Card Industry Data Security Standards (PCI DSS)

Technologies, Techniques, and Standards

NIST Prepares to Ban SMS-Based Two-Factor Authentication (Softpedia) Biometrics are gaining ground as an acceptable authentication method, but some conditions must be met

This group's new guide wants to prevent your car from being hacked (FedScoop) The guide represents a timely and concerted push by the auto industry to emphasize cybersecurity as more companies kick the tires on autonomous cars

CyberSecurity: The next Regulatory Frontier for Insurance (InsuranceNewsNet) Cybersecurity has emerged as one of the most critical issues facing government and industry alike. Recently we have seen an ongoing and almost daily presence of major cybersecurity events covering a wide swath of American businesses

Overview Of Encrypted Data (PDF Devices) Data commonly appears in plain text or clear text form. For a number of reasons, it sometimes becomes necessary to hide or disguise the data. During such circumstances, people choose to encrypt the information to protect it from hackers and other unauthorized users

Let's not forget that RegTech is also about cybersecurity (IT Brief) Regulatory Technology (RegTech) is becoming more of a tool to help organisations comply with automation and regulatory requirements, but Palo Alto Networks believes that they should be aware of how it will affect cybersecurity and the implications on business operations

Forget the tech, security is cultural (SC Magazine) Christian Matthies explores how agile security demands radical methods of trust and responsibility for all staff, emphasising the need for a holistic approach that makes security a consideration for everyone in the company

How do you forecast a coup? Don’t forget on-the-ground sources. (Washington Post) The coup attempt in Turkey came as a surprise to most observers. Turkey did not fit the statistical profile of a country at risk of a military takeover developed by groups such as the Early Warning Project. The economy and national institutions seemed in reasonable shape, at least in comparison with those of more fragile states where coups typically take place. Indeed, the Early Warning Project’s model indicated that Turkey had only a 2.5 percent chance of a coup

Research and Development

U.S. Lawmaker Pursues National Auto Cybersecurity Lab (WardsAuto) U.S. Sen. Gary Peters wants to establish a national laboratory for automotive cybersecurity, preferably in Detroit, to lift expertise in the field to fight off threats from potential hackers


Air Force Association's CyberPatriot Program Hosts First-Ever AFA CyberCamps in Collaboration with AT&T (PRNewswire) The Air Force Association's CyberPatriot program is hosting 83 AFA CyberCamps around the nation this summer, two of which will be hosted by AT&T

Legislation, Policy, and Regulation

In quest to punish coup plotters, Turkey squeezes out room for dissent (Washington Post) The room for dissent in Turkey had already been under threat. But in the wake of the failed military coup, the space in which political opponents could criticize the government has all but disappeared

State Dept.: No comment on possible Russian hack into DNC (Washington Examiner) The State Department on Monday declined to comment on whether it's in touch with Russian officials about the possibility that a Russia-based hacker broke into the Democratic National Committee's files

Retaliating for DNC hack poses political minefield (Politico) Obama administration officials are weighing whether they can use new legal authorities to punish those responsible for hacking into the emails of the Democratic National Committee. But any retaliation would carry a heavy political risk, including offering the appearance of trying to aid Hillary Clinton's campaign for president

DNC hack rattles U.S. effort to rein in Russia on Syria (Politico) The allegations that Russia was behind the DNC email intrusion feed mistrust among skeptics of Obama's attempts to strike a Syria deal

Edward Snowden weighs in on DNC leak (Politico) Edward Snowden knows a thing or two about leaks

White House to Issue New Policy for Cyberattack Responses (Wall Street Journal) Directive expected to clarify how government will coordinate response to breaches

Is your business still HIPAA complaint after the 2016 federal changes? (Help Net Security) The U.S. Department of Health and Human Services’ Office for Civil Rights (OCR) warned healthcare professionals and their business associates of its intention to launch a series of random HIPAA compliance audits throughout 2016. This announcement caused some panic among businesses unsure of their ability to pass a compliance review. Many organizations are unclear as to who’s bound by HIPAA compliance standards and what aspects of their business will be evaluated during an audit

Litigation, Investigation, and Law Enforcement

FBI investigating hack of Democratic party email (C|NET) The agency is looking into the WikiLeaks email dump that led to the resignation of the DNC Chairwoman Debbie Wasserman Schultz

German officials vow more checking of migrants after attacks (Yahoo! News) Top security officials in Germany called Tuesday for tougher security screening of asylum-seekers and also announced that more police officers will be hired following four attacks in the country in the span of a week — two of them claimed by the extremist Islamic State group

Munich Police Face Questions Over False Tweets During Shooting (Time) Officials tweeted there were multiple gunmen in different parts of the city. There weren't

Munich Shooter Spotlights Dark Net Gun Sales (Vocativ) A gunman who killed nine people in Germany on Friday likely bought his gun on the dark net, investigators have said

California Man Sentenced for Trying to Aid Islamic State (ABC News) A federal judge on Monday sentenced a California man to 15 years in prison for trying to join the Islamic State group in Syria, calling his conduct a serious threat to the U.S. and saying it was influenced by his abusive childhood and history of mental problems

Police ask for 3D prints of dead man’s fingers to unlock his phone (Naked Security) Police have requested a lab-rendered 3D set of replicated fingerprints from a dead man in order to attempt to unlock his phone and try to figure out who killed him

The Man Behind Bitcoin's $4.5 Million Ponzi Scheme Earns Lenient Sentence (Motherboard) Trendon Shavers, a 33 year old Texas man, was sentenced by Manhattan federal court by Judge Lewis A. Kaplan for his “High Yield Investment Program” called Bitcoin Savings & Trust. In addition to the prison sentence, the judge also ordered him to repay $1.23 million to 48 investors

For a complete running list of events, please visit the Event Tracker on the CyberWire website.

