skip navigation

More signal. Less noise.

Do you know the best practices for applying threat intelligence?

Threat intelligence is one of the most talked about areas of information security today, but how do you actually use it? Learn best practices for applying threat intelligence with Recorded Future's latest white paper. Download your free copy now.

Daily briefing.

Symantec reports that sites in India and Pakistan have been the targets of a sustained cyberespionage campaign using Ehdoor spyware. The spying goes at least as far back as October 2016, and seems to have focused on collecting information on regional security matters. Symantec says the campaign looks like the work of a single nation-state, but it doesn't specify which one. Other observers note that India has been experiencing a heightened state of tension with China, but that's merely an indicator, and doesn't rise even to the level of circumstantial evidence.

The NHS Lanarkshire attack has been confirmed as ransomware. It's not WannaCry (which had afflicted NHS Lanarkshire in an earlier incident) but which ransomware variant hit the NHS systems remains unclear. Health care services continue to experience interruptions in parts of Scotland. Observers note that ransomware is playing an increasingly important role in attacks intended to disrupt as well as extort.

Cylance research on Hancitor exposes how the malware's three-step exploitation of low-level Windows vulnerabilities enables it to accomplish its work.

Collaborative work by several security companies appears to have contained an Android distributed denial-of-service botnet. "WireX" was detected on August 17th, hitting hospitality, adult, and gambling sites as well as some domain registrars. The botnet was disabled by Akamai, Cloudflare, Flashpoint, Google, Oracle, RiskIQ and Team Cymru.

Phishbait currently chumming the Internet attracts both the noble (Hurricane Harvey relief scams) and the base (Game of Thrones unreleased episode come-ons).

A BGP fumble briefly shut down Japan's Internet yesterday.

Notes.

Today's issue includes events affecting Australia, China, India, Japan, Republic of Korea, Pakistan, Russia, Saudi Arabia, Solomon Islands, United Kingdom, United States.

Bank of America needs your cyber security experience.

As one of the world's leading financial institutions, Bank of America has built an extraordinary team of cyber security professionals focused on defending critical financial services infrastructure. That team is growing and needs your experience. Find exciting and rewarding opportunities across the United States for ethical hackers, intrusion analysts, malware analysts, crypto architects and more.

In today's podcast, we hear from our partners at Accenture, as Justin Harvey discusses open source threat intelligence. Our guest, Avi Reichental from XponentialWorks, talks us through the security issues accompanying implantable data devices.

Incident Response 17: IR17 The First Operational Community-Driven Incident Response Conference (Pentagon City, VA, USA, September 11 - 12, 2017) IR17 is open to both commercial and government professionals. Join us to learn tips and best practices from industry leaders. IR17 features 30+ hours of practical training, 36 breakout sessions designed for all levels of experience, and you will leave the conference with a developed incident response plan.

Cyber Security Summit: New York and Boston (New York, New York, USA, September 15, 2017) Sr. Level Executives are invited to learn about the latest threats & solutions in Cyber Security from experts from The FBI, Darktrace, Arbor Networks, CenturyLink and more. Register with promo code cyberwire50 for half off your admission (Regular price $350).

3rd European Cybersecurity Forum – CYBERSEC (Krakow, Poland, October 9 - 10, 2017) CYBERSEC is a unique Europe-wide, annual public policy conference dedicated to strategic aspects of cybersecurity. Conference’s mission is to foster the building of a Europe-wide cybsersecurity system and create a dedicated collaborative platform for governments, international organisations, and key private-sector organisations.

Florida’s Annual Cybersecurity Conference (Tampa, Florida, USA, October 27, 2017) Networking the Future, the Florida Center for Cybersecurity's fourth annual conference, will host hundreds of technical and non-technical stakeholders from industry, government, the military, and academia to explore emerging threats, best practices, and the latest research and trends.

Dateline Security in the Boardroom

Boards and Blockchains (The CyberWire) Blockchain and related technologies are still in their infancy, but for many businesses they seem attractive, inevitable, and mysterious. How boards should be helped to work their way through the implications of what can be a solution in search of a problem.

