skip navigation

More signal. Less noise.

Daily briefing.

Research Saturday, a new CyberWire podcast, opens September 9th

This new weekly service will highlight the research being done in industry, universities, and governments. Hear from the people who are discovering threats, uncovering vulnerabilities, and devising the security measures to keep cyberspace as safe as it can be.

Ukrainian security firm ISSP adds its voice to those warning of signs of an impending wave of cyberattacks on that country. Ukraine's independence day will be celebrated tomorrow, August 24th; politically motivated or state-directed cyberattacks have in the past coincided with major holidays.

The US Navy's investigations into this week's collision between the destroyer USS John S. McCain continue, as does the sad work of recovering the sailors who lost their lives in the incident. Much talk centers on issues of basic seamanship (China's navy suggesting that the Americans are too overstretched to be good sailors) but US Navy officials say they haven't ruled out the possibility of cyberattack. Note: "possibility." It's early in the investigation and consideration of cyberattack is a sensible measure. There are unconfirmed stories, however, sourced on background, that the Navy has concluded there was no cyber attack, but these are preliminary comments from anonymous sources. We'll continue to follow this aspect of the developing story.

Security firm Zscaler today announced that on August 21st it found two more malicious apps in Google Play. The first one they uncovered was an app called "Earn Real Money Gift Cards," which was a variant of the familiar BankBot. The second is a malicious game, "Bubble Shooter Wild Life," which is unusual (Zscaler calls it "unique") in that it abuses Android's Accessibility Service to install code in victim machines. 

US state regulators continue to advance cybersecurity standards. New York begins the first phase of its financial cyber regulations Monday.

Notes.

Today's issue includes events affecting Afghanistan, Australia, China, Indonesia, Ireland, Pakistan, Russia, Spain, Ukraine, United Kingdom, United States.

Best Practices for Applying Threat Intelligence

Threat intelligence is one of the most talked about areas of information security today, but how do you actually use it? Learn best practices for applying threat intelligence with Recorded Future's latest white paper. Download your free copy now.

In today's podcast, we hear from our partners at the SANS Technology Institute and the ISC Stormcast podcast as Johannes Ullrich discusses hacks of Uber driver accounts. Our guest is Tony Dahbura from the Johns Hopkins University's Information Security Institute, who'll talk to us about what executives should know about cybersecurity.

Security In the Boardroom (Palo Alto, CA, USA, August 23, 2017) Cybersecurity is a boardroom topic in nearly every organization. For many boards, security has evolved from a technical risk to a top business risk. Cybersecurity is also a growth opportunity. Proper integration of security and privacy concerns can drive far more effective digital transformation efforts. However, the mystique around cybersecurity can prevent board members and management from improving their cyber fluency and driving required improvements. Please join The Chertoff Group for our Security in the Boardroom event where we will demystify cybersecurity technology and policy issues while providing practical tools that board members and management can use to improve their resiliency to cyber risk and drive competitive advantage.

Incident Response 17: IR17 The First Operational Community-Driven Incident Response Conference (Pentagon City, VA, USA, September 11 - 12, 2017) IR17 is open to both commercial and government professionals. Join us to learn tips and best practices from industry leaders. IR17 features 30+ hours of practical training, 36 breakout sessions designed for all levels of experience, and you will leave the conference with a developed incident response plan.

8th Annual Billington CyberSecurity Summit (Washington, DC, USA, September 13, 2017) The 8th Annual Billington CyberSecurity Summit September 13 in Washington D.C. brings together world-class cybersecurity thought leaders for high-level information sharing, unparalleled networking and public-private partnerships from a cross-section of civilian, military and intelligence agencies, industry and academia.

Cyber Attacks, Threats, and Vulnerabilities

Ukraine cybersecurity firm detects possible new malware attacks ahead of independence day (The Japan Times) Ukrainian cybersecurity firm ISSP said on Tuesday it may have detected a new computer virus distribution campaign, after security services said Ukraine cou

U.S. Navy considers possibility of cyber attack after ship collision (CSO Online) U.S. Navy officials have gone on record to say hacking will be looked at as a possibility as the cause of the USS John S McCain collision.

