skip navigation

More signal. Less noise.

Daily briefing.

The hacker who breached mobile forensic tool provider Cellebrite last year has dumped code he (or she or they) claims to have obtained from that company. The proclaimed motive is to demonstrate that such tools, once developed, inevitably find their way into undesirable hands. Cellebrite's main product is the Universal Forensic Extraction Device (UFED), thought to be widely used by British and US police to unlock phones in the course of criminal investigations. The hacker's dump includes tools related to cracking Android, Blackberry, and older iOS devices. Motherboard reports that experts say the code looks like jailbreaking exploits adapted to forensic purposes.

In the US, the Internal Revenue Service (IRS) warns that criminals are combining W-2 tax form theft with business email compromise in fraud campaigns expected to continue through the end of tax season.

Bitdefender and the SANS Institute have analyses of Cisco router vulnerabilities likely to be of particular concern with respect to home networks.

US-CERT warns of a Windows zero-day that could be exploited to bring about the BSOD (that is, the "blue screen of death").

Verizon and Sprint are rolling out Android patches.

Iran continues to find cyber operations an attractive means of striking foreign enemies and exerting domestic control. An Iranian dissident is taking a pirate-radio-inspired approach to pirate podcasting to circumvent censorship.

Mixed signals from the US about Russian hacking. The US Treasury Department is modifying sanctions against the FSB. On the other hand, the US Army is funding a Ukrainian cyber defense center.


Today's issue includes events affecting European Union, France, Germany, Iraq, NATO, Russia, Tunisia, Ukraine, United Kingdom, United States.

In today's podcast we hear from our partners at Accenture, as Malek Ben Salem discusses embedded device security. We also have as our guest Frederick Lane, who will talk about his new book Cybertraps for Expecting Moms and Dads.

We've also got a new special edition of the podcast out. In this one we speak with industry experts and editors covering the cyber beat to get their take on the outlook for 2017 in cyber security.

Atlantic Council Cyber 9/12 Student Challenge (Washington, DC, USA, March 17 - 18, 2017) The Cyber 9/12 Student Challenge is a one-of-a-kind competition designed to allow students from around the world and various academic disciplines to understand the policy challenges associated with a cyber crisis. Register now as a competitor, judge or observer.

Women in Cyber Security (Tucson, AZ, USA, March 31 - April 1, 2017) With support from various industry, government and academic partners, WiCyS has become a continuing effort to recruit, retain and advance women in cybersecurity. It brings together women in cybersecurity from academia, research and industry for sharing of knowledge/experience, networking and mentoring.

Dateline RSA (looking ahead)

National Cyber Security Alliance Aligns with RSA® Conference to Educate and Empower All Digital Citizens to Stay Safer Online and to Manage Their Personal Data (Yahoo! Finance) The National Cyber Security Alliance (NCSA), the nation's leading nonprofit promoting cybersecurity and privacy awareness and education, is once again proud to join RSA® Conference 2017 as an association sponsor. RSA Conference is the world's largest

Cyber Attacks, Threats, and Vulnerabilities

Hacker Dumps iOS Cracking Tools Allegedly Stolen from Cellebrite - Motherboard (Motherboard) The hacker says this demonstrates that when organizations make hacking tools, those techniques will eventually find their way to the public.

Cellebrite Hack Highlights Dangers of State Snooping (Infosecurity Magazine) Cellebrite Hack Highlights Dangers of State Snooping. Data extraction firm’s products used by police in US and UK

IRS: Scam Blends CEO Fraud, W-2 Phishing (KrebsOnSecurity) Most regular readers here are familiar with CEO fraud — e-mail scams in which the attacker spoofs the boss and tricks an employee at the organization into wiring funds to the fraudster. Loyal readers also have heard an earful about W-2 phishing, in which crooks impersonate the boss and request a copy of all employee tax forms. According to a new “urgent alert” issued by the U.S. Internal Revenue Service, scammers are now combining both schemes and targeting a far broader range of organizations than ever before.

Scammers are blending W-2 phishing with wire fraud - Help Net Security (Help Net Security) Scammers are blending W-2 phishing with wire fraud, sending emails aimed at stealing organizations' money after they've already tried to get employee info.

Cyren Ltd exposes malicious sensitive data and Bitcoin swiping malware (IBS INtelligence) A menacing malware outbreak targeting banking customers which is thieving passwords and Bitcoin from PCs has been uncovered by Cyren Ltd.