Character is fate (but formed by repetition): training for response and resilience (The CyberWire) Neuroscience meets Aristotle by way of aikido (a yin style for a yang world). Thoughts on coming back to the center with grace under pressure in a presentation on the search for the warrior spirit.

Summing up: ten commandments for enterprises (The CyberWire) Michael Chertoff summed up at the conference's close with his ten commandments for boards, general advice, but advice that should bring clarity to senior conversations about security in enterprises of all sizes.

Corporate boards need AI to deal with cyber risks (SiliconANGLE) Increased cyberattacks are forcing many corporate boards to take a closer look at protection and prevention measures in the information technology infrastructure.

Cybersecurity trends evolve, protect more than just the datacenter (SiliconANGLE) The security game never ends, and it never stays the same. Hackers, agents and malware are all adapting to hunt the weak points in every security system. Now, savvy cybersecurity experts look to protect not just the data centers, but also the users.

Cyber Attacks, Threats, and Vulnerabilities

Exclusive: India and Pakistan hit by spy malware - cybersecurity firm (Reuters) Symantec Corp, a digital security company, says it has identified a sustained cyber spying campaign, likely state-sponsored, against Indian and Pakistani entities involved in regional security issues.

Another cyber attack? Spyware targeting India, Pakistan identified (Hindustan Times) According to Symantec, the malware uses a backdoor called “Ehdoor” to access files on computers. The new cyber spying campaign is said to be similar to the one that was...

India, Pakistan targets of 'state-sponsored' cyber attack: Symantec (BGR India) Symantec discovered a cyber spying malware targeted at both India and Pakistan.

Sarahah copies phone numbers from address book, sends them to its own servers (India Today) By now you all already know about Saraha. This is the app that secretly allows users to send messages to one another. And it is a craze...

Ransomware behind NHS Lanarkshire cyber-attack (BBC News) Some appointments and procedures were cancelled after NHS Lanarkshire's IT systems were attacked.

NHS Lanarkshire Cancels Ops After Weekend Ransomware Blitz (Infosecurity Magazine) NHS Lanarkshire Cancels Ops After Weekend Ransomware Blitz. Security found wanting again after WannaCry

Locky Ransomware Makes a Comeback with New .Diablo6 and .Lukitus Variants (McAfee Blogs) Old threats die hard it seems as Locky ransomware, one of the most powerful threats out there, is back in town.

The Evolution of Disruption: How Ransomware Has Changed the Face of Disruption (PeerLyst) The first known instance of what we now know as ransomware was seen in 1989. This first attempt was a poorly executed endeavor to extort $189 from the victims, but it was quickly discovered that recovering the files did not require the “tool” offered.

What’s new in ransomware? (CSO Online) Ransomware attacks--and defenses against them--are evolving fast, but enterprises still struggle to keep up.

Threat Spotlight: Man1’s Malicious Macro Part 2 (Cylance) Picking back up on Man1’s malicious ways. This time we get deeper.

Jimmy Nukebot: from Neutrino with love (Новости информационной безопасности) In one of our previous articles, we analyzed the NeutrinoPOS banker as an example of a constantly evolving malware family. A week after publication, this Neutrino modification delivered up a new malicious program classified by Kaspersky Lab as Trojan-Banker.Win32.Jimmy.

Second Google Chrome Extension Banker Malware in Two Weeks (SANS Internet Storm Center) It seems that Google Chrome extensions have become quite the tool for banking malware fraudsters.

Unpatched Flaws Affect Chrome, Firefox, and Safari Browser Extension Systems (BleepingComputer) Security researchers have discovered two flaws that affect the extension systems embedded in today's browsers, such as Firefox, Safari, and all the Chromium-related offshoots, such as Chrome, Opera, and others.

One of 1st-known Android DDoS malware infects phones in 100 countries (Ars Technica) Move over, IoT. Attackers are abusing a new widely used platform to knock out sites.

