skip navigation

More signal. Less noise.

Check out the Cyber Job Fair, April 19 in San Antonio.

Cleared and non-cleared cybersecurity pros make your next career move at the Cyber Job Fair, April 19 in San Antonio. Meet leading cyber employers including Bank of America, Parsons, Engility, Fulcrum and more. Visit ClearedJobs.Net or CyberSecJobs.com for details. 

Daily briefing.

North Korean destructive malware with features not seen since the 2014 Sony Pictures hack is believed to have returned, according to documents obtained by Foreign Policy.

Germany cautiously attributes a campaign against the Federal Republic's government and political networks to Russian state actors. Bundesamt für Verfassungsschutz chief Hans-Georg Maassen says they can't be sure it was Fancy Bear (Russia's GRU) and that the unlikely possibility of a false flag operation can't entirely be ruled out, but that they regard their attribution of the attacks to Russia as having "high confidence."

A Secure World Foundation report concludes that cyber attacks against satellites are likelier than kinetic destruction. The report discerns signs of growing Chinese and Russian interest in this mode of attack. Interestingly, it conceives of the risk as largely a supply-chain problem, with Russian or Chinese suppliers of code and subcomponents building exploitable vulnerabilities into the satellites whose manufacture and operation rely on a globalized network of suppliers.

Cyberbit reports finding what it calls a new "early bird" code injection technique in which malicious code runs prior to a process's main thread. This enables attacks to bypass many antivirus protections. The technique appears in the Iranian threat group APT33's TurnedUp backdoor, in Carberp banking malware, and in DorkBot.

Britain's GCHQ says it conducted offensive cyber action against ISIS, successfully disrupting the terrorist group's operations and propaganda.

Facebook CEO Zuckerberg testified before the US House yesterday, deflecting suggestions that Facebook collect less information: "it's complicated," as so many relationship status are.

Notes.

Today's issue includes events affecting China, European Union, Germany, Iran, Democratic People's Republic of Korea, Russia, Syria, United Kingdom, United States.

A note to our readers: RSA is next week, and the CyberWire will be there. If you'll be at San Francisco's Moscone Center, too, stop by and say hello to the CyberWire team. We'll be at the Akamai booth, #3625 in the North Hall. We hope to see you there (and thanks to Akamai for their kind hospitality).

Headed to RSA? Get a free pass expo pass on LookingGlass!

RSA can be hectic, but we’ll make putting together your schedule easy for you. If want to know the latest trends and technology in cybersecurity and threat intelligence, look no further than LookingGlass Booth #100 in the South Hall. We offer solutions – not more work – for your toughest security challenges. Come meet with us on the Expo floor or at our meeting suite in the Marriott – enjoy the discussion, demos, and refreshments. Get your free pass here.

In today's podcast, we talk with our partners at Booz Allen Hamilton, as  Chris Poulin discusses one aspect of self-driving car technology: systems that monitor the drivers' gaze to make sure they're paying attention to the road. Our guest, Oren Falkowitz from Area 1 Security, takes a look at the Atlanta ransomware incident.

Wombat Security at RSA Conference 2018 (San Francisco, California, United States, April 16 - 20, 2018) Cyberthreats lurk around every corner. Visit our booths at RSA to ensure you are providing your team with the tools they need to be cybersecurity heroes in your organization: South Expo 1033 and North Expo 4701. We’ll be presenting: a sneak peek at our new superhero-themed Awareness Video Campaigns; a free copy of our security awareness comic book, and previews of our newest training modules, including GDPR, Insider Threats, and Password Policy.

XM Cyber is coming to RSA (San Francisco, California, United States, April 16 - 20, 2018) Visit XM Cyber at the Israeli Pavilion, South Hall booth 635, to experience the first automated APT simulation platform to expose, assess and amend every attack path to organizational critical assets.

