skip navigation

More signal. Less noise.

Daily briefing.

Saturday's terror attacks in London have been claimed by ISIS. UK Prime Minister May yesterday, in an "enough is enough" speech, excoriated Internet and social media providers for giving terrorists a safe place to inspire and recruit. She called for a purge of extremism in general and radical Islamism in particular from cyberspace, and also advocated restricting widespread availability of strong, end-to-end encryption. 

As investigations and arrests continue, at least one of the terrorists turns out to have been a known wolf, reported to police some time ago for his efforts to radicalize children.

A group calling itself "GlobalLeaks" has told the Daily Beast it will soon release hacked emails belonging to the United Arab Emirates' ambassador to the US. GlobalLeaks says the emails show attempts to manipulate public opinion in ways that are not to the US advantage.

On May 24, Qatar News Agency (QNA) broadcast remarks favorable to Israel and Iran. QNA and the Qatar government say they were hacked and the remarks were a fabrication and provocation, but this morning members of the Gulf Cooperation Council (Saudi Arabia, the United Arab Emirates, Bahrain, and Egypt) severed diplomatic relations with Qatar. On Saturday, Bahrain's Foreign Ministry saw its own Twitter account hijacked by hacktivists protesting Bahrain's crackdown on opposition groups.

The Indian Air Force has convened a court of inquiry on the crash of one of its Sukhoi 30 fighters on May 23rd. The IAF will specifically investigate the possibility that a cyber attack brought the aircraft down.


Today's issue includes events affecting Afghanistan, Bahrain, China, Croatia, Egypt, European Union, Germany, India, Indonesia, Japan, Libya, Malaysia, Maldives, Pakistan, Philippines, Poland, Qatar, Romania, Russia, Saudi Arabia, Singapore, Sweden, Syria, Ukraine, United Arab Emirates, United Kingdom, United States, and Yemen.

In today's podcast, we speak with our partners at Virginia Tech's Hume Center, as Charles Clancy describes the US Federal Communications Commission's approach to consumer data privacy.

Delta Risk (Webinar, June 8, 2017) Insider threats are more prevalent but not any less difficult to detect and deter. One of the best ways to address insider threats is to implement a formal insider threat program in your organization. Delta Risk experts discuss essential elements of an insider threat program, and why you need one now more than ever.

CyberTech Fairfax (Fairfax, Virginia, USA, June 13, 2017) Cybertech Fairfax: meet tech execs, start-ups, investors & legal, media & mktg pros changing the global cyber landscape. Cybertech Fairfax is a thought-provoking conference on global cyber threats, solutions, innovations and technologies.

UMBC Cybersecurity Graduate Info Session (Rockville, Maryland, USA, June 15, 2017) Learn how UMBC’s graduate programs in Cybersecurity can elevate your career at our upcoming Info Session. Led by industry experts, our programs combine hands-on technical training with unparalleled opportunity.

CyberSecurity International Symposium (Chicago, Illinois, USA, July 10 - 11, 2017) Network with leading cybersecurity professionals, innovators, CIOs and regulators who are on the front lines of securing critical business and infrastructure networks. This in-depth Symposium examines the latest technologies, best practices, and lessons learned in achieving end-to-end network security for organizations of all varieties.

Cyber Attacks, Threats, and Vulnerabilities

ISIS claims responsibility for London Bridge attack (ABC News) ISIS has claimed responsibility for the attack that killed seven people in London on Saturday night.

London terrorist attack hours after Islamic State outlet called for knife and vehicle assaults on civilians (The Telegraph) An Islamic State group propaganda outlet exhorted would-be jihadists to carry out vehicle and knife attacks on civilians, just hours before three terrorists went on a rampage in central London.

Hackers Vow to Release Apparent Trove of U.A.E. Ambassador’s Emails (Daily Beast) The hackers are offering a sample of alleged messages they claim demonstrate “how a small rich country/company used lobbyists to hurt American interests and those of it allies.”

