skip navigation

More signal. Less noise.

Daily briefing.

More emerges on the FBI's renewed investigation of emails that allegedly transited from former Secretary of State Clinton's private server to a laptop used by former New York Representative Anthony Wiener. WikiLeaks continues to make good on its promise to release discreditable documents related to the Clinton campaign; Julian Assange denies that he's getting those documents from Russia. Sources tell various news outlets that FBI investigators have high confidence that five unnamed foreign intelligence services succeeded in compromising the former Secretary's now decommissioned private server.

Concerns about Russian influence on US elections continue. Among those concerns are the prospect of distributed denial-of-service campaigns against election-related targets. DDoS fears have risen since the Mirai Internet-of-things botnet attacks last month. Bitdefender reports finding an exploitable vulnerability in widely used web cameras. MalwareMustDie warns against the IoT-focused Linux/IRCTelnet malware. The Online Trust Association says the DDoS against Dyn could have been "easily" prevented with better secured IoT devices, which is no doubt true, but mopping up the very large number of insecure devices is a far from trivial challenge.

Sophos has acquired Irish security analytics shop Barricade. A much larger acquisition has also been announced: Broadcom is buying Brocade for $5.5 billion,

NICE (the National Initiative for Cybersecurity Education) is meeting this week in Kansas City. NIST has used the occasion to launch not only its CyberSeek jobs map, but a draft Cybersecurity Workforce Framework. NSA and its LifeJourney partner is offering a Day of Cyber for students: registrations have passed five million.


Today's issue includes events affecting China, India, Ireland, New Zealand, Russia, Singapore, United Kingdom, United States.

A note to our readers: We're in Washington today covering the SINET Showcase 2016. Watch for full coverage in upcoming issues.

The CyberWire's regular daily Podcast will be out later this afternoon, with interviews, educational tips, and more on the stories of the day. Today our partner Jonathan Katz from the University of Maryland will describe an experiment Google ran, pitting several AIs against each other in an encryption challenge. Our guest is MetTel's Edward Fox, discussing the role telecommunications companies play in cyber security. As always, if you enjoy the podcast, please consider giving it an iTunes review.

TECHEXPO Cyber Security Hiring Event (McLean, VA, USA, November 2, 2016) Our professional hiring events have benefited nearly a million attendees since 1993. We look forward to helping you advance your career and saving you time in your job search by providing you the opportunity to meet face to face with the nation's leading companies.

Malware Detection: How to Spot Infections Early with AlienVault USM (Live Webcast, November 3, 2016) While malware has been a thorn in the side of IT pros for years, some of the recent variants observed by the AlienVault Labs security research team, like CoreBot, have the ability to modify themselves on the fly, making them nearly impossible to detect with traditional preventative security measures. Join us for a live demo to learn about the most common types of malware, and how you can detect infections quickly with AlienVault USM.

Dateline SINET Showcase 2106

SINET Showcase (SINET) We believe that effective Cybersecurity is required to facilitate economic growth, protect critical infrastructure and maintain political stability. To accomplish this objective, SINET is dedicated to building a cohesive, worldwide Cybersecurity community with the goal of accelerating innovation through collaboration. SINET is a catalyst that connects senior level private and government security professionals with solution providers, buyers, researchers and investors

SINET 16 Innovator Award Overview (SINET) Each year, SINET evaluates the technologies and products of hundreds of emerging Cybersecurity companies from all over the world, and selects the 16 most innovative and compelling companies. These 16 companies, known as the SINET 16 Innovators, are invited to present their products and solutions on stage in Washington D.C. at our annual SINET Showcase

Cyber Attacks, Threats, and Vulnerabilities

How Did WikiLeaks Get Clinton's Emails? Assange Says Russia Not Responsible For Democrat's Leaked Emails (International Business Times) The thousands of emails related to Democratic presidential nominee Hilary Clinton, her party and close allies that were published by WikiLeaks were not obtained from the Russian government, the founder of the nonprofit organization, Julian Assange, said Thursday

Sources: 99 percent chance foreign intel agencies breached Clinton server (Fox News) Authorities now believe there is about a 99 percent chance that up to five foreign intelligence agencies may have accessed and taken emails from Hillary Clinton’s private server, two separate sources with intimate knowledge of the FBI investigations told Fox News

DDoS Warning as US Presidential Election Approaches (Infosecurity Magazine) Security experts are warning that DDoS attacks could be used next Tuesday to suppress voter turnout for the US presidential elections