Cyber Job Fair, April 19, San Antonio visit ClearedJobs.Net or CyberSecJobs.com for details. (San Antonio, Texas, United States, April 19, 2018) Cleared and non-cleared cybersecurity pros make your next career move at the Cyber Job Fair, April 19 in San Antonio. Meet leading cyber employers including Bank of America, Parsons, Engility, Fulcrum and more. Visit ClearedJobs.Net or CyberSecJobs.com for details.

HackNYC2018 (New York, New York, United States, May 8 - 10, 2018) Cyber attacks are often called non-violent or non-kinetic attacks, but the simple truth is that there is a credible capability to use cyber attacks to achieve kinetic effects. Kinetic Cyber refers to a class of cyber attacks that can cause direct or indirect physical damage, injury or death solely through the exploitation of vulnerable information systems and processes. Use code CWIRE20 for 20% off the $50.00 individual ticket price.

Cyber Attacks, Threats, and Vulnerabilities

North Korean Destructive Malware Is Back, Says DHS Report (Foreign Policy) Malware not seen since the 2014 attack on Sony has returned, raising the possibility of future destructive attacks.

Moscow likely behind hack on German govt, spy chief says (Reuters) Germany's head of domestic intelligence said on Wednesday there was a "high likelihood" that the Russian government was behind a cyber attack on German computer networks, although he conceded it was difficult to be 100-percent certain.

The sneaky ways China and Russia could threaten US satellites (C4ISRNET) Kinetic attacks in space are still possible, but nations are looking more towards electronic warfare and cyber attacks, a report has concluded.

Global Counterspace Capabilities (Secure World) Space security has become an increasingly salient policy issue.

New 'Early Bird' Code Injection Technique Discovered (Cyberbit) Cyberbit malware researchers discovered a new code injection technique that allows execution of malicious code before the entry point of the main thread of a process, hence – it can bypass security product hooks if they are not placed before the main thread has its execution resumed.

Thousands of hacked websites are infecting visitors with malware (Ars Technica) Unusually advanced campaign infects people visiting a variety of poorly secured sites.

2.5 billion crypto mining attempts detected in enterprise networks (Help Net Security) The volume of cryptomining transactions has been steadily growing since CoinHive came out with its browser-based cryptomining service in September 2017. Enterprise networks are being impacted in various ways.

New ransomware locks files & asks victims to play PUBG game (HackRead) Another day, another ransomware scam but this one is harmless since all you need is to play PUBG game to get your files back.

#CyberUK18: NSA Claims Attack Tactics Rarely Change (Infosecurity Magazine) Attacks are enabled by adversaries using unsophisticated means

Quant Loader Trojan Spreads Via Microsoft URL Shortcut Files (Threatpost) Researchers are warning of a new email phishing campaign that launches a trojan capable of distributing ransomware and stealing passwords.

A Phisher's View of Phishing: U-Admin 2.7 Phishing Control Panel (SANS Internet Storm Center) A few months ago we had an investigation regarding an ongoing phishing attack. While researching the case we encountered the U-admin control panel, version 2.7 and we were able to collect the source code for the panel.

What We Know And Don’t Know About Election Hacking (FiveThirtyEight) Also, what we don’t know we don’t know.

An apology to my Facebook followers (Graham Cluley) Quitting Facebook is hard enough for many people, I don’t want to give anybody another reason to stay.

2.6 billion records were stolen, lost or exposed worldwide in 2017 (Help Net Security) Gemalto released the latest findings of the Breach Level Index, revealing that 2.6 billion records were stolen, lost or exposed worldwide in 2017, an 88% increase from 2016.

Security Patches, Mitigations, and Software Updates

AMD Rolls Out Spectre Fixes (Threatpost) AMD notified users about new available Spectre CPU firmware and Windows 10 patches.

Windows security: Microsoft patch for Outlook password leak bug 'not a full fix' (ZDNet) Attackers can make Outlook leak password hashes just by previewing an RTF-formatted email.

Cyber Trends

CISOs’ Toughest Dilemma: Prevention Is Faulty, yet Investigation Is a Burden (Bitdefender) A Bitdefender survey on IT security purchase professionals from large companies in the US and Europe

Key obstacles in enterprise security budgeting (Help Net Security) An insightful IANS research report outlines key obstacles in enterprise security budgeting, and offers advice for CISOs worldwide.

