skip navigation

More signal. Less noise.

Check out the Cyber Job Fair, April 19 in San Antonio.

Cleared and non-cleared cybersecurity pros make your next career move at the Cyber Job Fair, April 19 in San Antonio. Meet leading cyber employers including Bank of America, Parsons, Engility, Fulcrum and more. Visit ClearedJobs.Net or for details. 

Daily briefing.

As Facebook CEO Mark Zuckerberg moves from the Senate's frying pan to the House's fire, it appears that Facebook permissions allowed some apps to read messages between some users and their friends ("friends" in the sense of the Facebook term of art, not in the sense of people with whom one is connected by natural affection).

Yesterday's testimony appears to have won the social media platform few friends on either the left (Senator Cantwell looking for connections to Palantir) or the right (Senator Cruz suggesting that Facebook's a progressive monoculture). The Senators' performance strikes much of the industry press as revealing interesting gaps in the lawmakers' familiarity with technology. (In fairness to the Senators, they're not the only ones who have trouble grasping how Facebook handles data—WIRED thinks most users are in the same boat.)

Mr. Zuckerberg indicated willingness to accept closer Government regulation of social media. He also said artificial intelligence should have hate speech under control within ten years.

Patch Tuesday addressed sixty-six Microsoft bugs. One is an unusual keyboard issue; another is a SharePoint vulnerability that Redmond says hasn't been exploited in the wild despite its having leaked in advance of the patch.

Editorialists urge the EU to get serious about sanctioning Russia, support for Assad in Syria being the country's most recent offense. Attacks on infrastructure by Russian operators are still widely expected. Some US officials in and around NSA and US Cyber Command hint not-so-darkly about an ability to hold Russian infrastructure at risk.


Today's issue includes events affecting Australia, Brazil, European Union, Hungary, India, Mexico, Pakistan, Russia, Sint Maarten, United Kingdom, United States.

Headed to RSA? Get a free pass expo pass on LookingGlass!

RSA can be hectic, but we’ll make putting together your schedule easy for you. If want to know the latest trends and technology in cybersecurity and threat intelligence, look no further than LookingGlass Booth #100 in the South Hall. We offer solutions – not more work – for your toughest security challenges. Come meet with us on the Expo floor or at our meeting suite in the Marriott – enjoy the discussion, demos, and refreshments. Get your free pass here.

In today's podcast we hear from our partners at Accenture, as Justin Harvey discusses cyber hygiene blind spots. Our guest, Nahuel Sanchez from Onapsis, makes everyone's flesh creep with tales of vulnerable password recovery systems.

Wombat Security at RSA Conference 2018 (San Francisco, California, United States, April 16 - 20, 2018) Cyberthreats lurk around every corner. Visit our booths at RSA to ensure you are providing your team with the tools they need to be cybersecurity heroes in your organization: South Expo 1033 and North Expo 4701. We’ll be presenting: a sneak peek at our new superhero-themed Awareness Video Campaigns; a free copy of our security awareness comic book, and previews of our newest training modules, including GDPR, Insider Threats, and Password Policy.

XM Cyber is coming to RSA (San Francisco, California, United States, April 16 - 20, 2018) Visit XM Cyber at the Israeli Pavilion, South Hall booth 635, to experience the first automated APT simulation platform to expose, assess and amend every attack path to organizational critical assets.

Cyber Job Fair, April 19, San Antonio visit ClearedJobs.Net or for details. (San Antonio, Texas, United States, April 19, 2018) Cleared and non-cleared cybersecurity pros make your next career move at the Cyber Job Fair, April 19 in San Antonio. Meet leading cyber employers including Bank of America, Parsons, Engility, Fulcrum and more. Visit ClearedJobs.Net or for details.

HackNYC2018 (New York, New York, United States, May 8 - 10, 2018) Cyber attacks are often called non-violent or non-kinetic attacks, but the simple truth is that there is a credible capability to use cyber attacks to achieve kinetic effects. Kinetic Cyber refers to a class of cyber attacks that can cause direct or indirect physical damage, injury or death solely through the exploitation of vulnerable information systems and processes. Use code CWIRE20 for 20% off the $50.00 individual ticket price.