Kremlin Hackers Are Exploiting Microsoft's Unpatched Zero-Day (Infosecurity Magazine) Microsoft has identified the Russian APT group known as Fancy Bear as using a Windows zero-day to attack unnamed organizations. Some say it’s an attempt to manipulate the outcome of next week’s US election by targeting political organizations

Bitdefender Found Critical Vulnerabilities In IoT Cameras (Toms Hardware) Bitdefender announced that it discovered critical vulnerabilities in an unidentified manufacturer's Internet of Things (IoT) cameras that could threaten the privacy of their owners and enable distributed denial of service (DDoS) attacks

Linux/IRCTelnet creates new, powerful IoT DDoS botnet (Help Net Security) Linux/IRCTelnet (new Aidra), a new piece of Linux malware targeting IoT devices and turning them into DDoS-capable bots, has been spotted and analyzed by one of the researchers who share their discoveries on the MalwareMustDie! blog

DDoS attack on Dyn could have been prevented (CSO) The Online Trust Association says the recent DDoS attack that took down portions of the internet for several hours could have been “easily” avoided by improving the security of IoT devices

StarHub Attack Raises IoT Security Questions (InfoRisk Today) Volume of infected devices, lack of IoT standards are cause for concern

Net Neutrality Could Stall Defense Against Dyn-Like Cyberattacks (Inside Sources) FCC’s net neutrality rules may make Internet service providers reluctant to block malicious traffic

Android Trojan targets customers of 94 banks in US, Europe (Help Net Security) If you/ve recently installed a Flash Player Android app and now almost every app you open asks you for your payment card details, you’ve been infected with a banking Trojan

Belkin’s WeMo Gear Can Hack Android Phones (Threatpost) A SQL injection vulnerability is present in Belkin’s WeMo home automation firmware that could allow a third party with local access to a network to gain root access to devices such as light switches, lightbulbs, security cameras and coffee makers

Sundown Exploit Kit ‘Larger Threat Than People Realize’ (Threatpost) It’s been a tumultuous summer for exploit kits with the demise of Angler, Neutrino and Nuclear, for years each responsible for massive amounts of dollar losses and malware infections. Now, Cisco Talos security researchers are bracing for new entrants to fill the void, starting with the Sundown exploit kit

Are You At Risk Of Material Impact Because Of Bad SSL Certificates from WoSign and StartCom? (RiskIQ) Mozilla, the world’s second most popular browser, announced an important security decision last week to distrust a range of bad SSL certificates issued by Certificate Authorities (CAs) WoSign and Startcom, citing “technical and management failures”

Critical MySQL Vulnerabilities Can Lead to Server Compromise (Threatpost) Critical vulnerabilities in MySQL and vendor deployments by database servers MariaDB and PerconaDB have been identified that can lead to arbitrary code execution, root privilege escalation and server compromise

Unpatched Vulnerability on Puts Millions of Sites at Risk (Threatpost) Update Cloud-based web host is vulnerable to a DOM-based cross-site scripting vulnerability that can give attackers control over any of the millions of websites hosted on the platform

Computer Virus Cripples UK Hospital System (KrebsOnSecurity) Citing a computer virus outbreak, a hospital system in the United Kingdom has canceled all planned operations and diverted major trauma cases to neighboring facilities. The incident came as U.K. leaders detailed a national cyber security strategy that promises billions in cybersecurity spending, new special police units to pursue organized online gangs, and the possibility of retaliation for major attacks

New Zealand Nurses Caught Out in Major Email Breach (Infosecurity Magazine) Tens of thousands of New Zealand nurses have had personal details accidentally disclosed to a phisher in yet another example of the data breach dangers posed by human error

Problems for William Hill as website attacked (Racing Post) William Hill apologised to customers after their website crashed on Tuesday having come under cyber attack

Level 3 drops its packets for hours, causing Internet traffic jam (Ars Technica) Outage restored by noon ET; company says it's “looking into this issue”

What We Can Learn From a $1.5M Cyber Theft at a Cambridge Company (BostInno) If you work in tech, it's practically a rite of passage to be briefed on the dos and don'ts of cyber security. It's common practice for businesses to train their employees on how to flag and thwart cyber attack attempts. And yet these instances still occur. Case in point: A company located in Kendall Square recently experienced a cyber attack that almost resulted in a loss of more than $1.5 million