Android Mobile Ransomware: Bigger, Badder, Better? (Trend Labs Security Intelligence Blog) The mobile threat landscape isn’t just rife with information stealers and rooting malware. There’s also mobile ransomware. While it seems they’re not as mature as their desktop counterparts, what with the likes of WannaCry and Petya, the increasing usage of mobile devices, particularly by businesses, will naturally draw more cybercriminal attention to this type of threat.

Big Google Android Phone Botnet Squashed by Tech Coalition (Fortune) Google pulled 300 infected apps from its Play store.

Researchers figured out how to disable the Intel ME controller on Intel chipsets (Help Net Security) Researchers have found that one can disable Intel ME, a dedicated microcontroller integrated into all Intel chipsets, through a publicly undocumented mode.

Beware of Hurricane Harvey Relief Scams (KrebsOnSecurity) U.S. federal agencies are warning citizens anxious to donate money for those victimized by Hurricane Harvey to be especially wary of scam artists.

"Wanna see the Game of Thrones in advance" email delivers malware (HackRead) Beware of Email promising Game of Thrones Spoilers because it Installs Malicious Malware. Cybercriminals aren’t apparently over with the Game of Thrones (G

Google routing blunder sent Japan's Internet dark on Friday (Register) Another big BGP blunder

Interview: Sophos reveals the criminal underbelly of the dark web (Security Brief) The dark web may be a place that most of us have heard of as a murky underworld for cybercriminals, but also where most internet users daren't tread.

Famous malware threats: Where are they now? (CSO Online) The headlines may be dominated by news of NotPeyta and Wannacry, but watch out for the ‘golden oldie’ malware like Conficker and Zeus. They are still dangerous.

Selena Gomez' Instagram hacked; posts nude photos of Justin Bieber (HackRead) Earlier today (August 28), the official Instagram of popular singer Selena Gomez was hacked and the hackers ended up sharing several nude photos of Justin

This Twitter Bot Tracks Neo-Nazi Bitcoin Transactions (Motherboard) Follow the money.

Big Tech’s Blackballing of Neo-Nazi Sites Shows Who Controls the Internet (Motherboard) This week on Radio Motherboard, we talk about whether corporations should decide who gets to stay online.

Cyber Trends

Mobile User Authentication is a Growing Necessity and Likely to Shape the Future of Businesses Worldwide (Irish Tech News) One of the fundamental necessities of any enterprise is to make sure that their resources are secured and there is no unauthorised use of confidential or critical data. In other words, enterprises need to know who is accessing their information and that the users are who they claim to be.

The Rise Of The Fourth Wave Of Computing (Next Platform) According to a recent Jefferies report, the fourth wave of computing has started and it is being driven by the adoption of IoT with parallel processing as the solution. Tectonic shifts in computing have been caused by major forces dating back to the 1960s.

Health and small business are exposed in escalating cyber war Northrop Grumman exec warns (Financial Review) A top executive at one of the world's largest defence firms has warned Australian government and business that they are in a cyber war zone.

Hackers given an easy window (The Australian) Cybersecurity may be the top-of-mind issue for boardrooms globally, but there are plenty of gaps in decision-making that are making the life of hackers easier, according to Tom Kemp, the chief executive of identity management outfit Centrify.

Study finds many Saudi banks considering biometric solutions (BiometricUpdate) Gemalto has published the results of a recent study in which it found that 69 percent of Saudi Arabian respondents said that it is easier to use eBanking solutions than having to physically visit a…

Marketplace

Interest in cyberinsurance grows as cybercrime targets small businesses (San Francisco Chronicle) Ajay Bam is more tech-savvy than the average small-business owner. A coder by training, Bam started a business that delves into deep areas of artificial intelligence and machine learning.