Cyber Attacks, Threats, and Vulnerabilities

Cambridge Analytica Could Have Also Accessed Private Facebook Messages (WIRED) A Facebook permission allowed an app to read messages between 1,500 Facebook users and their friends until October 2015—data that Cambridge Analytica could have accessed.

Here's what you need to know before Mark Zuckerberg's testimony in Washington (Popular Science) Mark Zuckerberg will talk user data, Russian meddling, and possible regulations

Facebook and the Price of Tech Utopia (WIRED) Was everything users gained from Facebook worth what they gave up?

Steve Wozniak explains why he deactivated his Facebook account (Naked Security) As his 5,000 Facebook friends are about to find out, Apple co-founder Steve Wozniak has well and truly left the building.

How Pizza Night Can Cost More in Data Than Dollars (Wall Street Journal) Even a low-key evening at home can mean handing over a trove of personal information to high-tech companies

Most Americans Feel They've Lost Control Of Their Online Data (WAMU) Firms like Facebook use a business model that makes use of people's data. But not all data is created equal. Sharing purchasing habits? Most say that's OK. But private communications? No way.

Reddit's most popular meme forum was a hangout spot for Russian propaganda trolls (Quartz) The company's CEO revealed that r/funny, the site's second most popular subreddit, contained the largest number of posts from accounts linked to Russia's Internet Research Agency.

The Era of Fake Video Begins (The Atlantic) The digital manipulation of video may make the current era of “fake news” seem quaint.

Attackers Exploit Cisco Switch Issue as Vendor Warns of Yet Another Critical Flaw (Dark Reading) Cisco says companies fixing previously known protocol issue should also patch against critical remote-code execution issue.

Brazil's Critical Infrastructure Faces a Growing Risk of Cyberattacks (Council on Foreign Relations) Most of the world's critical infrastructure—nuclear plants, electrical transmission systems, water treatment plants, etc.—is managed by internet-connected hardware and software that makes them vulnerable to cyberattacks.

"Impregnable" radar breached in simulated cyber attack (Marine Electronics and Communication) The nightmare scenario cannot be ignored, says editor Martyn Wingrove. Ethical hackers have now proven radar and other bridge systems are vulnerable

Death in paradise: 'Cyber attack' takes out national government's IT (Register) Half of a tiny Caribbean island, population 42,000, but still

Report: Internet ‘noise’ can mask increasing dangers to federal networks (Fifth Domain) A complex mix of traffic and services on federal networks provides hackers with an increasing number of exploitable opportunities as the government migrates to the cloud, a Cisco report found.

Careful what you wish for: Alexa may be eavesdropping (Times) Amazon’s Alexa is supposed to listen only when you call her name but she could soon be getting a lot nosier, with plans to eavesdrop on conversations and “whisper” shopping suggestions. The...

Mobile phishing: The biggest unsolved problem in cybersecurity (Lookout) Mobile phishing brings together new channels for phishing employees (such as messaging apps and SMS) and reduced screen size, causing one of the biggest problems businesses have faced in cybersecurity yet.

8 ways a supply chain raises cyber security risks (Health Data Management) For starters, providers may not have control over security related to the manufacturing process.

Security Patches, Mitigations, and Software Updates

Adobe, Microsoft Push Critical Security Fixes (KrebsOnSecurity) Adobe and Microsoft each released critical fixes for their products today, a.k.a “Patch Tuesday,” the second Tuesday of every month. Adobe updated its Flash Player program to resolve a half dozen critical security holes. Microsoft issued updates to correct at least 65 security vulnerabilities in Windows and associated software.

Microsoft April Patch Tuesday Fixes 66 Security Issues (BleepingComputer) Earlier today, Microsoft released its monthly roll-up of security patches known as Patch Tuesday, and this month, the Redmond-based OS maker has fixed 66 security issues.