#UNITEDsummit: Heisenberg Project Outlines Cloud Attack Realities (Infosecurity Magazine) The Heisenberg Cloud, a honeypot intelligence-gathering effort, shows that attackers target different clouds for different reasons—and are selective in their efforts rather than merely opportunistic

Merchants and financial institutions deal with escalating cyber attacks (Help Net Security) Unsurprisingly, the Q3 2016 ThreatMetrix report shows a sharp increase in the number and complexity of cyber attacks. During what is traditionally a slow quarter, researchers analyzed nearly 5 billion transactions, and stopped approximately 130 million attacks in real time – a 40 percent increase over 2015

When smartphone upgrades go wrong (Help Net Security) As the holiday shopping season kicks into full gear around the world, industry analysts predict low prices, discounts and promotions will entice shoppers to buy the latest tech gadgets and electronics, including smartphones and tablets

Security Patches, Mitigations, and Software Updates

Microsoft to patch Windows bug that Google revealed (CSO) Fix goes out Nov. 8 for vulnerability used by Russian hackers who penetrated the Democratic National Committee

Belkin Fixes Security Flaws in Its WEMO IoT Devices (eWeek) At Black Hat Europe, Invincea researchers will talk about vulnerabilities they found in Belkin's home automation devices. Belkin has since patched the flaws

Mitigations Available for PanelShock Vulnerabilities in Schneider Electric Magelis HMIs (Threatpost) One week after addressing a critical vulnerability in its industrial controller management software, Schneider Electric is in the midst of handling two more serious flaws in a number of its Magelis HMI products

Android 7.0 Nougat Update: How Safe Is Your Android Phone? (Bitbag) Earlier this year, Check Point Software Technologies highlighted a serious security flaw present on all Android-based devices. Check Point stated that the flaw can provide root-level access on mobile devices to anyone who hacks it. This is why Google has been busy of late releasing updates that were finally culminated by the release of Android 7.0 Nougat

Cyber Trends

Threat Intelligence Overload: Ponemon Report Says 70 Percent Of Organisations Swamped By Cyber Threat Data (Information Security Buzz) Anomali, provider of market-leading threat intelligence platforms, today announced the results of a Ponemon Institute study revealing that 70 percent of security industry professionals believe threat intelligence is often too voluminous and/or complex to provide actionable insights

Ransomware 'biggest threat' to cyber security of Irish businesses (RTE) The biggest threat to the cyber security of Irish businesses comes from ransomware, according to Dell EMC

Business Security Confidence Contradicts High Success Rate Of Attacks (Dark Reading) Research indicates one in three cyberattacks results in a security breach, but most organizations are confident in their defense tactics

Most Windows Users Don’t Care About Security, Research Shows (Softpedia) Windows 7 is the most popular Windows version even though no less than 600 vulnerabilities affect it, the study reveals


Do recent events foreshadow a large-scale cyber aggregated loss? (Property Casualty 360) Opinion: What would happen if numerous major insureds, all with multimillion-dollar policies, all suffered major breaches simultaneously?

Online Ad Industry Threatened by Security Issues (DataBreach Today) Voluntary set of anti-malware guidelines may not go far enough

Broadcom Limited to Acquire Brocade Communications Systems Inc. for $5.9 Billion (GlobeNewswire) Broadcom Limited (Nasdaq:AVGO) and Brocade Communications Systems, Inc. (Nasdaq:BRCD) today announced that they have entered into a definitive agreement under which Broadcom will acquire Brocade, a leader in Fibre Channel storage area network (“FC SAN”) switching and IP networking, for $12.75 per share in an all-cash transaction valued at approximately $5.5 billion, plus $0.4 billion of net debt

Sophos Acquires Security Analytics Start-Up in Ireland (Marketwired) Sophos (LSE: SOPH), a global leader in network and endpoint security, today announced that it has acquired Barricade, a pioneering start-up with a powerful behavior-based analytics engine built on machine learning techniques. The team and technology from Barricade will strengthen Sophos' synchronized security capabilities and its next-generation network and endpoint protection portfolio

As Broadcom Buys Brocade, Here Are Other Enterprise Technology Firms That Could Get Acquired Next (The Street) Both private equity firms and tech companies have shown a willingness to make billion-dollar acquisitions for enterprise hardware and software companies. And the fervor appears to be far from over

Can SonicWall survive desertion by Dell? (ARN) SonicWall A/NZ country manager, Sandeep Joshi, outlines what lies ahead for the security vendor

