skip navigation

More signal. Less noise.

Economic Alliance of Greater Baltimore

Maryland leads the nation in cybersecurity with a large, highly qualified workforce, 20,000 job openings, investment opportunities, and proximity to key buyers.

Daily briefing.

US NSA Director Rogers warned yesterday that the US should expect, as a matter of practical certainty, to sustain infrastructure attacks at least as damaging as December's disruption of electrical power in Ukraine.

The widely expected and hitherto mysterious OpenSSL patch arrived yesterday, and all now know what was being plugged: a TLS/SSL vulnerability now being called "DROWN" (a forced acronym derived from Decrypting RSA using Obsolete and Weakened eNcryption). It's generally regarded as serious: about a third of all https servers are thought to be susceptible to DROWN attacks, which depend upon the old EXPORT_GRADE backdoor formerly mandated for US-made security products.

TrendLabs finds a new variant of the BIFROS Trojan designed for deployment against Unix (and "Unix-like") systems. They attribute the development to the threat actors behind the "Shrouded Crossbow" campaign.

A group of Turkish hackers has claimed responsibility for the ransomware attack on Hollywood Presbyterian Medical Center. While the motive behind the attack seems clear enough—criminal extortion—those claiming responsibility cloak themselves in a nationalist mantle: they were also protesting American friendliness toward Kurds. (Sez they.)

Verizon releases a breach report with a difference: it doesn't replace the company's existing well-known annual report, but it supplements statistical treatment with instructive case studies.

In the UK, the Government prepares a new version of its surveillance bill. The Apple-FBI case is being closely watched in Europe, where observers fear it will have implications for the implementation of Privacy Shield. Partisans of both sides square off in Congressional testimony.


Today's issue includes events affecting Afghanistan, China, European Union, India, Iran, Pakistan, Russia, Syria, Turkey, Ukraine, United Kingdom, United States.

2016 National Conference of Minority Cybersecurity Professionals (Washington, DC, March 23 - 24, 2016) The landmark ICMCP conference will elevate the national dialogue on the necessary measures needed to attract and develop minority cybersecurity practitioners to address the cross-industry cybersecurity skills shortage.

Women in Cybersecurity (WiCYS) 2016 (Dallas, TX, March 31 - April 2, 2016) The 3rd annual conference brings together women (students, faculty, researchers, professionals) in cybersecurity from academia, research organizations and industry for the sharing of knowledge and experience, networking and mentoring.

Dateline RSA 2016

Cyber security execs come out swinging for Apple (USA Today) The cybersecurity industry came out swinging Tuesday in favor of Apple in its fight against the FBI’s demand that it build a backdoor into an iPhone operating system

Apple vs. FBI: Even Cryptographers Cannot Agree (eSecurity Planet) Even world famous cryptographers don't all agree with Apple's position on protecting encrypted data

NSA Director Makes Plea to Tech Industry to Partner on Security (eWeek) At RSA, the head of the U.S. Cyber Command and director of the NSA explains the mission of the organizations he commands and what he's doing to improve security in America

Cryptography Pioneers Win Turing Award (New York Times) In 1970, a Stanford artificial intelligence researcher named John McCarthy returned from a conference in Bordeaux, France, where he had presented a paper on the possibility of a “Home Information Terminal"

Innovations In Cybersecurity At RSA 2016 (TechCrunch) At the 25th RSA 2016, it will be the year of Security + Machine Learning + Artificial Intelligence

Photo gallery: RSA Conference 2016 Innovation Sandbox (Help Net Security) The RSA Conference 2016 is underway at the Moscone Center in San Francisco

RSA 2016: A call for a new approach to cyber security (ITWorld Canada) Organizations can only fight attackers by freeing infosec staff to find creative solutions, says the head of RSA

#RSAC: Creativity remains an important tool for data security, says Google’s Chief Safety Officer (Infosecurity Magazine) Google’s famous 80/20 policy, under which employees are encouraged to spend one fifth of their working hours away from the daily grind, focusing on projects that satisfy their passion, creativity and innovative spirit, extends even to the team responsible for keeping the company’s products – and users’ data – safe and secure

Encryption, Privacy & Skills Shortage Hot Topics On RSA Keynote Stage (Dark Reading) From the president of RSA to the director of the NSA, all RSA conference keynotes mentioned needs for protecting liberties and increasing the infosec workforce