Ponemon Australian research shows data breaches carve 5% from share prices (CSO) As corporations globally recover from recent ransomware attacks, Centrify-commissioned research reveals that many organisations underestimate the true cost of data breaches

Finding Data For Cybersecurity Industry Still Difficult (TPR) Cybersecurity is a nearly $90 billion industry with an unemployment rate of zero percent, so cities across the country want to grow it locally. But finding

Why Israel Is on the Radar of Symantec and Its Peers (Market Realist) Earlier in this series, we discussed Symantec’s (SYMC) acquisition of Fireglass. Symantec is not the only company that is strengthening its roots in cybersecurity space with Israel-based firms.

Chart in Focus: Symantec’s Leadership in the Secure Web Gateway Space (Market Realist) Symantec is a leader in secure web gateways

Skycure Seeks to Improve Symantec’s Position in the Cybersecurity Space (Market Realist) Skycure marks Symantec’s second Israel-based acquisition

Why Symantec’s Enterprise Security Segment Is Inclined toward the Cloud (Market Realist) Increased growth and activity in APT and EDR space

Dear Cisco, Please Don't Buy Splunk (Seeking Alpha) Cisco is on an acquisition spree for software companies, and Splunk has been floated as a possible target. Splunk stock just spiked after announcing Q2 FY 2018

Investing In IBM i: Adventures In Venture Capital (IT Jungle) The IBM i community was stirred last month when Vision Solutions, the dominant software vendor in the high availability arena, was acquired by a private equity company that believes the IBM i market is worthy of an investment estimated in the hundreds of millions of dollars. That’s some serious cash. In addition to buying software,

ViaSat Awarded New Cybersecurity Software Contract to Protect Mobile Devices at the Battlefield's Tactical Edge (Sys-Con Media) ViaSat Inc. (NASDAQ: VSAT), a global broadband services and technology company, today announced it was awarded a production contract to provide ViaSat Mobile Dynamic Defense (MDD) cybersecurity software to protect and secure Tactical Local Area Network (TACLAN) Field Computing Device – Wearable (FCD-W) platforms.

DJI Launches Drone Bug Bounty Program (Threatpost) Drone manufacturer DJI announced Monday it was launching a bug bounty program to reward researchers who find vulnerabilities in its drones.

How to hire a new CEO - A note from Bugcrowd’s founder (Bugcrowd Blog) Bugcrowd is excited and very pleased to announce the appointment of Ashish Gupta as our new Chief Executive Officer.

Danny Rogers of Terbium Labs Wins Rising Star Leadership Award from SC Media (PRWeb) CEO and Co-Founder of dark web intelligence company recognized for industry vision and humble leadership style

Kordia ramps up RedShield push with new appointments (Channel Life) Kordia has upped its cybersecurity play with the appointment of a cyber security country manager and a channel manager to push RedShield.

Products, Services, and Solutions

(ISC)² Enriches Value for Members with New Member Perks Program ((ISC)²) World's largest nonprofit association of certified cybersecurity professionals unveils more than 300,000 new discounts and benefits

Zentera Systems Introduces CoIP Smart Discovery-Enhanced Intelligent Micro-Segmentation (PRNewswire) Zentera Systems, Inc., the leader in enclave-based security and...

Korean insurance provider detects insider threat through AI (Security Brief) Korean insurance provider KB Life has taken on Darktrace machine learning technology to prevent cyber threats.

HyTrust Announces New Security Policy Framework to Protect Workloads and Enable Secure Cloud Transformation (Business Insider) HyTrust, Inc. today announced a new Security Policy Framework designed to protect workloads by providing organizations with visibility and insight combined with consistent policy enforcement across their multi-cloud environments, all based on the key attributes of a workload, the people interacting with it, the data that resides in it, and the infrastructure on which it resides.

HyTrust Announces DataControl for VMware Cloud on AWS (Business Insider) HyTrust, Inc. today announced that its encryption and key management solution, HyTrust DataControl®, is available to customers of VMware Cloud™ on AWS.