Critical Cisco security hole could lead to hackers seizing control of thousands of home routers - Bitdefender (Bitdefender) Here’s how things normally work. When you leave your house you make sure that you’ve locked your front door behind you. You ensure that you’ve shut your windows. Maybe, if you’re going to be away for a while, you might even set your burglar alarm. But the rise of the Internet of Things has changed …

Cisco - Issue with Clock Signal Component (SANS Internet Storm Center) One of our readers, Dalibor Cerar, sent us an email about an issue impacting this point. While its a hardware issue, the result if it occurs is a self inflicted Denial of Service. Cisco released a notice on February 2 that some of its products had an issue with the Clock Signal component manufactured by a supplier. This was discovered late in November 2016.

0-Day Security Flaw Could Lead Windows Devices to BSOD (HackRead) The United States Computer Emergency Readiness Team (US-CERT) has discovered a zero-day vulnerability in the SMB service of Microsoft Windows which lets at

Windows DRM Files Used to Decloak Tor Browser Users (BleepingComputer) Downloading and trying to open Windows DRM-protected files can deanonymize Tor Browser users and reveal their real IP addresses, security researchers from Hacker House have warned.

Facebook friend suggestion that should be impossible • /r/privacy (reddit) I was just looking through the friend suggestions on Facebook. A very old ex girlfriend from 20 years ago popped up. I truly can't see how they...

Phishing test results in a barely-passing grade for users (CIO) Diligent recently surveyed 2,000 people to see who got caught hook, line and sinker for the phishing scam.

Global Application and Network Security report finds ransom is top motivation for cyber attacks, IoT botnets a major concern (VanillaPlus - The global voice for B/OSS) Radware®, a provider of cyber security and application delivery solutions ensuring the digital user experience for applications in virtual, cloud, and soft

Security Patches, Mitigations, and Software Updates

Verizon and Sprint roll out January security update for Galaxy devices – Samsung Update (Samsung Update) BY H. Parvez / February 1, 2017 / News, OS Updates In order to keep the Android ecosystem protected from the ever-growing malware threats, ...

How WhatsApp is fighting spam after its encryption rollout (TechCrunch) WhatsApp proved itself to be the most YOLO-crypto company of 2016 when it turned on end-to-end encryption by default last April for its more than 1 billion..

Google Adds Security Key Enforcement to G Suite Apps, Hosted S/MIME to Gmail (Threatpost | The first stop for security news) Google pumped more life into the use of physical keys as a second form of authentication when it added Security Key enforcement support to G Suite.

Cyber Trends

Businesses Fear Brand Damage More Than Security Breaches (Dark Reading) Organizations struggling with risk management are more concerned about brand damage than cyberattacks, new Ponemon study shows.

Who’s Watching the Cloud? Moving to the Cloud Demands More Visibility - Netreo (Netreo) Although a study by Netreo shows a majority of businesses feel they have adequate visibility over IT functions hosted in the cloud, there is still plenty of uncertaintyIrvine, Calif. – February 2, 2017 – A recent poll of IT professionals on behalf of Netreo, a provider of IT monitoring and management software, showed as companies …

Just One in Four Banks Confident of Breach Detection (Infosecurity Magazine) Just One in Four Banks Confident of Breach Detection. Capgemini study reveals misplaced consumer trust in financial institutions


Understand risk at the board level to tackle cybersecurity issues (Infosecurity Magazine) How do boards and directors prepare for the increasing accountability of cybersecurity?

Will Microsoft's $1 Billion Cybersecurity Play Hurt Smaller Players? -- The Motley Fool (The Motley Fool) The tech giant plans to spend billions to drive third-party security players out of its “One Windows” ecosystem.

Cyber Security leader Utimaco closes investment round led by EQT Mid Market (Marketwired) Utimaco, a global leader in high-end cyber security solutions, has successfully received all regulatory approvals for its new investor EQT Mid Market, a deal first announced in October 2016. The investment will be used to further accelerate the growth of Utimaco worldwide with a particular focus on expanding its footprint in North America.

Fortinet CFO Says Sales Reorg Is Working: Stock Soars After Strong Q4 Earnings And Forecast (CRN) "Sometimes it just takes time for the gears to connect completely, especially when your building a lot of functions at the same time," said Fortinet CFO Andrew Del Matto, during the company's fourth quarter earnings call on Thursday.