Recap: News agency hack blamed for diplomatic meltdown in Qatar (CSO Online) Early Monday morning in Bahrain, the country's Foreign Affairs Ministry said the nation has severed diplomatic ties with Qatar. Within minutes of Bahrain's announcement, the United Arab Emirates, Saudi Arabia, and Egypt followed suit. The diplomatic break between four of the Gulf Cooperation Council states is being partially blamed on a security incident at Qatar News Agency. The alleged hack resulted in a fake news article that inflamed leaders in the region.

Bahrain minister hacked hot on heels of Qatar cyber attack (News24) Hackers have taken over the Twitter account of the Bahraini foreign minister, just 10 days after a cyber attack on the Qatar official news agency.

Concerns deepen about cyber attack on Su 30, IAF starts inquiry (Sunday Guardian) Indian Air Force has started a court of inquiry to investigate the crashing of one of its Sukhoi 30 fighters in Assam, amidst concerns that the aircraft’s flying was “interfered with from outside” while it was still airborne, and that this may have led to the pilots suffering “spatial disorientation”. The aircraft went down last week near the India-China border after taking off from the Tezpur airbase in Assam.

Chinese Company Behind Adware That Infected Over 250 Million Computers (BleepingComputer) A Chinese digital marketing company named Rafotech is behind a wave of inter-connected adware families that found their way onto the computers of millions of users.

CIA Malware Can Switch Clean Files With Malware When You Download Them via SMB (BleepingComputer) After taking last week off, WikiLeaks came back today and released documentation on another CIA cyberweapon. Codenamed Pandemic, this is a tool that targets computers with shared folders, from where users download files via SMB.

"EternalBlue" vulnerability has been exploited to spread malware Gh0st RAT & Nitol backdoor (Penetration Testing) FireEye security researchers have recently discovered that ExternalBlue (Eternal Blue) vulnerabilities have been exploited by hackers using Nitol backdoor with malware Gh0st RAT. Malware Gh0st RAT is a Trojan program for Windows, which is...

EternalBlue NSA Exploit Becomes Commodity Hacking Tool, Spreads to Other Malware (BleepingComputer) ETERNALBLUE, an alleged NSA exploit targeting the SMBv1 protocol leaked by the Shadow Brokers in mid-April, has become a commodity hacking tool among malware developers.

Microsoft Lists Products Using Insecure SMB 1 Protocol (Redmondmag) Microsoft this week started publishing a list of devices and software products that use Server Message Block 1.

Another Spy Program Leaked onto the Dark Web, Second Web Attack Imminent (Deep Dot Web) The WannaCry ransomware infected over 300,000 computers worldwide including those operated by the Na...

WannaCry might be the tip of the iceberg states Digital Shadows (Security Middle East) WannaCry might be the tip of the iceberg states Digital Shadows. The attack on 200,000 plus computers across more than 120 countries around the world by...

QakBot Banking Trojan Causes Massive Active Directory Lockouts (Security Intelligence) IBM X-Force attributed a recent wave of malware-induced Active Directory (AD) lockouts across several IR engagements to the operators of the QakBot Trojan.

Centrelink partly blames 42m missed calls on cyber attack (iTWire) The Department of Human Services has claimed that part of the reason 42 million calls to Centrelink went unanswered in the period from June 2016 to Ap...

Jaff Malware Probe Uncovers Link to Cybercrime Marketplace (Threatpost) Researchers have discovered a shared backend infrastructure between the Jaff ransomware and a black market carder shop.

Hackers Behind Jaff Ransomware Selling Victims' Data on Dark Web (HackRead) The dark web marketplaces and undergrown marketplaces are full of vendors selling databases, weapons, illegal drugs and malicious software. Now security re

Security Alert: Jaff Ransomware Operation Tied to Cyber Crime Marketplace (Heimdal Security Blog) The ties between cyber criminal operations run deep. This alert reveals the connection between Jeff ransomware and a criminal marketplace:

Ads in Google Search Results Redirect Users to Tech Support Scam (BleepingComputer) Malicious ads displayed in Google search results for Target — the US retailer — redirected users to a tech support scam.

Man Accidentally Destroyed Production Database on First Day of His Job (HackRead) We all make mistakes, but some mistakes are fatal ending up with devastating consequences just like one of those Amazon engineers who's typo error caused a

Security Patches, Mitigations, and Software Updates

Apple test hints that iOS 11 will be the end-of-life for outdated, 32-bit applications (TechCrunch) Ahead of Apple's Worldwide Developer Conference today, and the expected announcement of iOS 11, the company briefly removed older, 32-bit iOS applications..