CISOs Still Frozen Out of the Boardroom (Infosecurity Magazine) Cybersecurity is now front and center on organizations’ boardroom agendas (and budgets), but staffing shortages and lack of expertise persists, and most chief information security officers (CISOs) have yet to earn a seat at the table

Is Your CISO Out of Place? (IBM Security Intelligence Blog) There’s a good reason why Fast Company called the job of chief information security officer (CISO) the “hottest seat in corporate America today"

ThreatQuotient wins Security Start Up of the Year award (Help Net Security) ThreatQuotient announced its Threat Intelligence Platform (TIP), ThreatQ, was recognized as a Silver winner for Innovation in Enterprise Security at the 2016 Info Security Global Excellence Awards

ForgeRock Wins Cyber Defense Magazine Award 2016 (CSO) ForgeRock®, the leading open platform provider of identity management solutions, today announced that its ForgeRock Identity Platform™ has been recognised in the 2016 Cyber Defense Magazine Awards as “Best Product” in the Identity Access Management Solution Category

Guidance Software Honored as Gold and Bronze Winner in the 12th Annual 2016 Info Security PG’s Global Excellence Awards® in Endpoint Security and Security Training and Educational Programs (BusinessWire) The Security Industry’s Coveted Global Excellence Awards Winners and Finalists from all over the world were honored by Info Security Products Guide in San Francisco on February 29, 2016

Ntrepid’s Passages Takes Home Two Awards During RSA 2016 Conference (BusinessWire) Secure Browser Wins for Innovation in Enterprise Security and Next Generation Security

BluVector 2.0: Machine-learning malware detection (Help Net Security) At RSA Conference 2016 Acuity Solutions announced the release of version 2.0 of BluVector, its machine-learning malware detection and cyber hunting solution, which now provides to enterprises the ability to train their BluVector appliance on their environment through a new artificial intelligence capability

Discover, classify, protect and analyze data with TITUS Illuminate (Help Net Security) According to a recent Forrester report, data discovery and classification is an often-overlooked yet critical component of data security and control

Microsoft Develops Next-Generation Endpoint Security Offering (Dark Reading) Windows 10 gets a cloud-based advanced threat endpoint detection and response (EDR) service option

Kaspersky Launches Targeted Attack Detection Platform, Security Intelligence Services At RSA Conference (CRN) Kaspersky Lab Tuesday launched a targeted attack detection platform and line of security intelligence services at the RSA Conference, being held this week in San Francisco

Tenable Network Security Delivers New Solution for Unknown and Shadow Asset Solution to Eliminate Blind Spots Across Complex IT Environments (CSO) Tenable Network Security, Inc., a global leader transforming security technology for the business needs of tomorrow, announced a new solution for Unknown and Shadow Assets at RSA Conference 2016

RSA® Security Analytics Adds Real-Time Behavior Analytics (PRNewswire) Enables analysts to detect advanced threats and understand the full scope of the compromise

Chinese Threat Intel Start-up Finds DarkHotel Exploiting Chinese Telecom (Dark Reading) New China-based threat intelligence company ThreatBook wants to be the 'trusted contact in China'

Cyber Attacks, Threats, and Vulnerabilities

Islamic State group in competition for recruits in Pakistan (AP) Trying to lure him into the Islamic State group, the would-be recruiter told Pakistani journalist Hasan Abdullah, "Brother, you could be such an asset to the Ummah"— the Islamic community. Abdullah replied that he was enjoying life and had no plans to join the jihadis

NSA Chief Worries About Cyber-Attack on US Infrastructure (Gadgets 360°) US National Security Agency chief Michael Rogers warned Tuesday that hackers will inevitably mount a cyber-attack against US infrastructure, similar to the power failure in western Ukraine last year

New Malware ‘Rover’ Targets Indian Ambassador to Afghanistan (@PhilipHungCao) On December 24, 2015, Unit 42 identified a targeted attack, delivered via email, on a high profile Indian diplomat, an Ambassador to Afghanistan

DROWN attack breaks TLS encryption, one-third of all HTTPS servers vulnerable (Help Net Security) There’s a new attack that breaks the communication encryption provided by SSL and TLS and can therefore lead to theft of extremely sensitive data exchanged between users and a vulnerable server

DROWN attack: 33% of all HTTPS servers declared at risk (HEAT Security Blog) Remember the Heartbleed and POODLE vulnerabilities that were found in the OpenSSL cryptographic library back in 2014?