2 Companies That Protect the Internet of Things (Motley Fool) Cisco and Symantec are offering the tools to counter devastating IoT-based attacks

Atos and Siemens join forces to rebuke IIoT cyber criminals ( Cyber attacks result in considerable damage to companies across the globe. The roll out of the Industrial Internet of Things is expected to see additional avenues for attack opening up, resulting in the potential for more losses and making defence more difficult. In a bid to assess the potential threat, and to provide security solutions for manufacturers, Atos and Siemens have joined forces

Palantir can compete for Army tactical intel upgrade (Defense Systems) Data analytics vendor Palantir Technologies Inc. won a key court ruling this week in its bid to compete on a future contract to upgrade the Army's Distributed Common Ground System (DCGS)

Cybereason Announces International Expansion and Opens Its New London Office to Serve Europe, the Middle East and Africa (PRWeb) Simon Sharp Named Cybereason’s Vice President EMEA Region. Simon has been hired to build out the entire region's sale team because of increased demand for the company's award-winning detection and response threat hunting platform

SkyBox Cloud LLC Is Moving Headquarters To Grand Rapids To Expand Midwest Presence (Host Review) SkyBox Cloud LLC, a provider of offsite server and application hosting and cloud backup for small to enterprise-sized companies, is moving its headquarters to Grand Rapids to expand into the Midwest beyond its customer base in the western United States

IBM Security Executive Shelley Westman Joins Protegrity as SVP of Alliances & Field Operations (Yahoo!) Protegrity, the leading provider of data-centric enterprise data security solutions, announced today that Shelley Westman has joined the company as Senior Vice President of Alliances & Field Operations, reporting to Protegrity CEO Suni Munshani

A Q&A with our Newest Advisor Lieutenant General Rhett Hernandez, U.S. Army, Retired (Bay Dynamics) We are excited to announce a new addition to our Bay Dynamics team. Lieutenant General Rhett Hernandez (Ret), a 39-year veteran of the United States Army, has joined our advisory board

Products, Services, and Solutions

Forcepoint™ Integrates Stonesoft® Next-Generation Firewall with Cloud Security Technologies (PRNewswire) Forcepoint's NGFW also receives NSS Labs' rating of "Recommended" in Intrusion Prevention

How feds can sign up for new OPM breach coverage (Federal Times) Federal employees impacted by last year’s cyber hack of the Office of Personnel Management have a month to re-enroll for credit and identity monitoring protections offered by the agency

If you want your company to have a future, you need a cyber security strategy (Buiness Insider) Navigating the Digital Age is a cybersecurity guide for company directors and decision makers. This introduction highlights the importance of cybersecurity and why companies need to urgently think about putting preventative measures in place

Mellanox Launches Open Source Software Initiative for Routers, Load Balancers, and Firewalls (BusinessWire) OpenNPU first open software supporting open networking platforms

Skybox Security Announces Integration with CyberX, Improving Security in Industrial Control Systems (India PR Wire) Modeling, access simulation and vulnerability analysis capabilities bring enhanced visibility to SCADA and ICS networks to maintain uptime and avoid disruption

Password manager LastPass now works on all your devices for free (CSO) Now you can get LastPass on your computer and your phone without paying $12 per year

Technologies, Techniques, and Standards

Uninstall PERL File Extension Ransomware (Virus Guides) I wrote this article to help you remove PERL File Extension Ransomware. This PERL File Extension Ransomware removal guide works for all Windows versions

Don't pay ransom, Kaspersky Lab warns (ITProPortal) Report being attacked by ransomware to the authorities, instead

Echo from the Past: Security Lessons for IT Modernization (GovInfoSecurity) ISMG Editors analyze the latest developments


NICE Framework Provides Resource for a Strong Cybersecurity Workforce (NIST) The U.S. Commerce Department’s National Institute of Standards and Technology (NIST) released a resource that will help U.S. employers more effectively identify, recruit, develop and maintain cybersecurity talent

SP 800-181 DRAFT NICE Cybersecurity Workforce Framework (NCWF): National Initiative for Cybersecurity Education (NIST) NIST is pleased to release the draft NICE Cybersecurity Workforce Framework (NCWF) - a reference resource that will allow our nation to more effectively identify, recruit, develop and maintain its cybersecurity talent. The framework provides a common language to categorize and describe cybersecurity work that will help organizations build a strong labor staff to protect systems and data