Cyber Trends

Duo Study Finds Millions of Devices Running Out-of-Date Systems, Despite High-Profile Breaches (Duo Security) Duo Security today released The 2017 Duo Trusted Access Report, analyzing the security health of 4.6 million endpoint devices, including 3.5 million mobile phones across multiple industries and geographic regions.

Symantec Offers Financial Malware Insights ( Symantec, a cybersecurity firm that specializes in research and cloud-based security, released new insights surrounding financial malware and ransomware in its latest Internet Security Threat Report (ISTR). According to the company, financial threats, with more than 1.2 million detections per year, are up to 2.5 times more widespread, compared to ransomware. Attacks that use ransomware […]

Patch-me-if-you-can: security teams struggle to apply updates in time (SC Media UK) Research from Bromium says security teams aren't being cut any slack on the patching front.

New Report Quantifies Time’s Impact on Costs of Data Breaches and Disruption Attacks (McAfee Blogs) New analysis from the Aberdeen Group, based on data provided by Verizon, provides fresh evidence quantifying the cost of time in two different incident typ

The cost of IoT hacks: Up to 13% of revenue for smaller firms (Help Net Security) Could IoT hacks cost an organization more than $20 million? Firms with annual revenues above $2 billion can look forward to this if not secure.


Japan to hawk home-grown cybersecurity tech at Interpol World next month (The Japan Times) Japan will set up its own pavilion at Interpol World 2017 in Singapore next month to show off home-grown cybersecurity technologies with government aid, pr

Cryptocurrencies go way beyond Bitcoin, and way out of reach (Financial Review) More than $US500 million has been raised in new crypto sub-markets. scores a $1.2M seed round to simplify developer encryption key security (TechCrunch), a new security startup founded by two former MIT students and one of their professors, is launching today with a free product called Kryptonite,..

Pulse Secure To Acquire Brocade's Virtual Application Delivery Controller Business (CRN) The acquisition is just the latest in a series of business spinoffs for Brocade, and helps Pulse Secure expand its secure access portfolio to services and applications.

Palo Alto Crushes Earnings, Finds Itself in Limelight After Cyber Attack (TheStreet) The Santa Clara-based company's stronger-than-expected first quarter earnings results have been the primary catalyst driving the shares higher this week.

Booz Allen Can’t Regain $27M Navy Cyber Contract At GAO (Law360) Booz Allen Hamilton Inc. has lost its attempt at the Government Accountability Office to claw back cyber support work consolidated by the U.S. Navy and doled out to a competitor for $27 million, with a bid protest decision made public Thursday signing off on each evaluation of price and capabilities.

Kaspersky Lab and AVL Software shake hands for automotive cybersecurity (Data Driver) A steadily increasing number of vehicle features – such as remote diagnostics, telematics and infotainment – are using communication cha...

'Shark' Robert Herjavec Secures A Place As An Entrepreneurial Icon (Investor's Business Daily) TV’s "nice Shark," Robert Herjavec, shows companies why they need to take cybersecurity threats much more seriously right now.

High-Tech Bridge Named a “Gartner Cool Vendor 2017” (BusinessWire) High-Tech Bridge, a leading provider of web and mobile Application Security Testing services, has been named a "Cool Vendor” in Gartner&rsq

Huawei Shores up cyber security (iTWire) Huawei Technologies (Australia) has announced the appointment of Dr Malcolm Shore as its Cyber Security Officer. Shore was born in England and studied...

Kensington Names Ben Thacker Vice President and General Manager (CIO Today) Years of experience with the industry and channel partners, as well as a deep understanding of our market sector will be invaluable

BAE's US arm adds former Senator Ayotte to board (Washington Technology) BAE Systems' U.S. subsidiary adds former Sen. Kelly Ayotte to board of directors for a three-year term.

Products, Services, and Solutions

NH-ISAC and Perch Security Aim to Revolutionize Information Sharing (PRNewswire) The National Health Information Sharing and Analysis Center, (NH-ISAC), a...