It's April 2018 – and Patch Tuesday shows Windows security is still foiled by fiendish fonts (Register) Adobe's Flash also up the spout

Cyber Trends

The NGFW is Dead (Security Boulevard) The NGFW is Dead Let’s get this out of the way – the next-generation firewall (NGFW) is dead. In ten years, the NGFW will be reduced to a glorified router. The cloud is the prime suspect in the NGFW’s death. The shroud of death and decay are all around the NGFW products. They are bloated, The post The NGFW is Dead appeared first on Anitian.

Cybersecurity Perspectives 2018: The Data Breach Effect (Scale Venture Partners) On March 2, 2018, Equifax provided updates related to its 2017 breach...

2018 Cybersecurity Perceptions & Practices (Logrhythm) See insights from hundreds of IT decision makers across the U.S., U.K., and Asia-Pacific regions regarding the state of their teams’ security maturity.

'Machine learning is the big one': Deloitte expert looks to the future of tech trends (CNBC) The dominant tech trend in places like Southeast Asia will be machine learning, according to a researcher from Deloitte.


Expel Raises $20M Series B For Customer Cybersecurity (Crunchbase News) B2B cybersecurity platform Expel announced today that it raised a $20 million Series B led by Silicon Valley-based Scale Venture Partners. New Enterprise Associates, Battery Ventures, Greycroft, and other venture capital firms also participated in the round.

Palo Alto Networks to buy endpoint detection and response startup Secdo (CRN Australia) To bolster its data collection and visualisation capabilities.

Government launches new London Cyber Innovation Centre (Government Computing Network) Former head of GCHQ Robert Hannigan will lead the centre’s industry advisory board

Fidelis Cybersecurity Names Former NetWitness Founder and eSentire Executive Chairman Nick Lantuh as President and CEO (Fidelis Cybersecurity) Cybersecurity Veteran to Spearhead Growth Strategy for Automated Detection and Response Company

CyberSN Expands Sales Leadership Team by Appointing Jason DeAmato as Vice President of Sales Training (Benzinga) CyberSN Expands Sales Leadership Team by Appointing Jason DeAmato as Vice President of Sales Training ,#1 Amazon Bestselling sales author, Former Director of Sales Training at...

Intercede chief executive steps down after 26 years (East Midlands) He moves to become a non-exec

Infoblox appoints Cherif Sleiman as SVP for International Business (Tahawul Tech) Infoblox has announced the appointment of Cherif Sleiman as Senior Vice President (SVP) International Business, responsible for driving business growth in international markets.

Quick Heal Technologies appoints Ms. Priti Rao to Board of Directors (Equity Bulls) Quick Heal Technologies appoints Ms. Priti Rao to Board of Directors

Products, Services, and Solutions

Duo Security and Akamai Partner to Create a Zero-Trust Ecosystem for Remote Workers (Duo Security) The solution eliminates the need for traditional remote user Virtual Private Networks (VPNs) and significantly improves security for organizations

Introducing ObserveIT 7.5: A Modern Approach for a Post-DLP World ObserveIT (ObserveIT) ObserveIT 7.5, the newest version of our insider threat solution, offers new features to help your security team identify, investigate and eliminate insider threats. This further advances our approach to insider threat detection and prevention in the post-DLP world. Learn about the new capabilities!

The Chertoff Group Unveils New Ransomware Readiness Assessment, Empowering Organizations to Defend Against Ransomware Attacks (Chertoff Group) The Chertoff Group is a premier global advisory firm focused exclusively on the security and risk management sector..

SafeBreach Expands Visa Partnership for Deeper Threat Intelligence Integration in Breach and Attack Simulation (GlobeNewswire News Room) Extension of Market First Capability Empowers Payment Industry Unparalleled Speed and Agility in Attack Prevention; Partnership on Display at RSA Conference 2018

DNSWatch is Now Available (WatchGuard) Phishing is one of the greatest threats facing small and midsize enterprise organizations today. WatchGuard DNSWatch service provides additional security to protect users at the DNS level, and adds a layer to RED and WebBlocker capabilities to block malicious connections on all ports and protocols – including those necessary during a phishing attack. 