Attack of the week: DROWN (A Few Thoughts on Cryptographic Engineering) To every thing there is a season. And in the world of cryptography, today we have the first signs of the season of TLS vulnerabilities

The DROWN security hole – what you need to know (Naked Security) Our Vulnerability of the Week Award goes to DROWN, for a cool name and and an amusing logo

Threat Actors Behind “Shrouded Crossbow” Create BIFROSE for UNIX (TrendLabs Security Intelligence Blog) We recently came across a variant of the BIFROSE malware that has been rewritten for UNIX and UNIX-like systems

Shocking! This Trojan can bypass Google Play Store’s security measures! (PC-Tablet) Acecard Trojan, capable of attacking nearly 30 banking and payment Android mobile apps was detected by Kaspersky Lab’s Anti-malware research team

Turkish hackers claim responsibility for LA hospital ransomware (SC Magazine) Turkish hackers have claimed responsibility for the recent ransomware attack on a Los Angeles hospital

HackingTeam Releases New Malware Targeting Mac (Softpedia) For the past few weeks, security researchers from Palo Alto Networks, SentinelOne, and Synack have been analyzing a new malware sample targeting Mac OS X, which appears to be the work of the infamous HackingTeam

Another Day, Another Hack: Hacker Claims to Have Sold 27M Passwords (Motherboard) Quite literally, every day someone gets hacked. Whether that's a telecommunications company having its customer data stolen, or another chain of businesses being ripped for all the credit cards it processes, today one hack just seems to melt into another

Beware Of Social Media And Cybersecurity (Forbes) There are no hackers, only spies, says Eric O’Neill, former FBI counterterrorism and counterintelligence operative

Information vs. Intelligence: Anonymous targets the banking industry (CSO) A threat advisory from Solutionary warns of a pending attack

Cybercrime Recruiters Want You (BankInfoSecurity) Desperately seeking hackers for hire

Security Patches, Mitigations, and Software Updates

Millions of OpenSSL secured websites at risk of new DROWN attack (ZDNet) A new patch to OpenSSL has come just in time to combat the new deadly DROWN security hole. Here's how to defend yourself

Cyber Trends

Verizon releases first-ever data breach digest with security case studies (CSO) Verizon is known for its huge annual Data Breach Investigations Report, but this morning it released a less data-heavy digest organized by case study

Data breaches exposed over 707 million records in 2015 (ZDNet) But the good news is that the total number of breaches dropped by 3.4 percent from 2014

DDoS, Web Attacks Surge; Repeat Attacks Become the Norm (CSO) Akamai has announced the availability of the Q4 2015 State of the Internet – Security Report. The quarterly report provides analysis and insight into malicious activity observed across the Akamai Intelligent Platform™ and provides a detailed view of the global cloud security threat landscape

Companies are realizing that security and privacy go hand in hand (Help Net Security) 50 percent of companies over the past two years have increased the involvement of privacy professionals on their information security teams to enhance the prevention of data breaches, a joint study released at RSA Conference by the International Association of Privacy Professionals (IAPP) and TRUSTe has found

Phishing Attacks Increase Tech Sophistication, Focus On Financial Fraud (Dark Reading) With a prevalence of free, feature-rich phishing kits and multi-million dollar profits from business email compromise attacks, no wonder phishing's so popular

To Case the Joint, Press 1: Crooks Refocus on Bank Call Centers (American Banker) The often-overlooked call center is getting more attention, as banks realize that stronger security on online and mobile channels has driven cybercriminals to focus their energies on conning phone reps


World’s 10 Hottest Cybersecurity Companies to Watch in 2016 (Information Security Buzz) Cybersecurity Ventures announces the Cyber Top 10 for 2016, a global compilation of the leading companies who provide cybersecurity solutions and services. The ten companies sit atop the Cybersecurity 500, which is published quarterly by Cybersecurity Ventures

LogicNow Acquires iScan Online, Introduces MAX Risk Intelligence (MSPMentor) iScan's technology will power the LOGICnow MAX Risk Intelligence solution

PAR Technology Lands Air Force Cyber Tech Development Contract; Matt Cicchinelli Comments (ExecuitveBiz) PAR Technology‘s government systems subsidiary landed an approximately 42-month $3.4 million Integrated Information Management System Cyber Technology Maturation Framework contract from the U.S. Air Force