Security-intelligence deal will feed Cisco’s threat data to IBM’s cybersecurity AI (CSO) Vendors learning to play well together so users can focus on threats instead of integration

Technologies, Techniques, and Standards

Cyber warfare events begins Monday at Fort Gordon (Augusta Chronicle) The U.S. Cyber Center of Excellence will again host an event on the exploration of cyberwarfare and electronic warfare at Fort Gordon beginning Monday.

Army’s Cyber Quest Focuses on Industry Input (SIGNAL) The annual 26-day event runs through June 30 at Fort Gordon, Georgia.

Preparedness & Cyber Risk Reduction Part Two: Preparedness and Operational Planning (SurfWatch Labs, Inc.) In part one of this blog series, “Introduction to the Preparedness Cycle,” we took a general look at threats, risks, and preparedness. Recognizing that there will be undesired threats that develop …

Prudence over panic (FCW) A seasoned CISO explains why focusing too much on zero-days can distract from older vulnerabilities.

It's time for a common sense security framework (Help Net Security) Privacy Rights Clearinghouse maintains a database of every data breach made public since 2005, and as the total number of records rapidly approaches one bi

Securely Managing Employee Turnover: 3 Tips (Dark Reading) Don't let the process spiral into organizational chaos. Here are steps you can take to keep your company safe.

Design and Innovation

Machine learning in attack detection - what it can and can't do (Computing) MWR InfoSecurity's Luke Jennings examines how machine learning should - and shouldn't - be applied to security.

The Way You Walk Could Be the Best Biometrics Authentication Solution as of Yet (BleepingComputer) A person's gait, or the motions of his feet and body as he walks, could be used as a very reliable authentication method for offline security systems.

Research and Development

Research looks to make machines a little more human (C4ISRNET) DARPA-funded researchers created a “model of human norms” that gives machines a basic sense of manners and could eventually improve how unmanned systems interact with people across all sectors, including the military.

IBM creates a new transistor type for 5nm silicon chips (TechCrunch) IBM Research has created a new type of transistor for chips that enable 5nm construction, the smallest ever for a silicon processor. This new method, created..

Legislation, Policy, and Regulation

Theresa May says the internet must now be regulated following London Bridge terror attack (The Independent) New international agreements should be introduced to regulate the internet in the light of the London Bridge terror attack, Theresa May has said. The Prime Minister said introducing new rules for cyberspace would “deprive the extremists of their safe spaces online” and that technology firms were not currently doing enough.

May wants Britain to follow European lead emphasizing cybersecurity (Washington Post) But increasing cyber-surveillance does not necessarily curb terrorist violence, analysts say.

We want to limit use of e2e encryption, confirms UK minister (TechCrunch) The UK government has once again amped up its attacks on tech platforms' use of end-to-end encryption, and called for International co-operation to regulate..

London attack: Internet firms provide safe space for terrorists, claims PM (Ars Technica UK) Home secretary again demands "limit to the amount of end-to-end encryption."

Tech firms: We’re trying to make our sites hostile to terrorists (Ars Technica) Facebook, Twitter, and Google react to UK prime minister's call to limit encryption.

London attack: Tech firms criticise PM's condemnation (BBC News) Tech giants say they are working to fight extremism, after Theresa May calls for more regulation.

Theresa May's Terrorism Strategy (The Atlantic) In the Prime Minister’s speech Sunday, she said, “There is, to be frank, far too much tolerance of extremism in our country.”

The Manchester Bombing and British Counterterrorism (Foreign Affairs) Familiar patterns, fresh consequences

What the Government Can Offer British Cybersecurity (Infosecurity Magazine) There is no question that the uptake of Government resources is disappointingly low

Does the UK Need an Information Security Royal Charter? (Infosecurity Magazine) The information security profession needs to be identified as a key broker for all data assets.

Arab powers sever Qatar ties, citing support for militants (Reuters) The Arab world's strongest powers cut ties with Qatar on Monday over alleged support for Islamists and Iran, re-opening a festering wound just two weeks after U.S. President Donald Trump's demand for Muslim states to fight terrorism.