Portnox Brings Increased Network Visibility and Enforcement with TrapX Integration (BusinessWire) Portnox, a market leader for network visibility, access control and device risk management solutions, and TrapX Security, the global leader in decepti

ThreatConnect, Inc. Ramps Up Its Technology Partner Program In Q1 Most Recent Integrations Include Tenable, FireEye, ArcSight and ReversingLabs (ThreatConnect) ThreatConnect, Inc.©, provider of the industry's only extensible, intelligence-driven security platform, announces it has added four key technology partner applications with Tenable, FireEye, ArcSight, and ReversingLabs. These applications and integrations are now part of the more than 350 existing integrations available in the ThreatConnect Platform.

Origin Protocol + NuCypher: Private Data on a Public Blockchain (Medium) I am astounded by what today’s biggest sharing economies like AirBnB and Uber have accomplished, allowing someone to share their home or…

M-Files : solutions de gestion intelligente de l'information (M-Files) Avec la gestion intelligente de l'information M-Files, les entreprises trouvent, partagent et sécurisent les documents et les informations.

Next-Generation HSMs from Utimaco Deliver Stronger Cloud Security and Pave the Way for Post-Quantum Cryptography (BusinessWire) Next-generation HSMs from Utimaco Deliver Stronger Cloud Security and Pave the Way for Post-Quantum Cryptography

Comodo Adds Free Security Features to Management Platform (Channel Partners) Comodo is looking to tap into that potential market by offering something that might very well be irresistible to MSPs — a centralized IT management platform that supports the addition of security services, all at a price that any MSP can afford. Qualified MSPs can get the Comodo One management platform, referred to as C1, for free, the company recently announced.

Coin Mining Malware and What Akamai Can do About It (Security Boulevard) It has been a busy few months for crypto-mining!...

Jetico Kicks off New Campaign to Help with GDPR Compliance (BusinessWire) On May 25th, the General Data Protection Regulation (GDPR) will be enforced, and the fines will start rolling in for organizations which are not yet c

IBM beefs up server security with new z14 (WRAL TechWire) IBM's server lines have historically been known for being higher performing than their x86 counterparts, and wih the unveiling of the z14, they are investing in improving their reputation for even greater security capabilities achieved through pervasive encryption.

Hartford unveils cyber response policy (Business Insurance) The Hartford Financial Services Group Inc. has introduced CyberChoice First Response, a policy designed to help protect businesses against cyber attacks.

Splunk turns data processing chops to Industrial IoT (TechCrunch) Splunk has always been known as a company that can sift through oodles of log or security data and help customers surface the important bits. Today, it announced it was going to try to apply that same skill set to Industrial Internet of Things data. IIoT is data found in manufacturing settings, typ…

Technologies, Techniques, and Standards

FIDO2: Authenticate easily with phishing-resistant security (Help Net Security) The FIDO2 specifications collectively enable users to authenticate easily to online services with desktop or mobile devices with phishing-resistant security.

Analysis of a Multi-stage Document Attack (Menlo Security) A malicious document is sent as an attachment in a phishing or spearphishing email. It only includes an embedded URL, with no malevolent code, enabling it to evade existing security solutions, like sandboxes and AV. The URL leverages an exploit, downloading malware to the user’s device. This is how a multi-stage attack, increasing in popularity and use by attackers, is launched.

The value of 20/20 hindsight in cybersecurity (CSO Online) Security will find indications of compromise revealed in public disclosures exponentially more valuable if they find a way to go back and compare historical data against the new intelligence.

There's security – then there's barbed wire-laced pains in the arse (Register) How do you strike a balance with compliance and UX?

Four Key Elements Of An Anti-Phishing Program (Secplicity - Security Simplified) The news is regularly filled with headlines of another big breach. For example, recently millions of customers at Saks and Lord & Taylor stores were affected by a breach. While it is still under investigation, initial reports point to it being the result of a phishing attack. It’s not surprising that hackers use this approach …

Marines bringing cyber to the fight, commander says (Defense News) The Marine Corps is experimenting with how it adds cyber warriors at the tactical edge, to be better prepared for a modern fight, according to the chief of Marine Forces Cyberspace Command.