Netsparker GDPR Survey: 10 Percent of C-Level Security Execs Say GDPR Will Cost Them $1M+ (Netsparker) Data also reveals healthcare and finance industries most resistant to GDPR

Stealing Critical Data All in a Day's Work for Hackers: Nuix Black Report (PR Newswire) Nuix (www.nuix.com), a cybersecurity, risk, and compliance software...

Marketplace

Why the Navy wants more of these hard-to-find software developers (Defense News) While the Navy has stood up a direct commissioning program for software engineers, it has only commissioned 25 officers since 2011.

Canberra companies take world-leading local technology global (Canberra Times) Canberra companies partner to create world-first cyber threat detection system, which generates fake targets to confuse and trap attackers.

WISeKey Appoints Jean-Pierre Pennacino as Chief Operating Officer and Alexander Zinser as Chief Legal Officer (Nasdaq) WISeKey International Holding SA / WISeKey Appoints Jean-Pierre Pennacino as Chief Operating Officer and Alexander Zinser as Chief Legal Officer . Processed and transmitted by Nasdaq Corporate Solutions. The issuer is solely responsible for the content of this announcement.

Averon Welcomes Leading Tech Figures John Hjelmstad and James Kondo to Its Advisory Board (PR Newswire) Averon announces that John Hjelmstad and James Kondo have joined the...

Cambridge Analytica’s acting CEO steps down (TechCrunch) Welp. While Mark Zuckerberg gets the grilling of a lifetime on Capitol Hill, the firm at the center of all of this is losing its top (if temporary) executive. As day two of the Facebook testimony was unfolding, Cambridge Analytica sent out a brief statement from its Board of Directors, noting that …

Products, Services, and Solutions

Illumio and Qualys Integrate Their Solutions to Deliver the Industry’s First Vulnerability-Based Micro-Segmentation (Illumio) Illumio and Qualys Integrate Their Solutions to Deliver the Industry’s First Vulnerability-Based Micro-Segmentation

IP Services' Washington Bankers Association Endorsed Solution Helps Banks Provides Data Security While Maintaining IT System Availability and Reliability (PR Newswire) Washington Bankers Association (WBA) Professional Services, Inc. (PROS),...

A10 Networks Announces Ultra-high Capacity Software Solutions for SDN and NFV Deployments (BusinessWire) A10 Networks (NYSE: ATEN), a provider of intelligent and automated cybersecurity solutions, today announced ultra-high capacity software solutions in

Waratek to Demo Lightweight Application Patching Agent at RSA (PR Newswire) Waratek, the virtualization-based application security company,...

SonicWall Defends Businesses, Users from Memory-Based Attacks and Zero-Day Malware, Including Malicious PDFs and Office Documents (BusinessWire) SonicWall expands the capabilities of the patent-pending SonicWall Real-Time Deep Memory Inspection (RTDMI) technology.

Imperva doubles its presence in Russia with IXcellerate (Capacity Media) Imperva, the US-based cyber security company, has doubled its presence in Russia at IXcellerate’s Moscow One data centre.

Radware Receives Multi Million Dollar Deal From a Leading Cloud Provider (GlobeNewswire News Room) Radware® (NASDAQ:RDWR), a leading provider of cyber security and application delivery solutions, today announced that a leading global cloud provider has signed a multi-million dollar deal with Radware for data center security services and subscriptions to protect its global infrastructure.

IBM TIEs up with McAfee to handle cyber threats (Computing) Combining systems should lower response times

CloudPassage launches Halo Cortex (GlobeNewswire News Room) Halo Cortex dramatically reduces time-to-value for Halo adoption and DevSecOps transformation, helping enterprises realize security automation goals

Tufin Announces Security Automation for Containers and Microservices (PR Newswire) Tufin®, the market-leading provider of Network Security Policy Orchestration...

Extend work conversations securely with Wire guest rooms (Medium) Today, we’re launching the new secure guest rooms feature.