Trend Micro Announces Support for VMware Cloud on AWS (BusinessWire) Trend Micro Incorporated announced its Trend Micro Deep Security™ server security product is available to customers of VMware Cloud™ on AW

Verizon Communications Inc. (NYSE:VZ) Enhances Its VNS Platform With Help Of Check Point Software Technologies Ltd. (NASDAQ:CHKP) (Market Exclusive) U.S carrier Verizon Communications Inc. (NYSE:VZ) has improved its Virtual Network Services (VNS) Platform through Point Software Technologies Ltd. (NASDAQ:CHKP).

Carbon Black Joins Forces with VMware to Enhance Security for the Software-Defined Data Center (Sys-Con Media) Carbon Black, the leader in next-generation endpoint security, today announced it has joined forces with VMware, Inc., to provide VMware AppDefenseTM customers with the ability to leverage Carbon Black’s Collective Defense CloudTM (CDC).

Bromium Returns to Its Roots and Brings Transformative Cybersecurity to VMworld (GlobeNewswire News Room) Co-Founders and Virtualization Gurus Ian Pratt and Simon Crosby to Host Exclusive Breakfast

VeloCloud enhances SD-WAN security ecosystem with additional partners, focuses on best-of-breed solutions (FierceTelecom) VeloCloud, an emerging SD-WAN specialist, is beefing up its recently launched SD-WAN Security Technology Partner Program with a set of new technology partners agreeing to add their solutions to the mix.

SecureWorks Amplifies Application Security with New VMware AppDefense Technology to Protect Cloud and Virtualized Environments (BusinessWIre) VMworld - SecureWorks Corp. (NASDAQ: SCWX), a leading global cybersecurity company that keeps organizations safe in a digitally connected world, is de

Technologies, Techniques, and Standards

Tech Firms Unite to Neutralize WireX Android Botnet (Security Week) Major new WireX Android botnet neutralized by cross-vendor collaborative research

Top Take Away From WannaCry And NotPetya Attacks – Don’t Forget The Security Fundamentals (Information Security Buzz) The impact of the recent, lethal WannaCry and NotPetya attacks have been staggering with the ransomware hitting nearly 100 countries and some of the world’s largest organisations – who presumably have the financial might and resources to invest in warding off such strikes.  And yet, the ransomware penetrated deeply and widely. Three things have come …

SIEM challenges: Why your security team isn't receiving valuable insights (Help Net Security) Learn more about SIEM challenges. SIEM is not static – it’s a living, breathing environment that needs constant maintenance and operationalization.

How threat intelligence can help businesses turn the tide on cybercrime (Tahawul Tech) In the recent past, we have seen an alarming trend – attackers becoming faster innovators than the defenders. With increasing complexities around cybersecurity, the need for threat intelligence is becoming more apparent.

Does Mac OS Provide Better Security For Your Computer? (TG Daily) Does Mac OS Provide Better Security For Your Computer?

8 Lessons Small Businesses Need to Learn About IT Security (Business News Daily) There are serious dangers you may not be aware of or prepared to combat. Here's what you need to know.

State, local election officials satisfied with security of voting machines (The Exponent Telegram) State and county election officials say they are satisfied that West Virginia’s voting systems are secure after several voting machines were successfully hacked at a hackers’ convention in

Protect Your Company from a Debilitating Data Breach (BankInfo Security) The U.S. National Cyber Security Alliance found that 60% of small companies are unable to sustain their businesses over six months after a cyberattack. In addition,

Academia

Cybersecurity 101: How universities are dealing with hackers (CNET) Welcome back to school! Don’t miss orientation, and watch out for hackers.

National Cybersecurity League Fall Classroom Registration Is Game On (PRWeb) The National Cyber League (NCL) offers instructors a rare opportunity to integrate gamer-like cybersecurity education and training into their classrooms. Fall registration for NCL in the Classroom opens Aug. 28 and cybersecurity educators have the option to batch register their classrooms.

Legislation, Policy, and Regulation

To Defend US, Cyber Command Needs Staff, Funding (Newsmax) Staffing up two organizations that are essential to national security represents a vitally important mission. When it comes to building that staff, we must never lose sight of the fact that robbing Peter to pay Paul will prove disastrous.