How ODNS keeps your browsing habits secret (Naked Security) “Oblivious DNS” keeps your DNS traffic private without retooling the internet

Research and Development

DoD official: US not part of AI arms race (C4ISRNET) Dr. Michael Griffin, the under secretary of defense for research and engineering, has expressed concern that Pentagon acquisition practices are causing the U.S. to fall behind in emerging technologies such as artificial intelligence.

DARPA official: To build trust in AI, machines must explain themselves (Defense News) A DARPA official described the the inexplicable algorithms powering artificial intelligence as a strain on human-machine relationships.


Crypto-Education Soaring High Thanks to Big-Name Universities Like Stanford, CMU and UW (CryptoSlate) Ever since Bitcoin started gaining widespread media traction a couple of years back, educational institutions all across the globe have been taking notice of this sector and have begun offering students with specially tailored programs that will give their digital careers a good head-start.

WPI Professor Debuts Start-up Company at RSA Security Conference (WPI) With the backing of the Department of Homeland Security (DHS), a WPI computer science professor is gearing up to show off his network security start-up at one of the world’s largest and most influential cyber security conferences.

Lewis University Wins DOE’s 2018 Cyber Defense Competition ( Lewis University Wins DOE’s 2018 Cyber Defense Competition

NSU doubles space allotted to cybersecurity (Virginian-Pilot) A grand opening April 23 will celebrate the 6,300-square-foot Cybersecurity Complex on the sixth floor of the Marie V. McDemmond Center for Applied Research.

Legislation, Policy, and Regulation

The EU must get serious about Russian sanctions (Times) The Russians are rattled, not so much by the war drums beating in the White House as by an extraordinary range of US sanctions that target the very essence of Vladimir Putin’s state. One Russian...

NSA official: U.S. has yet to hit Russia back 'where it hurts' for cyber aggression (Cyberscoop) Natalie Laing, the deputy director of operations at the NSA, said that the U.S. doesn't "yet have the political fortitude to say how we'll strike back."

Military Set for Cyber Attacks on Foreign Infrastructure (Washington Free Beacon) America is ready to shut critical infrastructures in China and Russia during a future conflict by conducting cyber intrusions into their networks.

The U.S. still doesn’t have a cybersecurity doctrine (Axios) The country's ability to fight back against cyberattacks is limited.

ASD to review Australia's cybersecurity and 'drive out known problems' (ZDNet) New Australian Signals Directorate chief Mike Burgess outlines his priorities for the restructured agency's next 12 months.

Big brother, robot overlords and intelligence acquisition reform (C4ISRNET) The slow pace of acquisition isn't the government's only problem buying new technology.

States to Game Out Election Threats in Homeland Security Drills ( The Department of Homeland Security is giving states, including Colorado and Texas, a chance to game out how they might respond to a cyberattack on election systems ahead of this year’s midterm vote.

TRANSCOM chief calls on Congress for national cybersecurity standard ( U.S. Transportation Command leader Gen. Darren McDew said Congress needs to bridge the cybersecurity gap.

Thomas Bossert, Trump’s Chief Adviser on Homeland Security, Is Forced Out (New York Times) A day after John R. Bolton went to work as national security adviser, he began shaking up the Trump administration’s national security ranks, ousting President Trump’s chief adviser on homeland security, Thomas P. Bossert.

Trump’s homeland security adviser resigns (Federal Times) Tom Bossert, who joined the White House as homeland security adviser the first day of the Trump administration, will leave the post after just over a year in it.

Litigation, Investigation, and Law Enforcement

Zuckerberg Faces Criticism From Congress at Facebook Hearing—Live Analysis (Wall Street Journal) Live updates and analysis of the Capitol Hill testimony by Facebook CEO Mark Zuckerberg.

Congress grills Zuckerberg, day one: How does this online stuff work? (Naked Security) On Tuesday, senators began their questioning of the virgin-to-Congressional-grilling, Mark Zuckerberg.

Watch Zuckerberg Struggle to Answer Sharp, Uncomfortable Questions About Peter Thiel’s Creepy Company (Slate Magazine) Sen. Maria Cantwell tried to tease out a really important thread.