Governor McAuliffe Announces “NSA Day Of Cyber” School Challenge In Virginia (Alexandria News) Governor Terry McAuliffe today announced the launch of Virginia’s “NSA Day of Cyber” School Challenge. The challenge begins today, as Cybersecurity Awareness Month in October concludes, and will run through the end of March 2017

BAE’s DeEtte Gray: Investments in Cyber, STEM Programs Needed to Address Demand for Cyber Professionals (ExecutiveBiz) DeEtte Gray, an executive at BAE Systems’ U.S. arm, has said industry, government, academia and organizations should collaborate to make investments in science, technology, engineering, mathematics and cyber education initiatives in an effort to develop a pipeline of cyber professionals

Legislation, Policy, and Regulation

SEBI to Hire a CISO to Help Protect Securities Markets (InfoRisk Today) Information security leaders weigh in on priorities for new officer

Joint efforts to enhance cyber security (Shanghai Daily) The issue of cyber security takes on a high profile as firms and government bureaus have joined together to strengthen it, Shanghai Daily learned during the China International Industry Fair yesterday

UK in $2.3 billion plan to ‘strike back’ at hackers (AFP via Interaksyon) Finance minister Philip Hammond on Tuesday warned Britain will “strike back” against states hacking into strategic networks in order to avoid a military showdown, as part of a new cyber-defence plan

Deloitte comments on the National Cyber Security Strategy 2016-2021 (Deloitte) Bryan Hurcombe, public sector lead for Deloitte UK’s cyber risk practice said

Some Cyber Regulations Are Excessive. Not This One (American Banker) Regulation should always be a last resort. Too many rules — or lack of coordination between federal, state and industry rules — can do more harm than good. But there are also times when minimum requirements make sense. When done right and in the right circumstances, rules can protect consumers and businesses

SPECIAL REPORT-John Brennan's attempt to lead the CIA into the age of cyberwar (Thompson Reuters Foundation) When America goes to the polls on Nov. 8, according to current and former U.S. intelligence officials, it will likely experience the culmination of a new form of information war

Defeating Enemies at the Speed of Cyber, Not Speed of Budgets (SIGNAL) The military that can control and deny access to and use of the electromagnetic spectrum will be the victors of the next war, predicts Maj. Gen. Earl Matthews, USAF, (Ret.), former director of cyberspace operations and chief information security officer for the Air Force

DISA director: Military still figuring out how to fight in cyberspace (C4ISRNET) Despite the cyber mission force recently reaching initial operational capability, the military is still determining how it will fight in cyberspace. According to Lt. Gen. Alan Lynn, director of the Defense Information Systems Agency and commander of Joint Force Headquarters – Department of Defense Information Networks, the force still has work to do

Army sees cyberspace as nation’s next warfront (Redstone Rocket) Threats from cyberspace are real, consistent and evolving. President Barack Obama said cyber threats pose one of the gravest national security dangers faced by the United States

Army's IT must be more maneuverable across domains (C4ISRNET) The Army's taking notice of the changing operational landscapes emerging. Part of this recognition involves the new push toward a multi-domain battle concept, one that recognizes the force must move beyond its traditional air-land battle to fight in air, land, littoral space and cyberspace

DHS faces a sea change (FCW) The Department of Homeland Security, which is approaching its 15th birthday, needs to make some critical management decisions if it's going to keep up with galloping technology, according to one of its veteran managers

New FCC ISP privacy rules create more questions than answers (Naked Security) Just over a week ago the US Federal Communications Commission (FCC) imposed new privacy rules for ISP customers. The rules aimed to give customers better control, more privacy and stronger security over their data

Litigation, Investigation, and Law Enforcement

Senior FBI officials were told of new emails in early October but wanted more information before renewing Clinton probe (Washington Post) Senior FBI officials were informed about the discovery of new emails potentially relevant to the investigation of Hillary Clinton’s private email server at least two weeks before Director James B. Comey notified Congress, according to federal officials familiar with the investigation

Commentary: Does the FBI think Russia hacked Weiner’s computer? (Reuters) There are many reasons why Federal Bureau of Investigation Director James Comey could be interested in the Hillary Clinton-Huma Abedin emails on Anthony Weiner's home computer. The majority of those reasons for Comey's involvement have been laid out across the media spectrum