Wandera Powering Into 2017 with Exponential Company Growth (Digital Journal) Wandera, the leader in Enterprise Mobile Security and Data Management, has today announced that the company continues to experience rapid growth across its key business segments.

Symantec revenue surges 15% thanks to enterprise security | InfotechLead (InfotechLead) Security company Symantec Corp. posted revenue of $1,041 million (+15 percent) in its third quarter of fiscal year 2017 results, ended December 30, 2016. Symantec generated $644 million (+30 percent) from enterprise security business and $397 million (–4 percent) from consumer security business in Q3. The technology company is forecasting a drop in revenue in …

Symantec CEO Clark: “Feel Very Good About Our Ability to Grow the Top Line’ (Barrons) Shares of security technology provider Symantec (SYMC) are up 26 cents, or 1%, at $27.51, rebounding from last night’s after-hours losses, after the company yesterday delivered better-than-expected fiscal Q3 results but a Q4 outlook below consensus.The key question for the Street today is the extent of revenue growth in years to come, given that the “core" enterprise security business continued to decline.

Mozilla gives up on last vestiges of Firefox OS, lays off 50 (Ars Technica) Browsers remain the only area in which the nonprofit has had much market success.

Blockchain innovator Guardtime wins contract for next-generation Nato cyber range (International Business Times UK) Estonian MoD and Nato will shape how Nato range users will prep for current complex cyber-threat landscape.

Life of: A Principal Security Consultant (Infosecurity Magazine) Life of: A Principal Security Consultant

BNP Paribas poaches from consultant for this hot senior U.S. tech role - eFinancialCareers (eFinancialCareers) Investment banks are desperate to bring in this expertise, so have to look outside of the industry. 

HD Moore Joins Research-Driven Consulting Firm (Dark Reading) Metasploit creator joins Atredis Partners.

Products, Services, and Solutions

New infosec products of the week​: February 3, 2017 - Help Net Security (Help Net Security) New approach to continuous Docker container security NeuVector’s solution for container security is itself a container. The application automatically learn

Startup to embed Cylance engine into its cyber detection and prevention solutionsnull (GSN) Bricata, LLC, a developer of network intrusion detection and prevention solutions, today announced an OEM relationship with Cylance® Inc. Cylance is the first cybersecurity company to employ machine learning and artificial intelligence to create a lightweight, independent malware conviction engine.

Avast Releases Three New Decryption Tools to Fight Ransomware (softpedia) There are now 14 anti-ransomware tools available from Avast

IT & Cyber Experts Launch M&A Tech and Security Due Diligence - American Security Today (American Security Today) In an effort to assist organizations discover and mitigate potential risks which can seriously influence the value of an acquisition, Primitive Logic and AsTech Consulting, have launched a Merger & Acquisition (M&A) Tech and Security Due Diligence Partnership. This partnership focuses on providing material information about technologies and products, including security, to key stakeholders involved in a M&A …

Cyphort Enhances Security, Automation, and Analytics of its Adaptive Detection Fabric (GlobeNewswire News Room) Innovative advanced threat defense platform adds protection for cloud-based email, auto-mitigation capabilities, and a richer set of contextual threat analytics for security teams

ServiceNow Integrates Security Platform With Palo Alto Networks, Tanium To Speed Up Security Incident Responses (CRN) The new partners will contribute threat detection and endpoint security information directly into the ServiceNow Security Operations platform's automated workflows.

Bitglass Brings Real-Time Inline Security to AWS and Custom Cloud Apps (Yahoo! Finance) Bitglass, the total data protection company, today announced support for Amazon Web Services and custom apps -- two major additions that extend the capabilities of Bitglass' market-leading Cloud Access ...

Security Intelligence Platform from Exabeam launched (App Developer Magazine) Exabeam has announced its new Security Intelligence Platform, designed to decrease the risk of cyber threats for organizations of any size.Recent data.

Distil Networks Releases Web Application Security Industry's First Access Control List to Leverage Device Fingerprints (Marketwired) Distil Universal ACL offers a policy-driven, easy-to-manage approach, eliminating the pain of managing and updating longs lists of IP addresses

Rapid7 Enables IoT Hardware Security Testing with Metasploit (Yahoo! Finance) Rapid7, Inc., a leading provider of data and analytics solutions for security and IT, today announced that security teams can now link hardware directly into the Metasploit Framework ...