Asia ‘must unite’ against terrorism in region (South China Morning Post) Southeast Asian delegates at Shangri-La Dialogue in Singapore call for more cooperation against growing menace of Islamic State in the region

Putin says Snowden is not a traitor (The Times of India) Russian President Vladimir Putin has said he believes former US National Security Agency contractor Edward Snowden was wrong to leak US spy secrets, but is no traitor.

Vladimir Putin: election hackers could be American (euronews) Russian President Vladimir Putin says hackers could be from "anywhere", even America

ES Views: We must take the threat of cyber attacks seriously (Evening Standard) There is no silver bullet for protecting against ransomware and the overwhelming concern for personal data is exactly what cyber-criminals are counting on. The individual ransom demands seem low, around $300 (£230), but this will add up quickly if hundreds or thousands of computers are affected.

'Tallinn Manual 2.0'—the rulebook for cyberwar ( With ransomware like "WannaCry" sowing chaos worldwide and global powers accusing rivals of using cyberattacks to interfere in domestic politics, the latest edition of the world's only book laying down the law in cyberspace could not be more timely.

Should CYBERCOM Split From the NSA? (International Policy Digest) There's a push to separate CYBERCOM from the NSA.

Wanted: DISA cyber warriors (C4ISRNET) The agency is vying for skilled cyber professionals — and developing their own.

Regulators doing 'more harm than good' on cybersecurity: The Clearing House (American Banker) The group representing large banks argued in a report Friday that overlapping regulations are hurting the industry's efforts to deal with cyberthreats.

Hack Back law would create cyber vigilantes (CSO Online) The Active Cyber Defense Certainty Act revision demonstrates what happens when you rely upon limited information and a cowboy mentality.

In Russian Region, A Soviet-Style 'People's Patrol' For The Cyber Age (RadioFreeEurope/RadioLiberty) A governor in Russia's southern Belgorod region has moved to set up the first official network of cyber-informers to root out illegal online content, an initiative that comes amid a broad crackdown on online speech that rights groups have denounced.

A Laptop Ban Leaves Everyone Scared and No One Safer (WIRED) In the rush to fetishize airplane attacks above all else, America's distorted perception of risk ultimately leaves everyone more scared and no safer.

China’s Weibo restricts overseas users on Tiananmen anniversary (TechCrunch) This weekend marked the anniversary of the Tiananmen Square massacre in China in 1989, one of the most infamous dates in the country's modern history. The..

Litigation, Investigation, and Law Enforcement

London attack: 12 arrested in Barking after van and knife incidents (BBC News) Seven people were killed and 48 others injured in a van and knife attack on London Bridge and Borough Market, in which three suspects were shot dead by police.

London Bridge terror attack extremist was reported to police for trying to radicalise children (Times (London)) One of the London Bridge terrorists tried to recruit children to join Islamic State and was twice reported to police over his extremist views, it was claimed yesterday. The Pakistani-born radical...

Burka women among a dozen arrests in armed police raids over London Bridge attack (Times (London)) Counterterror police raided two more properties this morning as they continue to dismantle the alleged network of the three jihadists who spread terror through London Bridge. A “number of people”...

‘You won’t break us. You won’t break us, ever.' A defiant London carries on after latest attack (Los Angeles Times) May calls for tough measures as police report 12 arrests in London rampage

Afghan Intelligence Arrests 'Would-Be Suicide Bomber' As Kabul Protest Continues (RadioFreeEurope/RadioLiberty) Afghanistan's intelligence agency says it has arrested a would-be suicide bomber who planned to detonate his explosives at the funeral of an antigovernment protester in Kabul.

Kabul funeral suicide bombers trained in Pakistan, Afghan intelligence says (FDD's Long War Journal) The three suicide bombers who killed 20 people and wounded scores more during a complex attack at a funeral at a Kabul cemetery trained at a Pakistani madrassa, according to Afghanistan's National Directorate of Security.

Rosenstein to testify next week (TheHill) Deputy Attorney General Rod Rosenstein is set to go before the Senate Intelligence Committee on Wednesday — just a day ahead of former FBI Director James Comey's first congressional testimony before the panel since his abrupt firing last month.