Upcoming Events

SANS San Jose 2016 (San Jose, California, USA , July 25 - 30, 2016) Information security training is coming to Silicon Valley from SANS Institute, the global leader in information security training. At SANS San Jose 2016, July 25-30, 2016, choose from 7 hands-on, immersion-style...

SANS ICS Security Summit & Training — Houston 2016 (Houston, Texas, USA, July 25 - 30, 2016) SANS has joined forces with industry leaders and experts to strengthen the cybersecurity of Industrial Control Systems (ICS). The initiative is turning ICS cybersecurity around by equipping both security...

AfricaHackOn (Nairobi, Kenya, July 28 - 29, 2016) What began as a casual meet up for information security professionals has become one of the formidable forces in the profession. That group is the AfricaHackOn. Housed under its parent umbrella, Euclid...

Black Hat USA (Las Vegas, Nevada, USA, August 1 - 6, 2015) Black Hat — built by and for the global InfoSec community — returns to Las Vegas for its 18th year. This six day event begins with four days of intense Trainings for security practitioners...

SANS Boston 2016 (Boston, Massachusetts, USA , August 1 - 6, 2016) SANS will be returning to Boston with an exceptional cyber security training lineup this August, including a special evening event hosted by Stephen Northcutt, where you'll get choose your favorite chowder!...

Secure Bermuda 2016 (Bermuda, August 10, 2016) Industry-leading intelligence from expert cybersecurity thought leaders and innovators. In addition to human capital shortages, the Bermudian cybersecurity industry faces an uphill battle to keep up with...

TECHEXPO Top Secret Polygraph-Only Hiring Event (Baltimore, Maryland, USA, August 10, 2016) Polygraph-Tested Professionals are invited to interview for new career opportunities on Wednesday, August 10 at the BWI Marriott in Baltimore, MD. A CI or Full Scope Polygraph is Required to Attend. Hot...

Insider Threat Program Development Training For NISPOM CC 2 (Aberdeen, Maryland, USA, August 10 - 11, 2016) Insider Threat Defense will hold a two-day training class on Insider Threat Program Development (National Insider Threat Policy-NISPOM Conforming Change 2). For a limited time the training is being offered...

TECHEXPO Top Secret Polygraph-Only Hiring Event (Baltimore, Maryland, USA, August 10, 2016) Polygraph-Tested Professionals are invited to interview for new career opportunities on Wednesday, August 10 at the BWI Marriott in Baltimore, MD. A CI or Full Scope Polygraph is Required to Attend. Hot...

International Conference on Cyber Security (ICCS) 2016 (Kota, Rajasthan, India, August 13 - 14, 2016) The International Conference on Cyber Security (ICCS) 2016 is an unparalleled opportunity to discuss cyberthreat analysis, operations, research, and law enforcement to coordinate various efforts to create...

2016 Information Assurance Symposium (Washington, DC, USA, August 16 - 18, 2016) The Information Assurance Symposium is the premier IA event at which leaders and practitioners share vital information and provide direction and best practices to meet today’s challenges in IA and the...

Insider Threat Program Development Training (Washington, DC, USA, March 29 - 30, 2016) Insider Threat Defense announced it will hold a training class on Insider Threat Program Development (National Insider Threat Policy-NISPOM Conforming Change 2) on March 29-30, 2016, in Washington, DC.

SANS Alaska 2016 (Anchorage, Alaska, USA, August 22 - 27, 2016) SANS is bringing our renowned security training to Alaska! Join us in August for a week of hands-on training and compelling bonus sessions while taking in breathtaking views and experiencing the great...

CISO New Jersey (Hoboken, New Jersey, USA, August 23, 2016) With newspaper headlines covering the latest data breaches, cloud computing security questions going unanswered and hackers developing more sophisticated attacks, the IT department has a growing responsibility...

CyberTexas (San Antonio, Texas, USA, August 23 - 24, 2016) CyberTexas was established to provide expanded access to security developments and resources located in Texas; provide an ongoing platform for the education and skill development of cyber professionals...

Chicago Cyber Security Summit (Chicago, Illinois, USA, August 25, 2016) The Cyber Security Summit is an exclusive conference series connects C-Suite & Senior Executives who are responsible for protecting their companies’ critical infrastructures with innovative solution providers...

Air Force Information Technology and Cyberpower Conference 2016 (Montgomery, Alabama, USA, August 29 - 31, 2016) America is faced with a national emergency in cyberspace. US national security, economic vitality, financial stability and foreign policy are being eroded. Increasingly prevalent and severe malicious cyber...

CISO Toronto (Toronto, Ontario, Canada, August 30, 2016) A data breach is not only a PR nightmare, but cause for customers to turn to competitors, exposing sensitive company information and racking up fines from industry regulators. In order for organizations...

Grow your brand and reach new customers.

Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.

Be a part of the CyberWire story.

People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.