QuintessenceLabs: Advanced quantum cybersecurity products with high-speed true random numbers, encryption key management, and one time pad encryption. - ( QuintessenceLabs delivers a trusted security foundation protecting sensitive data on your premises, in the cloud or in uncontrolled environments. Founded in 2006, QuintessenceLabs addresses the most difficult security challenges facing companies, helping implement robust security strategies to protect data today and in the future. QuintessenceLabs products include: - an enterprise scale true random number generator …

LightCyber Introduces New Tools For Corporate Security Assurance (Source Security) The LightCyber Security Operations Center OPEX Calculator helps quantify the accuracy and efficiency of security tools.

Tunisia rolls out nationwide public key infrastructure secured by Thales (Thales) New national PKI helps grow digital economy by enabling trusted online services for government, enterprise and citizens.

FireMon Makes Automated Change Management Even Easier for Palo Alto Networks Customers (Yahoo! Finance) FireMon, the global leader in Network Security Policy Management , today announced an extension of its Intelligent Policy Automation framework to now include automated policy implementation for Palo Alto ...

Fortinet Introduces the World’s First Terabit Firewall Appliance and Market Leading 100 Gbps NGFW Chassis (Yahoo! Finance) Ken Xie, founder, chairman of the board and chief executive officer at Fortinet“ Cloud computing, IoT, and a hyper-connected digital economy have been straining enterprise ...

Checkmarx Announces Open Beta Support For Scala Programming Language To Ensure Vulnerability Detection (Source Security) Checkmarx CxSAST addresses more than 20 different programming languages, and Scala is its latest addition.

Technologies, Techniques, and Standards

Process industry initiative to develop standards-based, secure control systems - looking for utility support (Control Global) The process industry initiative to develop a standards-based, secure-by-design control system is getting interest from many different industry sectors. Unfortunately, there are no electric utilities participating. February 28th, I will be participating in a webinar with the ExxonMobil Chief Engineer to discuss the initiative and what it means to power utilities -

Recommendations to help the security of ICS-SCADA systems - Help Net Security (Help Net Security) A new ENISA study identified good practices and recommendations to help the security of ICS-SCADA against modern cyber threats.

Routers Under Attack: Current Security Flaws and How to Fix Them - TrendLabs Security Intelligence Blog (TrendLabs Security Intelligence Blog) How is it possible for users to lose hundreds of dollars in anomalous online bank transfers when all of their gadgets have security software installed?

Email insecurity threatens political campaigns and even elections (Infosecurity Magazine) Email insecurity threatens political campaigns, organizations and even elections.

How to minimize the risk and impact of identity fraud - Help Net Security (Help Net Security) Here are seven recommendations from Javelin Strategy & Research for consumers to follow in order to minimize the risk and impact of identity fraud.

5 Cybersecurity Tools You Company Should Have (Connecticut Post) According to a recent Verizon Data Breach Investigations Report, 60 percent of cyber-attacks target SMBs, largely because they are easier targets. In the scramble to secure the cloud, hardware is often overlooked, says Christoph Schell, president, Americas, HP Inc.

Design and Innovation

IoT: security first, innovation second? (Computing) Securing identity data for IoT environments must be a foundation of identity and access management infrastructure, says Hans Zandbelt

The Warbot Builders of the Middle East Spill Their Secrets (WIRED) The tech behind new remote-operated 'bots is homebrewed, inelegant---and deadly.

Come Fly with Me: Securing the Drone (Infosecurity Magazine) New report seeks to aid the safe and secure creation and operation of unmanned aircraft systems

Lego builds social network that should be safe for kids (Naked Security) Experts welcome Lego’s decision not to allow free text or avatars for young users

Research and Development

University of Surrey scientist publishes blueprint for large-scale quantum computer (Computing) Don't try this at home - unless you have a lot of money.

What Does It Take to Test Quantum Cryptography? Physicists, Lasers, and an Airplane (WIRED) Experts claim that quantum cryptography will be more secure than any encryption technique we use today.

Researchers break data transfer efficiency record ( Researchers at the Department of Energy's Oak Ridge National Laboratory have set a new record in the transfer of information via superdense coding, a process by which the properties of particles like photons, protons and electrons are used to store as much information as possible.