Senate Bill Seeks to Prevent Establishment of Cyber Working Group Between US, Russia (Executive Gov) The Senate Intelligence Committee passed in July a draft bill that would prohibit the creation of a

IC ITE is about changing the way the intelligence community does business (C4ISRNET) The intelligence community's IC IT Enterprise is more than a modernization effort.

Two acquisition events mark the turning point for the CDM program (FederalNewsRadio.com) GSA and DHS opened up the special item number under the IT Schedule and issued the first task order under Allilant for the governmentwide cyber program.

Litigation, Investigation, and Law Enforcement

Solomons' PM denies being bribed by Huawei (Radio New Zealand) Solomon Islands' prime minister is denying he was bribed by Chinese telecommunications giant Huawei to grant it a major internet cable contract.

FBI: Chinese man supplied rare malware used in OPM breach (Fifth Domain) Defendant Yu Pingan, 36, knew the rare malware known as “Sakula” would be used to hack U.S. companies, the FBI said in court documents.

Inside an Epic Hotel Room Hacking Spree (WIRED) A vulnerability in hotel keycard locks was a security disaster—and the opportunity of a lifetime for one burglar.

For a complete running list of events, please visit the Event Tracker on the CyberWire website.

Upcoming Events

Create and Maintain a Secure Facility: It Takes a Village (Ashburn, Virginia, USA, August 30, 2017) Obtaining and maintaining a facility clearance is a major obstacle faced by government contractors seeking prime contract awards. Hosted by Telos Corporation, a 2017 Cogswell Award winner, this event will...

7th Annual Cybersecurity Training and Technology Forum (Colorado Springs, Colorado, USA, August 30 - 31, 2017) CSTTF is designed to further educate Cybersecurity, Information Management, Information Technology, and Communications Professionals by providing a platform to explore and enhance cyber resilience, collaboration,...

SANS Network Security 2017 (Las Vegas, Nevada, USA, September 10 - 17, 2017) SANS is recognized around the world as the best place to develop the deep, hands-on cybersecurity skills most in need right now. SANS Network Security 2017 offers more than 45 information security courses...

Finovate Fall 2017 (New York, New York, USA, September 11 - 14, 2017) FinovateFall 2017 will begin with the traditional short-form, demo-only presentations that more than 20,000 attendees from 3,000+ companies have enjoyed for the past decade. After two days of Finovate’s...

Insider Threat Program Management With Legal Guidance Training Course (Laurel, Maryland, USA, September 12 - 13, 2017) Insider Threat Defense will hold a two-day training class, Insider Threat Program (ITP) Management With Legal Guidance (National Insider Threat Policy (NITP), NISPOM Conforming Change 2). For a limited...

PCI Security Standards Council: 2017 North America Community Meeting (Orlando, Florida, USA, September 12 - 14, 2017) Join your industry colleagues for three days of networking and one-of-a-kind partnership opportunities. Whether you want to learn more about updates in the payment industry or showcase a new product, you’ll...

DSEI 2017 (London, England, UK, September 12 - 15, 2017) Defence and Security Equipment International (DSEI) is the world leading event that brings together the global defence and security sector to innovate and share knowledge. DSEI represents the entire supply...

8th Annual Billington CyberSecurity Summit (Washington, DC, USA, September 13, 2017) The 8th Annual Billington CyberSecurity Summit September 13 in Washington D.C. brings together world-class cybersecurity thought leaders for high-level information sharing, unparalleled networking and...

Cyber Security Summit: New York (New York, New York, USA, September 15, 2017) If you are a Senior Level Executive responsible for making your company’s decisions in regards to information security, then you are invited to register for the Cyber Security Summit: New York. Receive...

Cyber Security Conference for Executives (Baltimore, Maryland, USA, September 19, 2017) The Johns Hopkins University Information Security Institute and COMPASS Cyber Security are hosting the 4th Annual Cyber Security Conference for Executives on Tuesday, September, 19. It will be held on...