Ex-spy says NSA did mass surveillance during Utah Olympics (Washington Post) A former top spy agency official who was the target of a government leak investigation says the National Security Agency conducted blanket surveillance in Salt Lake City during the2002 Winter Olympics in Utah, according to court documents.

Cybercrime and security: A Russian perspective (al Jazeera) Kaspersky Lab responds to US allegations of doubt and addresses the rise in internet-based crime worldwide.

Police dismantle organised crime network suspected of online payment scams (Help Net Security) The action days for Operation MOTO on 29-31 May 2017 resulted in 9 arrests including the criminal network’s masterminds, as well as 25 house searches.

Supreme Court agrees to rule if cops need warrant for cell-site data (Ars Technica) Justices to clarify protections of the Fourth Amendment in the digital age.

Researchers Use Ridesharing Cars to Sniff Out a Secret Spying Tool (WIRED) University of Washington researchers put sensors in 15 ridesharing cars, and uncovered new evidence of how stingrays are being used and how to detect them.

Students Lose Acceptance to Harvard Over Racist Memes (Motherboard) At least 10 incoming freshmen have had their admission revoked for sharing offensive content in an exclusive Facebook chat.

For a complete running list of events, please visit the Event Tracker on the CyberWire website.

Newly Noted Events

4th Annual Cybersecurity Summit (Arlington, Virginia, USA, June 7, 2017) Federal agencies are facing ever more sophisticated adversaries and threats that place our privacy, our economy, and our nation at risk. Cybersecurity is a dynamic and crosscutting field that is ever changing The 4th Annual Cybersecurity Summit is a place for important discussions about the challenges with cyber-security and is also a significant benefit both for the AFFIRM scholarship program, which helps students focused on IT skills... and is the largest support for USCC's summer camp program, which focuses on cybersecurity.

Upcoming Events

SANS Houston 2017 (Houston, Texas, USA, June 5 - 10, 2017) At SANS Houston 2017, SANS offers hands-on, immersion-style security, security management, and pen testing training courses taught by real-world practitioners. The site of SANS Houston 2017, June 5-10,...

Cyber Resilience Summit: Measuring and Managing Software Risk, Security and Technical Debt (Brussels, Belgium, June 6, 2017) The Consortium for IT Software Quality is bringing the Cyber Resilience Summit to Europe, to take place on 6 June 2017 in Brussels, Belgium, the vibrant heart of political Europe and headquarters of the...

National Cyber Security Summit (Huntsville, Alabama, USA, June 6 - 8, 2017) The National Cyber Summit is the preeminent event for cyber training, education and workforce development aimed at protecting our nation’s infrastructure from the ever-evolving cyber threat. The summit...

Infosecurity Europe 2017 (London, England, UK, June 6 - 8, 2017) Infosecurity Europe is the region's number one information security event featuring Europe's largest and most comprehensive conference programme and over 360 exhibitors showcasing the most relevant information...

Cyber 8.0 Conference (Columbia, Maryland, USA, June 7, 2017) Join the Howard County Chamber of Commerce for their 8th annual cyber conference, where they will explore innovation, funding, and growth. Participants can expect riveting discussions from cyber innovators...

2017 ICIT Forum: Rise of The Machines (Washington, DC, USA, June 7, 2017) The 2017 ICIT Forum brings together over 300 cybersecurity executives from across critical infrastructure sectors to receive the latest ICIT research from our experts, share knowledge, develop strategies...

SecureWorld Chicago (Rosemont, Illinois, USA, June 7, 2017) Join your fellow security professionals for high-quality, affordable training and education. Attend featured keynotes, panel discussions, and breakout sessions—all while networking with local peers. Earn...

NYS Cyber Security Conference (Albany, New York, USA, June 7 - 8, 2017) June 2017 marks the 20th Annual New York State Cyber Security Conference and 12th Annual Symposium on Information Assurance (ASIA) and we invite you to join us for this nationally recognized event. Technology's...

RSAC Unplugged (London, England, UK, June 8, 2017) Informal, up close and personal, intimate…that’s RSAC Unplugged. Ignore the background noise and focus on what’s important in information security right now as part of a one-day program focused on excellent...