US Navy investigating whether its crashed ship was hacked (Updated) (HackRead) It's no surprise that ships can be hacked but did someone hack USS John S. McCain on Monday when it collided with an oil tanker near Singapore? Adm. John R

At-sea disasters came during ‘the most basic of operations,’ Pacific Fleet CO says (Navy Times) Recent at-sea disasters that led to sailor deaths occurred while conducting basic duties like anchoring, navigation, surface ship contact management and carrier qualifications, Pacific Fleet commander Adm. Scott Swift said Tuesday, according to an internal message obtained by the Navy Times.

US Navy collisions ‘pose growing threat’ to Chinese ships (South China Morning Post) Concerns grow after the second deadly incident involving a US warship in three months

Are Cyber Weapons Too Dangerous to Use? (War on the Rocks) The novelist Kurt Vonnegut once imagined a fictional substance called “ice-nine” that could turn any liquid into ice.

Malware on Google Play abusing Accessibility Service (Cloud Security Solutions | Zscaler) Each day as we track mobile malware payloads, we can see our signatures triggered by various banking Trojans apps. But on August 21, one sample triggered a special alert, because it was shown to be available on Google Play.

Does your resume contain malware? LinkedIn bug could have allowed hackers to spread malicious code (International Business Times UK) A flaw in LinkedIn Messenger could have let hackers upload malware-laced files and infect users.

Dumping Data from Deep-Insert Skimmers (KrebsOnSecurity) I ecently heard from a police detective who was seeking help identifying some strange devices found on two Romanian men caught maxing out stolen credit cards at local retailers.

Identity Thieves Hijack Cellphone Accounts to Go After Virtual Currency (New York Times) So-called phone porting attacks are exposing a vulnerability that could be exploited against anybody with valuable emails or other digital files.

Hackers stole over $500,000 from Enigma cryptocurrency investors (Help Net Security) Unknown hackers have managed to steal over $500,000 from aspiring investors in the Enigma cryptocurrency investment platform.

‘Smart’ solar power inverters raise risk of energy grid attacks (Naked Security) Researcher identifies a weakness in the software layer – and reminds us that we’re placing a lot of trust in vendors to implement decent security in formerly passive devices

Foxit backtracks after declining to fix zero-days exposed by ZDI (Naked Security) If you use Foxit’s PDF reader, make sure you update – and stick with Safe Reading mode until you do

Malicious script dropping an executable signed by Avast? (SANS Internet Storm Center) Yesterday, I found an interesting sample that I started to analyze… It reached my spam trap attached to an email in Portuguese with the subject: "Venho por meio desta solicitar orçamento dos produtos” ("I hereby request the products budget”).

Ropemaker Email Exploit Exposes Desktop Clients to Security Risks (eWEEK) The email security vendor releases a report on a new type of email exploit that neither Apple nor Microsoft sees as a risk.

Online Extortion Campaigns Target Users, Companies, Security Researchers (BleepingComputer) During the past week, there has been a sudden surge in online extortion campaigns, against regular users and security researchers alike.

Adversaries’ New Strategy: Cyber Attacks Designed for Destruction, Not Just Disruption? (Cisco Blogs) As defenders, one of our key objectives is to help organizations and individual users understand the threat landscape so they can reduce their exposure to cyber threats.

Destruction of service: How ransomware attacks have changed (SearchSecurity) New ransomware variants like WannaCry and NotPetya have introduced destruction of service attacks. Here's what you need to know about them.

Microsoft warns that hackers are increasingly targeting cloud accounts (Inquirer) Firm says that number of attacks tripled in the first quarter

Cyberwarfare: An Outage of a Major Cloud Service Provider Due to Cyberattacks Could be as Damaging as Hurricane Katrina (Formtek) Hacking and cyberattacks are growing in their frequency and intensity. They have also become increasingly more sophisticated in how they target their victims.