Cyberbit Announces New Cybersecurity Technology Portfolio for Managed Service Providers (PR Newswire) Cyberbit Ltd., a world leading provider of cybersecurity simulation...

Predictably Evil (SE Labs) Security testing lab specialising in anti-malware and targeted attack testing of endpoints, appliances and cloud services.

Prey Business Adds Location History, Expands Wipe Capabilities, and Renews Desktop Experience (GlobeNewswire News Room) New features give users greater control over both sensitive company information and the movement of their mobile devices

Neustar Announces NetProtect: A Direct Connect Distributed Denial of Service Defense Solution (BusinessWire) Neustar®, Inc., a trusted, neutral provider of real-time information services, today announced the release of Neustar NetProtect™, a direct connect Di

WhiteHat Security Announces New Crash Course Series to Strengthen Application Security Expertise Among Developers and Security Practitioners (PR Newswire) WhiteHat Security, the leading application security provider...

Solebit Becomes Gigamon Ecosystem Partner (Solebit) Solebit, a transformative cyber security company delivering ground-breaking and the most effective evasion proof approach to the identification and prevention of zero-day malware and unknown threats,has become an ecosystem partner of Gigamon Inc., the company leading the convergence …

US Signal Launches Technology Assessments To Help Organizations Plan For Effective IT Deployments And Benchmark Against Peers (PRWeb) US Signal, a leading end-to-end IT solutions provider, today announced the launch of its Technology Assessments. Designed to provide an objective, vendo

Technologies, Techniques, and Standards

DHS tests manufacturing and transportation sectors in 'Cyber Storm' exercise (Fedscoop) The Department of Homeland Security hosted a global cybersecurity drill Tuesday to “push participants out of their comfort zone” by practicing information sharing at a time of heightened risk to critical infrastructure, top DHS cybersecurity official Jeanette Manfra said.

Industrial Internet Consortium Develops New IoT Security Maturity Model (SecurityWeek) Industrial Internet Consortium (IIC) develops new IoT Security Maturity Model (SMM), building on its own security framework and reference architecture

6 steps for a solid patch management process (CSO Online) Patch management is simply the practice of updating software – most often to address vulnerabilities. Although this sounds straightforward, patch management is not an easy process for most IT organizations. Here are the steps you need to take.

Choosing an OT Security Solution? Here Are the 7 Questions to Ask (Security Boulevard) Look before you leap is excellent advice for security leaders to heed before they select security solutions to reduce Cyber Exposure in Operational Technology (OT) environments.

Design and Innovation

Mark Zuckerberg Says Facebook Will Have AI to Detect Hate Speech In ‘5-10 years’ (Motherboard) In Silicon Valley, everything is "5-10 years away," which is the same as saying nothing at all.

Research and Development

New Quantum Method Generates Really Random Numbers (SIGNAL) NIST researchers say their new method surpasses all others.

Mind-Reader Headset Transfers Your Thoughts On Screen with 90% Accuracy (HackRead) The headset has been named AlterEgo, stated MIT researcher Arnav Kapoor who added that using this device is like you have received superpowers.

Legislation, Policy, and Regulation

UK launched cyber-attack on Islamic State (BBC News) The attack suppressed IS propaganda and hindered their ability to plan attacks, GCHQ says.

Mike Pompeo to testify in confirmation hearing: 'Soft policy' toward Russian aggression 'now over' (Washington Examiner) Central Intelligence Agency Director Mike Pompeo, who has been nominated to be secretary of state, will say during his Senate confirmation hearing Thursday that the U.S.' "soft policy" responding to Russia’s aggression abroad is over, according to excerpts of his prepared remarks.

The Infuriating Innocence of Mark Zuckerberg (The New Yorker) The Facebook C.E.O. has spent most of his adult life apologizing, but he hasn’t managed to improve much.

Facebook and the Corporate Ransacking of America (Motherboard) The Facebook scandal is yet another example of the capitalism-led erosion of America's institutions.