Mark Zuckerberg's Privacy Shell Game (WIRED) In his testimony to Congress, Facebook CEO Mark Zuckerberg repeatedly misrepresented the amount of control Facebook users really have over their data.

If Congress Doesn't Understand Facebook, What Hope Do Its Users Have? (WIRED) The basic lines of questioning Congress pursued show just how inscrutable Facebook remains to most Americans.

Facebook boss Mark Zuckerberg agrees to tighter regulation (Times) Mark Zuckerberg, the Facebook chief, agreed last night to greater regulation of his company in response to a huge leak of personal information from the social network. He made the concession as it...

Mark Zuckerberg is confident he can “protect the integrity” of the 2019 Indian elections (Quartz) In less than a year, more than 133 million first-time voters are expected to take to the polls in the world’s largest democracy.

Mark Zuckerberg just gave a timeline for AI to take over detecting internet hate speech (Quartz) "Until we get it automated, there's a higher error rate than I'm happy with."

Putin says hopes chemical watchdog meeting can put end to Skripal row (Reuters) Russian President Vladimir Putin said on Tuesday he hoped a planned meeting of the global chemical weapons watchdog would help to defuse a major diplomatic row triggered by the poisoning of a former Russian double agent in England.

For a complete running list of events, please visit the Event Tracker on the CyberWire website.

Newly Noted Events

CyberTexas 2018 (San Antonio, Texas, USA, August 14 - 15, 2018) The 2018 CyberTexas Conference will bring members of the CyberUSA community together with industry and government members of Texas to create long-term values for the cybersecurity ecosystem in San Antonio...

CyberMaryland 2018 (Baltimore, Maryland, USA, October 9 - 10, 2018) The CyberMaryland Conference is an annual two-day event presented jointly by The National Cyber Security Hall of Fame and Federal Business Council (FBC) in conjunction with academia, government and private...

Upcoming Events

ISC West 2018 (Las Vegas, Nevada, USA, April 11 - 13, 2018) ISC West is THE largest security industry trade show in the U.S. At ISC West, you will have the chance to network with over 30,000 security professionals through New Products & Technologies encompassing...

Decompiling the Government: Getting Technologists and Policymakers to Speak the Same Language (Arlington, Virginia, USA, April 12, 2018) With the support of the Hewlett Foundation, the National Security Institute is excited to host “Decompiling the Government: Getting Technologists and Policymakers to Speak the Same Language.” This networking...

CYBERTACOS San Francisco (San Francisco, California, USA, April 16, 2018) CYBERTACOS is back and becoming one of the biggest cybersecurity networking events! Register today and join us for networking, food and drinks. This event includes a 45-minute meet the press panel made...

RSA Conference 2018 (San Francisco, California, USA, April 16 - 20, 2018) Take this opportunity to learn about new approaches to info security, discover the latest technology and interact with top security leaders and pioneers. Hands-on sessions, keynotes and informal gatherings...

Our Security Advocates (San Francisco, California, USA, April 17, 2018) OUR Security Advocates highlights a diverse set of experts from across information security, safety, trust, and other related fields. OURSA is a single-track, one-day conference with four topic sessions.

5th Annual Cybersecurity Summit (McLean, Virginia, USA, April 24, 2018) Join the Potomac Officers Club for the Fifth Annual Cybersecurity Summit to hear from public and private sector leaders on how federal agencies can improve their respective data security measures.

Secutech (Taipei, Taiwan, April 25 - 27, 2018) To meet the rising demand for intelligent and customised solutions, Secutech converges security and safety, ICT, IoT, artificial intelligence, big data, edge computing, intelligent video analytics and...

Industrial Control Systems (ICS) Cyber Security Conference Asia (Singapore, April 25 - 27, 2018) The Central ICS/SCADA Cyber Security Event of the Year for the APAC Region. Three days of multi-track training & workshops for days for operations, control systems and IT security professionals to connect...