Threat Intelligence News: August 22, 2017 (LookingGlass Cyber Solutions Inc.) Threat intelligence news on cybersecurity, phishing, & threats to various industries from LookingGlass Cyber Solutions, August 8, 2017.

Leaked: Private photos of Tiger Woods, Miley Cyrus, Kristen Stewart and others (HackRead) It's another day another privacy breach. Hackers have leaked personal and private photos of top celebrities in what is being labeled as 3.0 leak. This time

Cyber Trends

72% of Government Entities Worldwide had their Security Compromised in 2016 (Netwrix) The government sector is lagging behind in implementing modern security that goes beyond perimeter defense, finds 2017 Netwrix IT Risks Survey.

Independent Research Quantifies Growing Security Management Gap and Business Impact of External Web, Social, and Mobile Threats; Digital Transformation Emboldens Cyber Adversaries (GlobeNewswire News Room) 68% of IT organizations have no to modest confidence to manage digital threats, despite a majority significantly increasing their near-term digital defense investments

Here we go again: DDoS attacks on the rise! (Help Net Security) Unfortunately DDoS attacks rise again! The number of DDoS attacks in Q2 of 2017 increased by 28 percent quarter over quarter.

From Chasing Risk Lists to ASN Policies: Large-Scale Analysis of Risky Internet Activity (Recorded Future) Our research reveals that using large-scale historical threat data can alert researchers to geographies and ASNs that are likely to contain risky IPs.

90 per cent of hacked firms fess up to running unpatched systems (Inquirer) That's like kicking yourself in the nads

Spohn: Using Artificial Intelligence to Counter Cyber Threats (PRWeb) In a constantly evolving digital threat landscape where firewalls and antivirus programs are considered tools of antiquity, companies are looking to utilize more technologically advanced means of protecting crucial data.

Marketplace

Versive Raises $12.7 Million Behind Significant Market Advantage and Demand for AI-Powered Cybersecurity Solutions (BusinessWire) Versive, the leader in mission-focused adversary detection, announced it has raised an additional $12.7 million in funding.

EY acquires Australian cybersecurity firm Open Windows IDENTITY (null) Big Four firm EY has bolstered its Asia-Pacific cybersecurity services offering with the acquisition of Melbourne-based Open Windows IDENTITY.

Northrop Grumman Wins Contract Extension to Provide UK’s Forensic and Biometric Capability (Northrop Grumman Newsroom) Northrop Grumman Corporation (NYSE: NOC) has been awarded an extension to its existing contract with the Home Office to continue providing services, systems operations and maintenance for the Forensic and Biometric Interim...

Cisco: On The Way Down (Seeking Alpha) Seventh consecutive quarterly fall in revenue, most market sectors slide, with forward guidance down. Past years of layoffs, cost cutting, loss of market share,

Symantec's reinvention is merely a repeat of a failed strategy (Verdict) Symantec, the world's largest cyber security firm, has a plan to shore up its most profitable business, but history suggests it won’t be successful.

vArmour Exponentially Grows Patent Portfolio, Focusing on Application Policy and Automation (Marketwired) Recently awarded patents support security teams with intent-based and automated policy

Why Qualcomm Acquired A Machine Learning Startup (Forbes) Last week, Qualcomm announced that it had acquired Netherlands-based machine learning startup Scyfer for an undisclosed amount.

Meltwater acquires Cosmify to strengthen its data intelligence services (ITP Net) Meltwater cements its commitment to data science and machine learning with latest acquisition

Eccalon and CyberPoint Announce Strategic Partnership (CyberPoint) Today, Eccalon announced a strategic partnership with the Maryland-based global cybersecurity technology company, CyberPoint. The partnership aims to develop next generation cyber tools for advanced manufacturing and to increase the cybersecurity industry's overall capability.