4th Annual Industrial Control Cybersecurity Europe (London, England, UK, September 19 - 20, 2017) Against a backdrop of targeted Industrial Control System cyber attacks against energy firms in the Ukraine power industry, the massive attacks against the Norway oil and gas industry, cyber attacks on...

Cyber Everywhere: Collaboration, Integration, Automatio (Washington, DC, USA, September 20, 2017) We’ve seen all of the cyber headlines this year – new policies emerging, old policies evolving, the cyber workforce is multiplying, and rapidly growing connected devices are complicating governance. While...

10th Cyber Defence Summit (Dubai, UAE, September 20, 2017) Naseba’s 10th Cyber Defence Summit will address the importance of protecting critical infrastructure and sensitive information, help companies procure cyber security solutions and services, and create...

2017 Washington, D.C. CISO Executive Leadership Summit (Washington, DC, USA, September 21, 2017) Highly interactive sessions will provide many opportunities for attendees, speakers and panelists to be engaged in both learning and discussion. The objective for the day is to deliver high quality useful...

Connect Security World (Marseille, France, September 25, 2017 - 27, 2014) As IoT solutions are transitioning from hype to real deployments, the “Internet of insecure things” threat is gaining ground. To address unlimited risks, threats and vulnerabilities surrounding IoT, a...

(ISC)2 Security Congress (Austin, Texas, USA, September 25 - 27, 2017) (ISC)² Security Congress cybersecurity conference brings together nearly 1,500 cybersecurity professionals, offers 100+ educational and thought-leadership sessions, and fosters collaboration with forward-thinking...

Connect Security World (Marseille, France, September 25 - 27, 2017) As IoT solutions are transitioning from hype to real deployments, the “Internet of insecure things” threat is gaining ground. To address unlimited risks, threats and vulnerabilities surrounding IoT, a...

SINET61 2017 (Sydney, Australia, September 26 - 27, 2017) Promoting cybersecurity on a global scale. SINET – Sydney provides a venue where international solution providers can engage with leaders of government, business and the investment community to advance...

O'Reilly Velocity Conference (New York, New York, USA, October 1 - 4, 2017) Learn how to manage, grow, and evolve your systems. If you're building and managing complex distributed systems and want to learn how to bake in resiliency, you need to be at Velocity.

24th International Computer Security Symposium and 9th SABSA World Congress (COSAC 2017) (Naas, County Kildare, Ireland, October 1 - 5, 2017) If you thought symposiums on information security and risk were all the same, look again! COSAC is an entirely different experience. Conceived by practising professionals for experienced professionals,...

Cybersecurity Nexus North America 2017 (CSX) (Washington, DC, USA, October 2 - 4, 2017) Be a part of a global conversation with professionals facing the same challenges as you at the nexus—where all things cyber security meet. Cyber security doesn’t take a vacation and it doesn’t sleep. You...

Atlanta Cyber Week (Atlanta, Georgia, USA, October 2 - 6, 2017) Atlanta Cyber Week is a public-private collaboration hosting multiple events during the first week of October that highlight the pillars of the region’s cybersecurity ecosystem and create an opportunity...

4th Annual Industrial Control Cyber Security USA Summit (Sacramento, California, USA, October 3 - 4, 2017) Against a backdrop of targeted Industrial Control System cyber attacks, such as those against energy firms in the Ukraine power industry, the massive attacks against the Norway oil and gas industry, cyber...

4th Annual Industrial Control Cyber Security Summit USA (Sacramento, California, USA, October 3 - 4, 2017) Against a backdrop of continued ICS targeted cyber attacks against energy firms in the Ukraine power industry (CRASHOVERRIDE), the massive attacks against the Norway oil and gas industry, cyber attacks...

CyberSecurity4Rail (Brussels, Belgium, October 4, 2017) Facilitated by Hit Rail, this conference will bring together experts in cybercrime and digital security, plus leaders in ICT and representatives from transport and railway companies, European organisations...

Grow your brand and reach new customers.

Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.

Be a part of the CyberWire story.

People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.