'This is the new reality': Panelists speak for Pitt cyber security institute (Pittsburgh Post-Gazette) The precise identity and motivations of the hackers who leaked sensitive Democratic emails during last year’s presidential election may never be known. But they left fingerprints that were familiar to Andrei Soldatov, a journalist who has written about Russia’s security state for the past 20 years.

A Hogwarts For Cyber Protection? (Dark Reading) How the UK is minting a new generation of cybersecurity wizards.

University of Maryland announces ‘Discovery District’ (Maryland Daily Record) The University of Maryland has dubbed a roughly 150-acre area near the College Park campus, which includes development along Baltimore Avenue as well as pro

Legislation, Policy, and Regulation

Why Iran's favorite weapon is the cyber attack (Business Insider) Cyber attacks allow Iran "to strike at adversaries globally, instanta­neously, and on a sustained basis."

A Pirate Podcast App Takes on Iran’s Hardline Censors (WIRED) RadiTo hopes to bring forbidden audio to Iran's growing audience of smartphone users---and stay a step ahead of the country's internet filters.

EU tools up for cyber war ( As the member states rapidly progress in their own personal cyber arms race, the bloc’s institutions risk being left behind. EURACTIV Germany reports.

Europe being destabilised by Russian cyber attacks, warns defence secretary Sir Michael Fallon (Computing) Fallon calls for EU states to increase spending on defence and cyber security.

MPs question UK's cyber attack defences - BBC News (BBC News) A skills shortage and "chaotic" handling of data breaches undermine confidence, report says.

Parliament Slams Woeful Government Security Efforts (Infosecurity Magazine) Parliament Slams Woeful Government Security Efforts. Chaos still reigns in Whitehall, says Public Accounts Committee

US Army Funds Cyber-center for Ukraine Military (Infosecurity Magazine) The project comes amid concerns about Russian hacking within the Ukraine.

Treasury changes Obama sanctions on Russian security agency (UPI) The U.S. Treasury revised sanctions on Russia that barred cybersecurity sales to Moscow's top security bureau -- a move criticized by some Democrats.

Trump Loosens Sanctions on Russian Spy Agency Linked to Election Hack (Washington Free Beacon) The Treasury Department on Thursday announced the loosening of sanctions on Russia's spy service that were imposed by former President Obama for Moscow's intelligence operations targeting the 2016 presidential election

Trump order on cybersecurity to include nod to IT modernization, report says - Fedscoop (Fedscoop) An executive order President Donald Trump is expected to sign on federal cybersecurity will direct agency heads to “plan for the deliberate modernization of the federal executive branch IT,” a White House official told Tuesday’s press pool. While reporters have not yet seen the official language of the executive order, a White House official on Tuesday read a statement for reporters indicating …

Two Huge Challenges for Trump’s Cybersecurity Team (LifeZette) There is a lot of talk these days about solving the big cybersecurity threats to the United States. Former New York City Mayor turned international security contractor Rudy Giuliani says he is “this close.” Former President Obama, continuing his legacy-polishing job, latched onto this growing threat during his final days by declaring that, “During my administration, we have executed a consistent strategy focused on three priorities,” and went on to name an increased level of defense, deterring and disrupting malicious activity, and responding to and recovering from attacks. He failed to mention that in spite of repeated policy reviews, cybersecurity frameworks, international “common understandings,” cyberinformation sharing acts and countless new initiatives, the Office of Personnel Management (OPM) suffered the largest breach in U.S. government history. We also have to stop worrying about collateral damage. Our enemies don’t. SONY Pictures, Target Stores, Home Depot, JP Morgan Chase, Yahoo, Dyn, and hundreds of other breaches all occurred while the National Institute of Standards,

Here's How Trump Could Take Control Of Every U.S. Polling Place (The Huffington Post) A last-minute Obama decision may empower federal authorities to run the "election infrastructure" in the name of national security.

A hearing on OPM turned into a nonsensical shouting match over cybersecurity (Cyberscoop) What was scheduled to be a relatively blasé bureaucratic update to members of the House Committee on Oversight and Government Reform regarding OPM’s cybersecurity posture diverged from prepared witness testimony and instead became a grandstanding showcase laden with hyperbole. During Thursday’s hearing, lawmakers displayed what appeared to be a basic misunderstanding of federal cybersecurity, encryption …

Elijah Cummings blasts GOP inaction on Russia after Reps. Chaffetz and Lynch erupt in shouting match (Raw Story) On Thursday, a House Oversight Committee hearing regarding Russian attempts to interfere with the 2016 U.S. presidential election erupted in a shouting match between committee chairman Rep. Jason Chaffetz (R-UT) and Rep. Stephen Lynch (D-MA).