Maryland cyber group aims to decrease number of unfilled industry jobs (Baltimore Business Journal) The Cybersecurity Association of Maryland Inc. is launching a new online jobs platform in partnership with Germantown job-seeking firm SkillSmart.

Cybersecurity Innovator Farsight Security Adds Two Domain Industry Leaders to Their Growing Team (DN Journal) It seems a day rarely passes without another company being victimized by a cyber attack of one kind or another.

Products, Services, and Solutions

Webroot and NinjaRMM Expand Partnership (Webroot) Expanded Security Service Offering includes DNS Protection and Integrated Console, Allows NinjaRMM Clients to

Illumio Launches the Next Wave of its Micro-Segmentation Technology Through New Breakthroughs in Visualization and Policy (Illumio) Illumio news release: Illumio Launches the Next Wave of its Micro-Segmentation Technology Through New Breakthroughs in Visualization and Policy

BDI Global Launches Dedicated Cyber Risk Insurance Program For Small Health And Telehealth Providers (PRNewswire) Health and telehealth providers face complex and rapidly evolving cyber risks....

Netscape’s Jim Clark launches CommandScape, a building management system for commercial and premium properties (VentureBeat) As a creator of some of the internet's biggest brands, Jim Clark should require little introduction. But the 73-year-old Texan billionaire doesn't garner the same kinds of headlines as Bill Gates, Steve Jobs, or Mark Zuckerberg.

Lastline to Power IBM's Advanced Malware Protection Offering (BusinessWire) Lastline Inc., the leader in advanced network-based malware protection, today announced IBM® Security has selected the company’s award-winni

The Power of the ThreatQ Open Exchange API – Part 1 (ThreatQuotient) In this blog series, we will cover many use cases for working with the ThreatQ Open Exchange API.

Technologies, Techniques, and Standards

What's needed for the first NYS DFS cybersecurity transitional phase? (Help Net Security) The NYS DFS cybersecurity transitional phase is upon us. Organizations will have the opportunity create a phased approach.

Air Force developing geospatial intel system (C4ISRNET) BlackSky Geospatial Solutions has been awarded a $16.4 million Air Force contract to develop a geospatial intelligence system.

When identity data eclipses digital identity (CSO Online) Digital identity needs to be redefined as verified identity data. Identity data, using the right tools, can be used to carry out online jobs on behalf of the real me. But the right technology, aka personal data stores, need to be in place. Technology that brings consent, privacy, security, and accessibility in place.

Trends in Threat Hunting and Security Analytics (Bricata) Threat hunting has splashed on the scene out of necessity. There are no guarantees in cybersecurity and best practice has evolved from a focus on prevention to an exercise in risk management.

Avoiding the most common DevOps security vulnerabilities in the cloud (TheServerSide) Easily configured public cloud resources can be just as easily misconfigured, which is why organizations are prioritizing DevOps security and DevSecOps.

In Higher Education, Security at Work Starts at Home (EdTech) No matter where they are, users should practice smart security habits to help keep networks safe.

Design and Innovation

Fake news: Mozilla joins the fight to stop it polluting the web (Naked Security) How much responsibility do we bear for our own media literacy, and how much effort should firms like Mozilla, Google, Snopes, Facebook and others put into tackling fake news?

Op Ed: A Cryptographic Design Perspective of Blockchains: From Bitcoin to Ouroboros (NASDAQ.com) How does one design a blockchain protocol?

Pentagon Struggling to Take Advantage of Artificial Intelligence (National Defense) The Pentagon sees artificial intelligence and related technologies as key enablers of future military operations. But the Defense Department faces challenges as it seeks to acquire them.

Research and Development

Genome cryptography is the new way to secure your DNA data (New Atlas) DNA security is a looming problem that scientists and researchers are only just starting to grapple with. A team at Stanford has now developed a way to "cloak" irrelevant genomic information, allowing scientists to access key data without revealing an individual's broader genome sequence.