INFILTRATE (Miami Beach, Florida, USA, April 26 - 27, 2018) INFILTRATE is a "pure offense" security conference aimed at the experienced to advanced practitioner. With the late-90s hacker con as its inspiration, the event has limited attendance in order to foster...

Automotive Cybersecurity Summit 2018 (Chicago, Illinois, USA, May 1 - 8, 2018) Smart Vehicles. Smart Infrastructures. The 2nd annual Automotive Cybersecurity Summit brings together public and private-sector manufacturers, suppliers, assemblers, technology providers and V2X partners...

Application of the Law of War to Cyber Operations (Washington, DC, USA, May 3, 2018) Cyber law experts meeting at the George Washington University will cover Title 10 vs. Title 32 vs. Title 50 and the lawful and operational restrictions related to these authorities. The panelists will...

Global Cyber Security in Healthcare & Pharma Summit (London, England, UK, May 3 - 4, 2018) The number of cyber-attacks in healthcare is on the rise, and the industry must do more to prevent and respond to these incidents. The Global Cyber Security in Healthcare & Pharma Summit 2018 will bring...

Secure Summit DC (Washington, DC, USA, May 7 - 8, 2018) (ISC)² Secure Summit DC will assemble the best minds in cybersecurity for two days of insightful discussions, workshops and best-practices sharing. The goal of the event is to equip security leaders to...

HACKNYC (New York, New York, USA, May 8 - 10, 2018) The recent flood of data breach news may numb us to the threat of attacks with kinetic effects--direct or indirect physical damage, injury, or death. Hack NYC focus’ on our preparation for, and resilience...

Insider Threat Program Management With Legal Guidance Training Course (Herndon, Virginia, USA, May 8 - 9, 2018) This training will provide the ITP Manager, Facility Security Officer, and others (CIO, CISO, Human Resources, IT, Etc.) supporting an ITP, with the knowledge and resources to develop, manage, or enhance...

SecureWorld Kansas CIty (Kansas City, Missouri, USA, May 9, 2018) Connecting, informing, and developing leaders in cybersecurity. SecureWorld conferences provide more content and facilitate more professional connections than any other event in the Information Security...

Cyber Investing Summit (New York, New York, USA, May 15, 2018) Now in its third year, the Cyber Investing Summit is an all-day conference focusing on investing in the cyber security industry, which is predicted to exceed $1 trillion in cumulative spending on products...

Third Annual Cyber Investing Summit (New York, New York, USA, May 15, 2018) Renowned cyber security executive David DeWalt will deliver the keynote address at the Third Annual Cyber Investing Summit. The Cyber Investing Summit is a unique all-day conference focused on the financial...

The Cyber Security Summit: Dallas (Dallas, Texas, USA, May 15, 2018) This event is an exclusive conference connecting Senior Level Executives responsible for protecting their company’s critical data with innovative solution providers & renowned information security experts.

Digital Utilitites Europe (Amserdam, the Netherlands, May 16 - 17, 2018) The conference will bring together key industry stakeholders to address the current challenges of the digitisation in the utilities sector. Join us in Amsterdam to hear latest business case studies and...

SecureWorld Houston (Houston, Texas, USA, May 17, 2018) Connecting, informing, and developing leaders in cybersecurity. SecureWorld conferences provide more content and facilitate more professional connections than any other event in the Information Security...

Ignite18 (Anaheim, California, USA, May 21 - 24, 2018) Palo Alto Networks' sixth annual conference features highly technical insights based on firsthand experiences with next-generation security technologies, groundbreaking new threat research, or innovative...

PCI Security Standards Council’s Asia-Pacific Community Meeting (Tokyo, Japan, May 23 - 24, 2018) Join us for: networking opportunities, updates on industry trends, insights and strategies on best practices, engaging keynotes and industry expert speakers. The PCI Security Standards Council’s 2018...

North American Financial Information Summit (New York, New York, USA, May 23, 2018) Data is the most vital asset of any financial services firm. With volumes increasing exponentially, and the complexity and structure continuously changing, it is more vital than ever to keep on top of...

Grow your brand and reach new customers.

Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.

Be a part of the CyberWire story.

People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.