Litigation, Investigation, and Law Enforcement

Russian Lawyer Says FSB Officers, Kaspersky Manager Charged With Treason (RadioFreeEurope/RadioLiberty) А Russian lawyer has confirmed the arrests of two Federal Security Service (FSB) officers and a manager at a Russian cybersecurity company on treason charges, and that they are suspected of passing classified information to U.S. intelligence.

Two Arrested For CCTV Camera Hack On Washington, DC - Dark Reading (Dark Reading) A British man and Swedish woman have reportedly been arrested in the UK for the cyberattack ahead of Trump's inauguration.

Hunting for evidence, Secret Service unlocks phone data with force or finesse (The Christian Science Monitor) At a dedicated phone forensics facility in Tulsa, Okla., the Secret Service breaks into about 40 phones a year that could contain valuable information related to criminal investigations.

Audit: DHS cyber center lacks metrics - Cyberscoop (Cyberscoop) DHS has no way of measuring the cyber center's effectiveness, but government officials and business executives who used its services seemed satisfied.

NY Attorney General Settles Acer Data Breach Suit (Media Post) New York State Attorney General Eric T. Schneiderman has settled a data breach case for Acer Service Corporation.

Gamers lose suit over retention of biometric faceprints (Naked Security) Judge dismisses basketball siblings’ suit, saying concerns about retention are ‘not concrete enough’

Children's Medical Center of Dallas Pays $3.2 Million Fine for HIPAA Violations (eSecurity Planet) The organization failed to encrypt patient data after an unencrypted, non-password protect BlackBerry containing PHI was lost in 2009.

For a complete running list of events, please visit the Event Tracker on the CyberWire website.

Newly Noted Events

ISSA Mid Atlantic Security Conference (Rockville, Maryland, USA, March 10, 2017) Join us for a full day of training by industry leaders discussing some of the latest topics in tactics and techniques for preparing for cyber-attacks. This conference will feature a variety of presentations...

Upcoming Events

Insider Threat Program Development Training For NISPOM CC 2 (Toms River, NJ, USA, February 6 - 7, 2017) Insider Threat Defense announced it will hold a 2 day training class on Insider Threat Program Development (NISPOM Conforming Change 2) on Feb. 6-7, 2017, in Toms River, NJ. For a limited time the training...

The Risks and Benefits of Artificial Intelligence and Robotics (Cambridge, England, UK, February 6 - 7, 2017) The Risks and Benefits of Artificial Intelligence and Robotics Workshop aims to provide media and security professionals with an in-depth understanding of the implications that the rapid advancement of...

SANS Southern California - Anaheim 2017 (Anaheim, California, USA, February 6 - 11, 2017) Learn practical, relevant tips and techniques from industry leaders. Join us for SANS Southern California - Anaheim 2017, and choose from eight courses on cyber defense, penetration testing, incident response,...

Cyber Protect Conference (Nottingham, England, UK, February 9, 2017) Business owners have been invited to attend Nottinghamshire's first-ever cybercrime conference to learn how to better protect their data. The Cyber Protect Conference is being jointly hosted by the county's...

Workplace Violence & Response To Active Shooter Events Meeting (Laurel, Maryland, USA, February 9, 2017) The National Insider Threat Special Interest Group (NITSIG) will be hosting a meeting on February 9, 2017, at the Johns Hopkins University Applied Physics Laboratory, Laurel, MD. The meeting will be exclusively ...

RSA Conference 2017 (San Francisco, California, USA, February 13 - 17, 2017) The current state of cybersecurity means there are many opportunities for the industry as a whole to collaborate on new innovations. Discovering the next great opportunity will require everyone to embrace...

Using STIX/TAXII to share automated cyber threat data (San Francisco, California, USA, February 15, 2017) Cybersecurity experts representing the financial sector, healthcare, utilities, software providers, government, academia and nonprofits continue to define/develop the STIX/TAXII specifications as the solid...