Cryptographers and Geneticists Unite to Analyze Genomes They Can't See (Scientific American) Computer-security methods could help scientists identify disease-causing genes—while preserving patient privacy

Academia

Academic work gives national security an intelligent edge (The Australian) The government recently announced what Malcolm Turnbull described as the most “significant reform of Australia’s national intelligence and domestic security arrangements” in more than 40 years.

UGA receives recognition for cyber defense research (The Red and Black) According to a press release issued on Aug. 15, the University of Georgia is now one of 71 institutions in the United States to be named a National Center of

UA awarded Cyberdefense Research designation (KVOA) UA awarded Cyberdefense Research designation

U.S. Space & Rocket Center gets $10M grant for cyber camp (WAFF) Alabama Gov. Kay Ivey announced a $10 million economic development grant to expand the campus at the U.S. Space & Rocket Center and establish a U.S. Cyber Camp.

Northrop Grumman Awards Engineering Scholarships to Students from Western New York (Northrop Grumman Newsroom) Northrop Grumman Corporation (NYSE: NOC) recently announced the winners of its ninth annual Engineering Scholars program in the Western New York community. The program will provide college scholarships this fall to two...

Legislation, Policy, and Regulation

White House advisory group warns of '9/11-level cyber attack' (FCW) A private-sector cybersecurity advisory committee wants the U.S. to pivot to a higher state of readiness when it comes to preventing catastrophic cyberattacks.

Nation's largest grid operator suffers 4,000 attempted cyberattacks per month, former chief says (Washington Examiner) The former head of PJM Interconnection wants Energy Department personnel with security clearances to be trained to work alongside employees...

Trump takes hard line on Pakistan for supporting terrorist groups (FDD's Long War Journal) With words unprecedented for a US president, Trump called out Pakistan for harboring and supporting terrorist groups that target and kill US citizens and said there would be a radical change in policy toward the South Asian nation. Trump indicated the US would work to increase ties with India, Pakistan's neighbor and greatest enemy, a move sure to both enrage as well as frighten Pakistani elites.

U.S. may sanction Pakistani officials with ties to terrorists, Trump official says (POLITICO) “How do we get the Pakistan to behave better?" official asks.

Analysts say Trump's warning to Pakistan could backfire (Military Times) President Donald Trump’s warning to Pakistan to put an “immediate” end to harboring militants operating in Afghanistan didn’t spell out the consequences of defiance or suggest a new strategy to get it to yield to longstanding U.S. demands, analysts said Tuesday.

Taliban vows to continue its "Jihad" against US (FDD's Long War Journal) Taliban spokesman Zahibullah Mujahid denounced Trump's decision to remain engaged in Afghanistan and said that Taliban fighters will "sustain our Jihad." Additionally he repeated the canard that the Taliban does not pose a threat to foreign countries.

Revamp the broken security-clearance process [Commentary] (Defense News) The clearance system must be revamped, not just reformed.

House Bill 180 149th General Assembly (Present) (Legis Delaware) This Act amends Chapter 12B of Title 6 to update Delaware's law regarding computer security breaches by doing the following: 1. Creating a requirement that any person who conducts business in Delaware and maintains personal information must safeguard that information.

ID cards are being introduced by stealth, campaigners claim (Times) A data protection and privacy rights group has accused the Department of Social Protection and other state bodies of introducing a national ID card by stealth. Digital Rights Ireland says the...

Litigation, Investigation, and Law Enforcement

ISIS in Indonesia trying to recruit Malaysians (The Straits Times) The recruitment of new militants in Malaysia has slowed down following the death of ISIS top recruiter Muhammad Wanndy Mohamed Jedi, who was killed in Syria four months ago, Malaysia's top counter-terrorism official said.