Securing Critical Infrastructure in the Wake of Unprecedented Cyber Threats (Infosecurity Magazine) New legislation is due this month to help make nations more resilient in the face of disruptive malware.

Considering The Complexities of Hack Back Laws (SecurityWeek) Discussions around hacking back in Congress today rely on analogies that are too simple and use examples focused on physical self-defense that fail to capture the true nature of online interactions.

Inside ODNI’s plans to ‘transform’ through reorg (C4ISRNET) Shakeups are afoot at the Office of the Director of National Intelligence.

Building the Hierarchy of Innovation in the Defense Department: A Plan for Action (War on the Rocks) “Success no longer goes to the country that develops a new fighting technology first, but rather to the one that better integrates it and adapts its way of fighting….” -The National Defense Strategy (2018) One of the central military questions of our age is how to utilize new ways of thinking about driving defense

Deputy national security adviser Nadia Schadlow resigns (CNN) Nadia Schadlow, the US deputy national security adviser for strategy, has resigned and will leave her position at the end of the month, multiple administration officials told CNN.

Litigation, Investigation, and Law Enforcement

Mark Zuckerberg and the Tale of Two Hearings (WIRED) In his second day of Congressional testimony, Democrats wanted to know about privacy. Republicans wanted to hear about Diamond and Silk.

Zuckerberg refuses to curb data collection from Facebook users (Times) Mark Zuckerberg dismissed calls yesterday to cut the amount of personal information that Facebook collects from its users. At a hearing on Capitol Hill the co-founder and chief executive of the...

Cambridge University hits back at Zuckerberg’s shade (TechCrunch) Facebook CEO Mark Zuckerberg’s testimony to the House yesterday was a mostly bland performance, punctuated by frequent claims not to know or remember certain fundamental aspects of his own business. But he gave a curiously specific and aggressive response to a question from congressman Eliot …

The Questions Zuckerberg Should Have Answered About Russia (WIRED) Russian agents used Facebook to influence the 2017 election. Congress missed the chance to delve into what the company knows about it—and how they’ll stop it in 2018.

Congress Is Unearthing Facebook’s Terrible Power (WIRED) These hearings were never just about Cambridge Analytica. They’re about the un-checked influence that Facebook wields—on its users, and the world.

Everything You Need to Know About Mark Zuckerberg’s Testimony to Congress (Motherboard) Facebook’s CEO and founder testified in front of House and Senate committees on data security and how the social media site is trying to improve.

Facebook CEO puts on suit and a smile to try to seduce, assuage senators (Ars Technica) Sen. Blumenthal (D-CT): “Your business model is to maximize profit over privacy.”

Zuckerberg doesn’t want to talk about changing the business model (TechCrunch) Facebook is testifying once again before congress about the Cambridge Analytica debacle and Facebook’s privacy policy in general. One representative in particular nailed down Facebook CEO Mark Zuckerberg’s position on many subjects. The U.S. Representative for California’s 18th congressional …

Let’s Talk About Mark Zuckerberg’s Claim that Facebook 'Doesn’t Sell Data' (Motherboard) The Facebook CEO and founder has been repeating the claim that, technically, the site doesn’t sell users’ data during his Congressional hearings.

Zuckerberg makes case for privacy regs with teeth — by failing to remember non-existent FTC fine (TechCrunch) Chalk up a sharp political point in support for privacy legislation with actual teeth: In today’s testimony in front of the House Energy & Commerce committee, Facebook CEO Mark Zuckerberg was asked about the outcomes of a string of legal actions against the company — most of which h…

Zuckerberg owns or clones most of the “8 social apps” he cites as competition (TechCrunch) Mark Zuckerberg’s flimsy defense when congress asked about a lack of competition to Facebook has been to cite that the average American uses eight social apps. But that conveniently glosses over the fact that Facebook owns three of the top 10 U.S. iOS apps: #4 Instagram, #6 Messenger, and #8 …

Update: Zuckerberg Said He ‘Misspoke’ About Alerting Campaigns to Russian Hacking Attempts (Motherboard) Mark Zuckerberg revealed that Facebook’s security team identified Russian government hackers targeting US presidential campaigns and notified them of the hack attempts.