AVG Technologies Announces Second Tranche of Share Repurchase Program (PRNewswire) AVG® Technologies N.V. (NYSE: AVG), the online security company™, announced today the second tranche of its previously announced 1,666,667 share repurchase program intended to cover AVG's obligations to deliver shares under its employee stock options incentive and restricted share units plans, as announced on November 9, 2015 and subsequently on December 17, 2015

eCrypt Technologies : Bravatek Board of Director, Chuck Brooks, Widely Recognized For Thought Leadership and as Top Social Media Influencer (4-Traders) Chuck was recently named Chairman of CompTIA's New and Emerging Technology Committee. The committee address the impacts of social media, big data and data analytics, cloud, mobility, and the Internet of Things

Engility taps former Raytheon exec as new CEO (Boston Business Journal) Engility Holdings Inc. (NYSE: EGL) said Tuesday it has hired board member and longtime defense industry vet Lynn Dugle as its new CEO as Tony Smeraglinolo has stepped down effective immediately

Products, Services, and Solutions

Accenture and Endgame Form Alliance to Help Organizations Hunt, Block and Remove Cyber Adversaries (Accenture) Accenture also investing in Endgame to expand its cyber defense portfolio with automated threat detection and elimination

A10 Networks Announces Worldwide Availability of Thunder Convergent Firewall and New ACOS 4.1 Software Release (A10) A10 Networks (NYSE: ATEN), a leader in application networking and security, today announced the worldwide availability of Thunder Convergent Firewall (CFW), a standalone security product built on A10’s ACOS Harmony platform

A10 Networks Launches Standalone Thunder SSL Insight (SSLi) Line of Products (A10) A10 Networks (NYSE: ATEN), a leader in application networking and security, announced the worldwide availability of Thunder SSL Insight (SSLi), a standalone security product built on A10’s market-leading SSL inspection technology and ACOS Harmony platform.

Cavium OCTEON III Multi-Core Processor Family Powering Next Generation Advanced Security Appliances (PRNewswire) Cavium, Inc. (NASDAQ: CAVM), a leading provider of semiconductor products that enable intelligent processing for enterprise, data center, wired and wireless networking, today announced that its latest processing technologies are enabling a new wave of advanced security appliances

Qualys extends Cloud Agent Platform to support Linux and Mac OS (Help Net Security) Qualys announced the expansion of the Qualys Cloud Agent Platform

SECUDE and Boldon James Partner to Offer an Integrated Data Classification Solution for SAP Customers (Yahoo! Finance) Data classification leaders collaborate to provide consistency in handling enterprise data, created both inside and outside of SAP applications

Splunk adds more machine learning, analytics to security detection tools (ZDNet) Splunk added features and integration between User Behavior Analytics (UBA) 2.2 and Splunk Enterprise Security 4.1

Egnyte offers flexible key management (Computerworld) Encryption has been, ever since the Snowden revelations, the topic du jour. Egnyte is giving customers ultimate flexibility over encryption keys

Hexis Cyber Solutions Enhances HawkEye G Integrated Detection and Automated Response Capabilities (EconoTimes) Hexis Cyber Solutions Inc. (Hexis), a wholly-owned subsidiary of The KEYW Holding Corporation (NASDAQ:KEYW), and a provider of advanced cybersecurity solutions for commercial companies and government agencies, is committed to the continuous innovation and development of its flagship next-generation endpoint security solution, HawkEye G

Say hello to Kiddle: the child-protecting search engine (Naked Security) Remember “celebgate” – the widespread hack of hundreds of iCloud accounts which saw the internet flooded with intimate pictures of Jennifer Lawrence, Rihanna and a whole host of others?