Insider Threat Program Development / Management Training For NITP-NISPOM CC 2 (Huntsville, Alabama, USA, June 8 - 9, 2017) Insider Threat Defense announced it will hold a 2 day training class on Insider Threat Program (ITP) Development / Insider Threat Risk Management (National Insider Threat Policy (NITP), NISPOM Conforming...

BSides Pittsburgh 2017 (Pittsburgh, Pennsylvania, USA, June 9, 2017) BSides Pittsburgh is part of a global series of community-driven conferences presenting a wide range of information security topics from technical topics, such as dissecting network protocols, to policy...

29th Annual FIRST Conference (San Juan, Puerto Rico, USA, June 11 - 16, 2017) FIRST is an international confederation of trusted computer incident response teams who cooperatively handle computer security incidents and promote incident prevention programs.

21st Colloquium, Cyber Security Education Innovation for the 21st Century (Las Vegas, Nevada, USA, June 12 - 14, 2017) The Colloquium for Information Systems Security Education (CISSE) provides a forum for dialogue among academia, industry and government. Protection of the information and infrastructure used to create,...

ETSI Security Week 2017 (Sophia Antipolis, France, June 12 - 16, 2017) This year's event will address key cybersecurity standardization challenges in the short, medium and longer term. The event will look at the different aspects of cybersecurity underpinning our digital...

Cyber Tech Fairfax (McLean, Virginia, USA, June 13, 2017) Cybertech Fairfax will provide attendees with a unique opportunity to learn about the latest innovations and solutions from the cyber community. It will serve as an incredible B2B platform with a strong...

Cyber Tech Fairfax (McLean, Virginia, USA, June 13, 2017) A thought-provoking conference and exhibition on global cyber threats, solutions, innovations and technologies. At Cybertech Fairfax, high-profile speakers and panelists will focus on the global cyber...

LegalSec Summit 2017 (Arlington, Virginia, USA, June 13 - 14, 2017) Whatever your role in security, there’s something here for you! Hear from experts who will share their experiences related to information security, and develop takeaways to use in your organization. The...

AFCEA Defensive Cyber Operations Symposium (Baltimore, Maryland, USA, June 13 - 15, 2017) Cyber operations are a challenging mission for the U.S. Defense Department and government community that builds, operates and defends networks. Cyber leaders and warriors must continually evolve to adapt...

Global Cybersecurity Summit 2017 (Kiev, Ukraine, June 14 - 15, 2017) During the two-day summit, participants will be exposed to cybersecurity best practices, cutting-edge advancements, and emerging innovations in defensive security across a series of categories, including...

Information Assurance Symposium (Baltimore, Maryland, USA, June 19 - 21, 2017) The Information Assurance Symposium is the premier IA event at which leaders and practitioners share vital information and provide direction and best practices to meet today's challenges in IA and the...

Norwich University Cyber Security Summit (Northfield, Vermont, USA, June 19 - 21, 2017) Norwich University’s College of Graduate and Continuing Studies (CGCS) is pleased to announce the first annual Cyber Security Summit in June 2017. The summit, presented in a continuing education format,...

Hack in Paris (Paris, France, June 19 - 23, 2017) Hack In Paris brings together major professional IT security and technical hacking experts to attend training and talks exclusively in English. Intrusion attempts grow more frequent and sophisticated,...

SANS Minneapolis 2017 (Minneapolis, Minnesota, USA, June 19 - 24, 2017) Get relevant, practical cybersecurity training at SANS Minneapolis 2017 (June 19-24). This event features the information needed to build crucial skills in protecting your organization from the latest...

Naval Future Force Science and Technology Expo (Washington, DC, USA, June 20 - 23, 2017) The Office of Naval Research’s (ONR) biennial 2017 Naval Future Force Science and Technology (S&T) EXPO will take place July 20-21, 2017. The Expo is the premier S&T event for the Navy and Marine Corps...

Borderless Cyber USA (New York, New York, USA, June 21 - 22, 2017) Borderless Cyber is an international, executive-level conference series that began in 2015. It’s designed to bring together the private sector and policy makers to evaluate, debate, and collaborate on...

Grow your brand and reach new customers.

Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.

Be a part of the CyberWire story.

People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.