Zuckerberg says he's unaware of Facebook pushback for liberal groups after conservative targeting (Fox News) Facebook founder and CEO Mark Zuckerberg told lawmakers Tuesday that he was not specifically aware of any instance where the social network removed content posted by liberal groups amid concerns that the platform is biased against conservatives.

No-one speaks for me - Yulia Skripal (BBC News) The poisoned daughter of Russian ex-spy Sergei Skripal, rejects Russian help "at the moment".

Embassy comment in relation to the “Statement issued on behalf of Yulia Skripal” published by the Metropolitan Police (Посольство России в Великобритании) Embassy comment in relation to the “Statement issued on behalf of Yulia Skripal” published by the Metropolitan Police

DOJ shows House Intelligence the document that prompted Russia investigation, but with redactions (Washington Examiner) The Justice Department has shown the House Intelligence Committee the document that Chairman Devin Nunes, R-Calif., says prompted the FBI’s investigation into Russian meddling in the 2016 election and possible collusion with the Trump campaign.

Home Secretary Announces Police Crackdown on Dark Web (Infosecurity Magazine) Home Secretary Announces Police Crackdown on Dark Web. Millions apparently to be spent on cybercrime policing

How security researchers deal with risks stemming from their activities (Help Net Security) Broad and inconsistent interpretations of behind the times laws, new anti-infosec legislation, lawsuits and criminal prosecutions are having a chilling effect on security research. How do security researchers deal with risks stemming from their activities?

Chase Credit Card Customers \'Duped\' by Fees for Crypto Purchases, Suit Says | New York Law Journal (New York Law Journal) According to the complaint Chase credit card customers began having their cryptocurrency purchases treated as cash advances beginning in late January.

Central Bank of Iran blames Telegram for currency fluctuation (Trend.Az) The governor of the Central Bank of Iran Valiollah Seif has said that lack of trust, social media and Telegram messaging app as well as the UAE and Saudi Arabia are the reasons behind the weakening national currency, rial.

For a complete running list of events, please visit the Event Tracker on the CyberWire website.

Upcoming Events

Decompiling the Government: Getting Technologists and Policymakers to Speak the Same Language (Arlington, Virginia, USA, April 12, 2018) With the support of the Hewlett Foundation, the National Security Institute is excited to host “Decompiling the Government: Getting Technologists and Policymakers to Speak the Same Language.” This networking...

CYBERTACOS San Francisco (San Francisco, California, USA, April 16, 2018) CYBERTACOS is back and becoming one of the biggest cybersecurity networking events! Register today and join us for networking, food and drinks. This event includes a 45-minute meet the press panel made...

RSA Conference 2018 (San Francisco, California, USA, April 16 - 20, 2018) Take this opportunity to learn about new approaches to info security, discover the latest technology and interact with top security leaders and pioneers. Hands-on sessions, keynotes and informal gatherings...

Our Security Advocates (San Francisco, California, USA, April 17, 2018) OUR Security Advocates highlights a diverse set of experts from across information security, safety, trust, and other related fields. OURSA is a single-track, one-day conference with four topic sessions.

5th Annual Cybersecurity Summit (McLean, Virginia, USA, April 24, 2018) Join the Potomac Officers Club for the Fifth Annual Cybersecurity Summit to hear from public and private sector leaders on how federal agencies can improve their respective data security measures.

Secutech (Taipei, Taiwan, April 25 - 27, 2018) To meet the rising demand for intelligent and customised solutions, Secutech converges security and safety, ICT, IoT, artificial intelligence, big data, edge computing, intelligent video analytics and...

Industrial Control Systems (ICS) Cyber Security Conference Asia (Singapore, April 25 - 27, 2018) The Central ICS/SCADA Cyber Security Event of the Year for the APAC Region. Three days of multi-track training & workshops for days for operations, control systems and IT security professionals to connect...