Technologies, Techniques, and Standards

How to set up your Facebook privacy settings (Graham Cluley) Facebook, privacy and you

Research and Development

Deep Instinct Files Portfolio of Patents to Implement Deep Learning in Cybersecurity (BusinessWire) Patent-pending technology applying deep learning to cybersecurity for the first time prevents zero-day and APT attacks on endpoints, servers and mobile devices, freeing enterprises from costly recovery

Legislation, Policy, and Regulation

Britain floats revised bill for broad surveillance powers (SC Magazine) Britain floated revised legislation on Tuesday that would grant authorities wide-ranging surveillance powers including the right to see which websites people visit, saying the modified bill addressed concerns about threats to privacy

Apple-FBI stand-off raises red flags for European data protection agreement (Euronews) The fight between Apple and the US law enforcement agency the FBI over access to a terrorist’s iPhone is raising concerns in Europe

Lynch: Wiretap agreement with Britain would protect privacy, human rights (Washington Post) Attorney General Loretta E. Lynch plans to say Tuesday that recently launched transatlantic talks to enable British access to wiretap data from U.S. firms would protect privacy and human rights

Carter Draws Hard Comparison With China on Cyber, Naval Policies (Defense News) Secretary of Defense Ash Carter used a keynote address in San Francisco on Tuesday to draw stark parallels between the policies of the United States and those of China, particularly on freedom of commerce and the Internet

Defense Secretary Ash Carter Praises Strong Encryption (Wall Street Journal) Warns that if U.S. and Silicon Valley don’t work together, other nations could set standards on their terms

Apple lawyer, FBI director face off in Congress on iPhone encryption (Reuters) FBI Director James Comey told a congressional panel on Tuesday that a final court ruling forcing Apple Inc (AAPL.O) to give the FBI data from an iPhone used by one of the San Bernardino shooters would be “potentially precedential” in other cases where the agency might request similar cooperation from technology companies

Our personal security is our national security (The Hill) Strong encryption is good for our personal security

Offense and Defense Define Air Force Cyber Work With Industry (SIGNAL) Maj. Gen. Burke Edwin Wilson, USAF, commander, 24th Air Force and Air Forces Cyber, offers that the 24th is working with industry “on a plethora of capabilities"

Litigation, Investigation, and Law Enforcement

Attorney General Loretta Lynch ‘Disappointed’ With Apple Court Ruling (Wall Street Journal) Says technology companies are subject to ‘social compact’ to comply with the law and meet its responsibilities

F.B.I. Error Locked San Bernardino Attacker’s iPhone (New York Times) The head of the F.B.I. acknowledged on Tuesday that his agency lost a chance to capture data from the iPhone used by one of the San Bernardino attackers when it ordered that his password to the online storage service iCloud be reset shortly after the rampage

We’re On the Same Side, Carter Tells Silicon Valley (Defense One) As the FBI-vs.-Apple battle heats up, the defense secretary makes his own pitch to the tech industry

Terror Expert Describes Islamic State Tactics, Recruiting (ABC News) An expert for the U.S. Justice Department told a jury in a terror trial on Tuesday that Islamic State targets individual American troops and reaches new recruits through social media

For a complete running list of events, please visit the Event Tracker on the CyberWire website.

Newly Noted Events

2016 CyberWeek (Tel Aviv, Israel, June 19 - 23, 2016) The conference, held jointly by the Blavatnik Interdisciplinary Cyber Research Center (ICRC), the Yuval Ne'eman Workshop for Science, Technology and Security, the Israeli National Cyber Bureau, Prime Minister's...

Upcoming Events

RSA Conference 2016 (San Francisco, California, USA, February 29 - March 4, 2016) Celebrating its 25th anniversary, RSA Conference continues to drive the information security agenda forward. Connect with industry leaders at RSA Conference 2016

Cybersecurity: Defense Sector Summit (Troy, Michigan, USA, March 1 - 2, 2016) The National Defense Industrial Association (NDIA) Michigan Chapter Cybersecurity: Defense Sector Summit is to provide a forum to foster educational dialog between government, industry and academia in...

International Academic Business Conference (New Orleans, Louisiana, USA, March 6 - 10, 2016) The Clute Institute of Littleton Colorado sponsors six academic conferences annually that include sessions on all aspects of cybersecurity. Cybersecurity professionals from industry and academics are...

CISO Chicago Summit (Chicago, Illinois, USA, March 8, 2016) A data breach is not only a PR nightmare, but cause for customers to turn to competitors, exposing sensitive company information and racking up fines from industry regulators. In order for organizations...

Navigating Summit 2016 (Canberra, Australia, March 8, 2016) The Australian government has pledged to create a future-proofed nation, one that is fit to drive higher economic growth and improved standards of living using information technology innovatively. Privacy...

CISO Atlanta Summit (Atlanta, Georgia, USA, March 10, 2016) Tactics and Best Practices for Taking on Enterprise IT Security Threats. With newspaper headlines covering the latest data breaches, cloud computing security questions going unanswered and hackers developing...