()

Spain terror cell was planning Sagrada Família attack, suspect tells court (the Guardian) Two men remanded in custody, one kept for questioning and one freed after Madrid court is told of plan for larger-scale attacks

Germany's rapid deportations of Salafist suspects ruled lawful (Deutsche Welle) The deportations of an Algerian and a Nigerian, both born in Germany and classed as dangerous, have been backed by Germany’s top administrative court. The evictions stem from a little-used clause in German residency law.

Don’t waste police time on the online bigots (Times) Not long after starting work as a speechwriter in Downing Street I succumbed to the urge to self-Google. Up came a neo-Nazi forum where I was named as one of “David Cameron’s Jews”, indeed a Jew...

US appeals court curbs police power to seize cellphones (Naked Security) A ruling from an appeals court judge has raised questions about privacy, device security, and how law enforcement conducts investigations

For a complete running list of events, please visit the Event Tracker on the CyberWire website.

Newly Noted Events

DSEI 2017 (London, England, UK, September 12 - 15, 2017) Defence and Security Equipment International (DSEI) is the world leading event that brings together the global defence and security sector to innovate and share knowledge. DSEI represents the entire supply...

Upcoming Events

The Chertoff Group Security Series: Security In The Boardroom (Palo Alto, California, USA, August 23, 2017) The Chertoff Group Security Series will aim to enhance and add to the Security in the Boardroom conversation by applying our insights into technology, threat, and policy to help executives respond to the...

The Chertoff Group Security Series: Security In The Boardroom (Palo Alto, California, USA, August 23, 2017) The Chertoff Group Security Series will aim to enhance and add to the Security in the Boardroom conversation by applying our insights into technology, threat, and policy to help executives respond to the...

U.S. Department of Commerce Cybersecurity Awareness Day (Washington, DC, USA, August 24, 2017) On August 24, 2017, the Department of Commerce headquarters is planning the Cybersecurity Awareness Day event which will host guest speakers from throughout the Cybersecurity community. The 2017 Cybersecurity...

7th Annual Cybersecurity Training and Technology Forum (Colorado Springs, Colorado, USA, August 30 - 31, 2017) CSTTF is designed to further educate Cybersecurity, Information Management, Information Technology, and Communications Professionals by providing a platform to explore and enhance cyber resilience, collaboration,...

SANS Network Security 2017 (Las Vegas, Nevada, USA, September 10 - 17, 2017) SANS is recognized around the world as the best place to develop the deep, hands-on cybersecurity skills most in need right now. SANS Network Security 2017 offers more than 45 information security courses...

Finovate Fall 2017 (New York, New York, USA, September 11 - 14, 2017) FinovateFall 2017 will begin with the traditional short-form, demo-only presentations that more than 20,000 attendees from 3,000+ companies have enjoyed for the past decade. After two days of Finovate’s...

Insider Threat Program Management With Legal Guidance Training Course (Laurel, Maryland, USA, September 12 - 13, 2017) Insider Threat Defense will hold a two-day training class, Insider Threat Program (ITP) Management With Legal Guidance (National Insider Threat Policy (NITP), NISPOM Conforming Change 2). For a limited...

PCI Security Standards Council: 2017 North America Community Meeting (Orlando, Florida, USA, September 12 - 14, 2017) Join your industry colleagues for three days of networking and one-of-a-kind partnership opportunities. Whether you want to learn more about updates in the payment industry or showcase a new product, you’ll...

8th Annual Billington CyberSecurity Summit (Washington, DC, USA, September 13, 2017) The 8th Annual Billington CyberSecurity Summit September 13 in Washington D.C. brings together world-class cybersecurity thought leaders for high-level information sharing, unparalleled networking and...

Cyber Security Summit: New York (New York, New York, USA, September 15, 2017) If you are a Senior Level Executive responsible for making your company’s decisions in regards to information security, then you are invited to register for the Cyber Security Summit: New York. Receive...

Cyber Security Conference for Executives (Baltimore, Maryland, USA, September 19, 2017) The Johns Hopkins University Information Security Institute and COMPASS Cyber Security are hosting the 4th Annual Cyber Security Conference for Executives on Tuesday, September, 19. It will be held on...