INFILTRATE (Miami Beach, Florida, USA, April 26 - 27, 2018) INFILTRATE is a "pure offense" security conference aimed at the experienced to advanced practitioner. With the late-90s hacker con as its inspiration, the event has limited attendance in order to foster...

Automotive Cybersecurity Summit 2018 (Chicago, Illinois, USA, May 1 - 8, 2018) Smart Vehicles. Smart Infrastructures. The 2nd annual Automotive Cybersecurity Summit brings together public and private-sector manufacturers, suppliers, assemblers, technology providers and V2X partners...

Application of the Law of War to Cyber Operations (Washington, DC, USA, May 3, 2018) Cyber law experts meeting at the George Washington University will cover Title 10 vs. Title 32 vs. Title 50 and the lawful and operational restrictions related to these authorities. The panelists will...

Global Cyber Security in Healthcare & Pharma Summit (London, England, UK, May 3 - 4, 2018) The number of cyber-attacks in healthcare is on the rise, and the industry must do more to prevent and respond to these incidents. The Global Cyber Security in Healthcare & Pharma Summit 2018 will bring...

Secure Summit DC (Washington, DC, USA, May 7 - 8, 2018) (ISC)² Secure Summit DC will assemble the best minds in cybersecurity for two days of insightful discussions, workshops and best-practices sharing. The goal of the event is to equip security leaders to...

HACKNYC (New York, New York, USA, May 8 - 10, 2018) The recent flood of data breach news may numb us to the threat of attacks with kinetic effects--direct or indirect physical damage, injury, or death. Hack NYC focus’ on our preparation for, and resilience...

Insider Threat Program Management With Legal Guidance Training Course (Herndon, Virginia, USA, May 8 - 9, 2018) This training will provide the ITP Manager, Facility Security Officer, and others (CIO, CISO, Human Resources, IT, Etc.) supporting an ITP, with the knowledge and resources to develop, manage, or enhance...

SecureWorld Kansas CIty (Kansas City, Missouri, USA, May 9, 2018) Connecting, informing, and developing leaders in cybersecurity. SecureWorld conferences provide more content and facilitate more professional connections than any other event in the Information Security...

Cyber Investing Summit (New York, New York, USA, May 15, 2018) Now in its third year, the Cyber Investing Summit is an all-day conference focusing on investing in the cyber security industry, which is predicted to exceed $1 trillion in cumulative spending on products...

Third Annual Cyber Investing Summit (New York, New York, USA, May 15, 2018) Renowned cyber security executive David DeWalt will deliver the keynote address at the Third Annual Cyber Investing Summit. The Cyber Investing Summit is a unique all-day conference focused on the financial...

The Cyber Security Summit: Dallas (Dallas, Texas, USA, May 15, 2018) This event is an exclusive conference connecting Senior Level Executives responsible for protecting their company’s critical data with innovative solution providers & renowned information security experts.

Digital Utilitites Europe (Amserdam, the Netherlands, May 16 - 17, 2018) The conference will bring together key industry stakeholders to address the current challenges of the digitisation in the utilities sector. Join us in Amsterdam to hear latest business case studies and...

SecureWorld Houston (Houston, Texas, USA, May 17, 2018) Connecting, informing, and developing leaders in cybersecurity. SecureWorld conferences provide more content and facilitate more professional connections than any other event in the Information Security...

Ignite18 (Anaheim, California, USA, May 21 - 24, 2018) Palo Alto Networks' sixth annual conference features highly technical insights based on firsthand experiences with next-generation security technologies, groundbreaking new threat research, or innovative...

PCI Security Standards Council’s Asia-Pacific Community Meeting (Tokyo, Japan, May 23 - 24, 2018) Join us for: networking opportunities, updates on industry trends, insights and strategies on best practices, engaging keynotes and industry expert speakers. The PCI Security Standards Council’s 2018...

North American Financial Information Summit (New York, New York, USA, May 23, 2018) Data is the most vital asset of any financial services firm. With volumes increasing exponentially, and the complexity and structure continuously changing, it is more vital than ever to keep on top of...

Grow your brand and reach new customers.

Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.

Be a part of the CyberWire story.

People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.