The Atlantic Council's Cyber 9/12 Student Challenge (Washington, D.C. USA, March 11 - 12, 2016) Now entering its fourth year, the Cyber 9/12 Student Challenge is a one-of-a-kind competition designed to provide students across academic disciplines with a deeper understanding of the policy challenges...

SANS 2016 (Orlando, Florida, USA, March 12 - 19, 2016) It is time we unite, join forces, and show that if we work together, we can make a measurable difference in security. It is our pleasure to announce that SANS 2016 is back in Orlando, Florida March 12-21 ...

CONAUTH/EKMS/COMSEC Information Sharing and Key Management Infrastructure (ISKMI) 2016 (Waikiki, Hawaii, USA, March 14 - 18, 2016) The ISKMI will draw global-wide participation and Allied (Five Eyes and NATO) attendees. Information sharing will be centralized to Key Management Infrastructure (KMI), Cryptographic Modernization (CM),...

Pwn2Own 2016 (Vancouver, British Columbia, Canada, March 16 - 17, 2016) Since its inception in 2007, Pwn2Own has increased the challenge level at each new competition, and this year is no different. While the latest browsers from Google, Microsoft, and Apple are still targets,...

Insider Threat Symposium & Expo™ (San Antonio, Texas, USA, March 17, 2016) The Insider Threat Symposium & Expo was created in the wake of the recent data breaches affecting the U.S. Government (WikiLeaks, NSA Breach), and the continued damaging and costly insider threat incidents...

ICCWS 2016 (Boston, Massachusetts, USA, March 17 - 18, 2016) ICCWS 2016 will cover the complex but exciting aspects of international cyber warfare and security

CISO Summit France (Paris, France, March 22, 2016) A forum for innovative IT thought leaders across France. Despite economic instability in the euro zone amid an on-going global financial crisis, IT spending worldwide is expected to increase in the coming...

Risk Management Summit (New York, New York, USA, March 22 - 23, 2016) The Business Insurance Risk Management Summit is a unique two-day conference serving the information and networking needs of senior risk managers, benefits managers and related decision makers from the...

Artificial Intelligence and Autonomous Robotics (Clingendael, the Netherlands, March 23 - 24, 2016) Artificial Intelligence (AI) has been a feature of science fiction writing for almost a century, but it is only in more recent years that the prospect of truly autonomous robotics — even those that...

International Consortium of Minority Cybersecurity Professionals (ICMCP) Inaugural National Conference (Washington, DC, USA, March 23 - 24, 2016) The conference will focus on the public, private and academic imperatives necessary to closing the growing underrepresentation of women and minorities in cybersecurity through diversification of the workforce.

Commonwealth Cybersecurity Forum 2016 (London, England, UK, March 23 - 24, 2016) The Commonwealth, built on consensus and mutual support, is an ideal platform to build international cooperation on various aspects of cybersecurity. CTO's Commonwealth Cybersecurity Forum brings together...

Black Hat Asia 2016 (Singapore, March 29, 2016) Black Hat is returning to Asia again in 2016, and we have quite an event in store. Here the brightest professionals and researchers in the industry will come together for a total of four days — two...

SecureWorld Boston (Boston, Massachussetts, USA, March 29 - 30, 2016) Join your fellow security professionals for affordable, high-quality cybersecurity training and education. Earn 12-16 CPE credits through 60+ educational elements learning from nationally recognized industry...

Insider Threat Summit (Monterey, California, USA, March 29 - 30, 2016) The focus of the Insider Threat Summit is to discuss personnel security issues including cyber security challenges and capabilities, continuous evaluation of privileged identities and ethical physical...

TU-Automotive Cybersecurity USA 2016 (Novi, Michigan, USA, March 29 - 30, 2016) TU-Automotive Cybersecurity dissects the real issues behind the headlines, helping you to apply technology and best practices to deliver robust security defenses and processes within a more secure ecosystem.

Women in Cyber Security 2016 (Dallas, Texas, USA, March 31 - April 2, 2016) With support from National Science Foundation, Award #1303441 (Capacity Building in Cybersecurity: Broadening Participation of Women In Cybersecurity through the Women in Cybersecurity Conference and Professional...

Grow your brand and reach new customers.

Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.

Be a part of the CyberWire story.

People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.