4th Annual Industrial Control Cybersecurity Europe (London, England, UK, September 19 - 20, 2017) Against a backdrop of targeted Industrial Control System cyber attacks against energy firms in the Ukraine power industry, the massive attacks against the Norway oil and gas industry, cyber attacks on...

Cyber Everywhere: Collaboration, Integration, Automatio (Washington, DC, USA, September 20, 2017) We’ve seen all of the cyber headlines this year – new policies emerging, old policies evolving, the cyber workforce is multiplying, and rapidly growing connected devices are complicating governance. While...

10th Cyber Defence Summit (Dubai, UAE, September 20, 2017) Naseba’s 10th Cyber Defence Summit will address the importance of protecting critical infrastructure and sensitive information, help companies procure cyber security solutions and services, and create...

2017 Washington, D.C. CISO Executive Leadership Summit (Washington, DC, USA, September 21, 2017) Highly interactive sessions will provide many opportunities for attendees, speakers and panelists to be engaged in both learning and discussion. The objective for the day is to deliver high quality useful...

Connect Security World (Marseille, France, September 25, 2017 - 27, 2014) As IoT solutions are transitioning from hype to real deployments, the “Internet of insecure things” threat is gaining ground. To address unlimited risks, threats and vulnerabilities surrounding IoT, a...

(ISC)2 Security Congress (Austin, Texas, USA, September 25 - 27, 2017) (ISC)² Security Congress cybersecurity conference brings together nearly 1,500 cybersecurity professionals, offers 100+ educational and thought-leadership sessions, and fosters collaboration with forward-thinking...

Connect Security World (Marseille, France, September 25 - 27, 2017) As IoT solutions are transitioning from hype to real deployments, the “Internet of insecure things” threat is gaining ground. To address unlimited risks, threats and vulnerabilities surrounding IoT, a...

SINET61 2017 (Sydney, Australia, September 26 - 27, 2017) Promoting cybersecurity on a global scale. SINET – Sydney provides a venue where international solution providers can engage with leaders of government, business and the investment community to advance...

O'Reilly Velocity Conference (New York, New York, USA, October 1 - 4, 2017) Learn how to manage, grow, and evolve your systems. If you're building and managing complex distributed systems and want to learn how to bake in resiliency, you need to be at Velocity.

24th International Computer Security Symposium and 9th SABSA World Congress (COSAC 2017) (Naas, County Kildare, Ireland, October 1 - 5, 2017) If you thought symposiums on information security and risk were all the same, look again! COSAC is an entirely different experience. Conceived by practising professionals for experienced professionals,...

Cybersecurity Nexus North America 2017 (CSX) (Washington, DC, USA, October 2 - 4, 2017) Be a part of a global conversation with professionals facing the same challenges as you at the nexus—where all things cyber security meet. Cyber security doesn’t take a vacation and it doesn’t sleep. You...

Atlanta Cyber Week (Atlanta, Georgia, USA, October 2 - 6, 2017) Atlanta Cyber Week is a public-private collaboration hosting multiple events during the first week of October that highlight the pillars of the region’s cybersecurity ecosystem and create an opportunity...

4th Annual Industrial Control Cyber Security USA Summit (Sacramento, California, USA, October 3 - 4, 2017) Against a backdrop of targeted Industrial Control System cyber attacks, such as those against energy firms in the Ukraine power industry, the massive attacks against the Norway oil and gas industry, cyber...

4th Annual Industrial Control Cyber Security Summit USA (Sacramento, California, USA, October 3 - 4, 2017) Against a backdrop of continued ICS targeted cyber attacks against energy firms in the Ukraine power industry (CRASHOVERRIDE), the massive attacks against the Norway oil and gas industry, cyber attacks...

Grow your brand and reach new customers.

Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.

Be a part of the CyberWire story.

People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.