Bret Baier: Barring ‘Obstruction,’ Indictment Almost Certain In FBI Investigation (Daily Caller) Citing sources at the FBI, Fox News anchor Bret Baier said the FBI’s renewed investigation of Hillary Clinton’s email server will almost certainly end in an indictment, unless some sort of “obstruction” arises

State defends coordinating with Clinton camp on emails (Washington Examiner) The State Department on Wednesday denied any wrongdoing after emails hacked from John Podesta's private account revealed that the department coordinated with Hillary Clinton's presidential campaign before news broke of her use of a private email server

A second Privacy Shield legal challenge increases threat to EU-US data flows (CSO) French digital rights group La Quadrature du Net is seeking to annul the European Commission decision implementing Privacy Shield

Police across the globe crackdown on darknet marketplaces (CSO) The FBI contacted 150 people suspected of buying drugs from the sites

Catching Online Scammers, Dealers & Drug Dealers With DNS (Dark Reading) Researchers at Black Hat Europe this week will demonstrate a streamlined technique for spotting and identifying illicit narcotics, counterfeiters, and other scammer websites and operations

Hacker sentenced to 29 months in devious Photobucket image plot (Ars Technica) “Yes, seduced by money. I will not lie,” defendant tells judge

For a complete running list of events, please visit the Event Tracker on the CyberWire website.

Newly Noted Events

CyberCon 2016 (Washington, DC, USA, November 16, 2016) CyberCon 2016 is the forum for dialogue on strategy and innovation to secure civilian and defense networks, as well as private-sector networks that hold their sensitive data. Cybersecurity will be the...

Upcoming Events

GTEC (Ottawa, Ontario, Canada, November 1 - 3, 2016) For the public sector and business, count on GTEC to help you keep up with the changing landscape of technology and service delivery in Canada. With our nationally recognized awards program and annual...

Black Hat Europe 2016 (London, England, UK, November 1 - 4, 2016) Black Hat is returning to Europe again in 2016, and we have quite an event in store. Here the brightest professionals and researchers in the industry will come together for a total of four days--two days...

ISSA International Conference (Orlando, Florida, USA, October 22 - 23, 2014) Join us for solution oriented, proactive and innovative sessions focused on security as a vital part of the business.

SINET Showcase 2016: Highlighting and Advancing Innovation (Washington, DC, USA, November 2 - 3, 2016) SINET Showcase provides a platform to identify and highlight “best-of-class" security companies that are addressing industry and government’s most pressing needs and requirements. The chosen SINET 16 Innovators...

3rd Annual Journal of Law and Cyber Warfare Conference (New York, New York, USA, November 3, 2016) The 2016 Journal of Law and Cyber Warfare symposium speakers represent an unparalleled group of cyber security experts with a wide variety of industry expertise and knowledge. Attendees will hear from ...

Security of Things World USA (San Diego, California, USA, November 3 - 4, 2016) Security. Privacy. Connected Devices. Exploring Security and the Internet of Things. A world class event focused on the next information security revolution. Be part of Security of Things World USA in...

2nd Annual Summit: Global Cyber Security Leaders (Berlin, Germany, November 7 - 8, 2016) The Global Cyber Security Leaders 2016 is designed to provide unrivaled access to peers from across the globe, and encourage participants to discuss the current challenges and explore the ideas shaping...

IAPP Europe Data Protection Congress 2016 (Brussels, Belgium, November 7 - 10, 2016) The GDPR is finalised, the Data Protection Congress is returning to Brussels and you have a great deal of work ahead. Begin at the Congress, where you’ll find thought leadership, a thriving professional...

SANS Miami 2016 (Coconut Grove, Florida, USA, November 7 - 12, 2016) Attend our new SANS Miami 2016 event, November 7-12 and choose from five hands-on, immersion-style cybersecurity training courses taught by real-world practitioners. Attackers are targeting you with increasing...

Federal IT Security Conference (Columbia, Maryland, USA, November 8, 2016) The Federal IT Security Institute in partnership with PhoenixTS in Columbia, MD is hosting the first annual Federal IT Security Conference. Speakers from NIST, DHS, the Defense Department as well as private...

11th Annual API Cybersecurity Conference & Expo (Houston, Texas, USA, November 9 - 10, 2016) Join us at the 11th Annual API Cybersecurity Conference & Expo and discover methods for thwarting the bad guys, what the scene looks like over the horizon and how the latest technologies can help you counter...