Insider Threat Program Development Training For NISPOM CC 2 (Simi Valley, CA, USA, February 22 - 23, 2017) Insider Threat Defense announced it will hold a 2 day training class on Insider Threat Program Development (NISPOM Conforming Change 2) on Feb. 22-23, 2017, in Simi Valley, CA. For a limited time the training...

Maritime & Port Security ISAO: Operationalizing Cyber Resilience (Cape Canaveral, Florida, USA, February 22 - 24, 2017) The Maritime & Port Security Information Sharing & Analysis Organization (MPS-ISAO) convenes its inaugural conference “Maritime & Port Cyber Resilience - Adding a New Layer of Cybersecurity” February 22-24,...

Risky Business (London, England, UK, February 23, 2017) How are you tackling Cyber Crime in the Property Transaction? Join our panel of expert speakers at the IET in London to find out more about cyber crime in the property transaction and the steps you can...

The 2nd China Automotive Cyber Security Summit 2017 (Shanghai, China, February 24, 2017) CACSS2017 will Provide a platform for Automotive OEMs, Tier 1 suppliers, Automotive security solution/ technology/products developers,Automotive electronics companies, IT companies, Mobile data suppliers,...

Second Annual International Security Conference (Riyadh, Saudi Arabia, February 27 - 28, 2017) The conference will facilitate national, regional and international collaboration between government, industry and critical infrastructure organizations. It will also feature investors who want to diversify...

SANS Dallas 2017 (Dallas, Texas, USA, February 27 - March 4, 2017) We are pleased to invite you to attend SANS Dallas 2017, on February 27- March 4 at The Westin Dallas Downtown, located in the heart of the city. We have selected several of our top information security...

Autonomous Vehicles Silicon Valley (Santa Clara, California, USA, February 28 - March 2, 2017) The road to autonomy: Regulation. Consumer Acceptance. Safety & Security. Explore the latest technologies and hottest issues for the autonomous vehicles industry.

The Cyber Security Summit: Denver (Denver, Colorado, USA, March 1, 2017) This event is an exclusive conference connecting Senior Level Executives responsible for protecting their companies’ critical data with innovative solution providers & renowned information security experts.

International Cyber Risk Management Conference (ICRMC) (Toronto, Ontario, Canada, March 2 - 3, 2017) The third annual International Cyber Risk Management Conference (ICRMC) brings together a world class roster of experts with cross-sector, global and multidisciplinary expertise to share knowledge, lessons ...

SANS San Jose 2017 (Milpitas, California, USA, March 6 - 11, 2017) Securing and defending your network has never been more important as attacks and breaches make the news daily. Gain the skills and tools you need to win the battle against the wide range of cyber adversaries...

15th annual e-Crime & Cybersecurity Congress (London, England, UK, March 7 - 8, 2017) Europe's largest and most sophisticated gathering of senior cybersecurity professionals from international business, governments, law enforcement and intelligence agencies.

Investing in America’s Security: Cybersecurity Issues (Jersey City, New Jersey, USA, March 10, 2017) Please join us for the 5th Annual Northeast Regional Security Education Symposium hosted by the Professional Security Studies Department at New Jersey City University. The Symposium’s keynote address will...

IAPP Europe Data Protection Intensive 2017 (London, Englan, UK, March 13 - 16, 2017) Set in London, the Data Protection Intensive delivers innovative solutions to today’s top privacy and data protection challenges. Known for its exceptional programming, the Intensive has come into its...

Rail Cyber Security Summit (London, England, UK, March 14 - 15, 2017) Now in its second year, the event will take place at the Copthorne Tara Kensington hotel in London between March 14th and 15th 2017 and will feature a range of experts from the rail transport industry,...

CyberUK 2017 (Liverpool, England, USA, March 14 - 16, 2017) Announcing the UK government's flagship IA and cyber security event, for 2017. This is a three day event that will bring together cyber security leaders and professionals from across the UK’s information...

Cybersecurity: The Leadership Imperative (New York, New York, USA, March 16 - 17, 2017) Cyber risk impacts every element of your organization – and even the most brilliant information security expertise must be supported by a cross-functional cybersecurity structure and culture to succeed.

BSides Canberra (Canberra, Australia, March 17 - 18, 2017) BSidesCbr is a conference designed to advance the body of Information Security knowledge, by providing an annual, two day, open forum for discussion and debate for security engineers and their affiliates.

Grow your brand and reach new customers.

Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.

Be a part of the CyberWire story.

People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.