SecureWorld Seattle (Bellevue, Washington, USA, November 9 - 10, 2016) Join your fellow security professionals for affordable, high-quality cybersecurity training and education. Earn 12-16 CPE credits through 60+ educational elements learning from nationally recognized industry...

Institute for Critical Infrastructure Technology Annual Gala and Benefit (Washington, DC, USA, November 10, 2016) The Annual ICIT Gala and Benefit is the year’s most prestigious gathering of legislative, agency and private sector leaders committed to protecting our Nation’s critical infrastructures. This intimate...

Israel HLS and Cyber 2016 (Tel Aviv, Israel, November 14 - 17, 2016) Where physical and cyber security meet. Topics include intelligence, cyber crime, and counter-terrorism, defending critical infrastructures, a smart global world, mass events--the integrative approach,...

SANS Healthcare CyberSecurity Summit & Training 2016 (Houston, Texas, USA, November 14 - 21, 2016) SANS will be hosting its 4th Annual Healthcare Cybersecurity Summit. Join us and hear top security experts from leading healthcare companies discuss proven approaches for securing and succeeding in the...

Infosec 2016 (Dublin, Ireland, November 15, 2016) Infosec 2016 conference addresses the critically important issues that threaten businesses in the information age By any measure, the digital threats that businesses and organisations of all sizes face...

Commercial Cyber Forum: Insider Threat (Odenton, Maryland, USA, November 15, 2016) Please join us for a panelist discussion with insider threat experts on upcoming Federal rules, key elements of an insider threat program and privacy, due process, and human resource requirements.

Kaspersky Academy Talent Lab (Online, then Prague, Czech Republic, November 15, 2016) Kaspersky Academy Talent Lab is an international cyber-world competition for young researchers and professionals aged 18-30 who are interested in the cybersecurity challenges facing the world. 50 finalists...

CISO Charlotte (Charlotte, North Carolina, USA, November 15, 2016) The CISO Summit brings together C-level IT security executives, industry analysts and solution providers to discuss challenges and best practices in a relaxed, yet focused business setting. Agenda sessions ...

Pharma Blockchain Bootcamp (Edison, New Jersey, USA, November 16, 2016) Blockchain technology has gained recognition as one of the most disruptive technologies in the industrial world with the potential of redefining how businesses operate similarly the internet changed it...

Cybercon 2016 (Washington, DC, USA, November 16, 2016) The forum for dialogue on strategy and innovation to secure defense and government networks, as well as private-sector networks that hold their sensitive data.

Versus 16 (San Francisco, California, USA, November 17, 2016) Versus is not an ordinary event. Versus is not about pitching products or preaching to the choir. Versus is about challenging what you think you know about cybersecurity, about technology, about doing...

Focusing On The Future: Prioritizing Security in the Digital Economy (Washington, DC, USA, November 18, 2016) In today's digital economy, developing and prioritizing a cyber strategy is critical to address diverse and evolving threats, foster trust in the technology we use, and define a path forward where security...

Data Breach & Fraud Prevention Summit Asia (Mumbai, India, June 8, 2016) ISMG’s Data Breach & Fraud Prevention Summit Asia – Mumbai is a one-day event that will focus on the latest fraud techniques and technologies, as well as a holistic, strategic approach to looking at the ...

SCSC Cyber Security Conclave 2.0 Conference and Exhibition (Hyderabad, India, November 22 - 23, 2016) India’s leading two-day cyber security event is returning in November 2016, once again bringing together over hundreds of cyber security experts, senior officials and policy-makers from across the public...

4th Ethiopia Banking & ICT Summit (Addis Ababa, Ethiopia, November 25, 2016) The 4th Ethiopia Banking & ICT Summit is the ONLY event in Horn of Africa that focuses on technology innovations and trends in the Banking and ICT sectors. This annual summit brings together Financial...

Internet of Things (IoT) (Elkridge, Maryland, USA, November 29, 2016) This cybergamut Technical Tuesday features Dr. Susan Cole, currently the Cybersecurity Lead for a Federal Information Systems Controls Audit Management (FISCAM) preparation team and also provides consulting...

CIFI Security Summit (Toronto, Ontario, Canada, November 30 - December 1, 2016) The Annual CIFI Security Summit takes place all over the world, Asia, Europe, Australia & North America. These summits are essential 2 day conferences and exhibitions bringing together leading security...

Grow your brand and reach new customers.

Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.

Be a part of the CyberWire story.

People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.