skip navigation

More signal. Less noise.

Check out the Cyber Job Fair, April 19 in San Antonio.

Cleared and non-cleared cybersecurity pros make your next career move at the Cyber Job Fair, April 19 in San Antonio. Meet leading cyber employers including Bank of America, Parsons, Engility, Fulcrum and more. Visit ClearedJobs.Net or for details. 

Daily briefing.

The CyberWire announces its 5th Annual Women in Cyber Security Reception.

We're excited to announce that our 5th Annual Women in Cyber Security reception (#cyberwomenconnect) will be held October 18th, 2018, in the new International Spy Museum at L'Enfant Plaza in Washington, DC. To sponsor the event or request an invitation, go here.

Kapersky describes "Operation Parliament," a wide-ranging cyberespionage campaign that, since early 2017, has cloaked its activities by pretending to be the Gaza Cybergang, a well-known and not well-respected group of skids. The actor behind Operation Parliament appears anything but unsophisticated. The malware it used is still under study, but it does not appear to have any obvious relationship with previously seen attack code. Targets were carefully verified before infection, and Kaspersky says the unidentified operators did "just enough to achieve their goals." Most of the organizations targeted were in the Middle East and North Africa, but infections extended to Europe, South Korea, and North America as well. The campaign has slowed since the beginning of 2018, suggesting the spies got what they came for.

Proofpoint has successfully sinkholed what they call the oldest running infection chain: EITest. They say the campaign, active since 2011, seems to have been "purely criminal" as opposed to state directed. The large network of compromised servers it used (about 51 thousand), and its concealment of  command-and-control infrastructure behind a domain generation algorithm, made EITest unusually resistant to takedown. EITest passed "filtered, high-quality traffic to threat actors operating exploit kits and web-based social engineering schemes."

Facebook's sessions before Congress are over, with House inquisitors getting higher marks from the media than did their Senate counterparts.

Those interested in seeing how a small country punches far, far above its weight in cyberspace will find the Estonian Internal Security Service's newly released Annual Report for 2017 good reading.


Today's issue includes events affecting Afghanistan, Canada, Chile, China, Denmark, Djibouti, Egypt, Estonia, Germany, India, Iran, Iraq, Israel, Jordan, Republic of Korea, Kuwait, Lebanon, Morocco, Oman, thePalestinian Territories, Qatar, Russia, Saudi Arabia, Serbia, Somalia, Syria, United Arab Emiratesthe United Kingdom, United States.

A note to our readers: RSA is next week, and the CyberWire will be there. If you'll be at San Francisco's Moscone Center, too, stop by and say hello to the CyberWire team. We'll be at the Akamai booth, #3625 in the North Hall. We hope to see you there (and thanks to Akamai for their kind hospitality).

Headed to RSA? Get a free pass expo pass on LookingGlass!

RSA can be hectic, but we’ll make putting together your schedule easy for you. If want to know the latest trends and technology in cybersecurity and threat intelligence, look no further than LookingGlass Booth #100 in the South Hall. We offer solutions – not more work – for your toughest security challenges. Come meet with us on the Expo floor or at our meeting suite in the Marriott – enjoy the discussion, demos, and refreshments. Get your free pass here.

In today's podcast, we speak with our partners at Virginia Tech's Hume Center, as Dr. Charles Clancy discusses LTE network vulnerabilities. Our guest is Dinah Davis from and Arctic Wolf Networks, with thoughts on diversity at tech conferences.

Wombat Security at RSA Conference 2018 (San Francisco, California, United States, April 16 - 20, 2018) Cyberthreats lurk around every corner. Visit our booths at RSA to ensure you are providing your team with the tools they need to be cybersecurity heroes in your organization: South Expo 1033 and North Expo 4701. We’ll be presenting: a sneak peek at our new superhero-themed Awareness Video Campaigns; a free copy of our security awareness comic book, and previews of our newest training modules, including GDPR, Insider Threats, and Password Policy.

XM Cyber is coming to RSA (San Francisco, California, United States, April 16 - 20, 2018) Visit XM Cyber at the Israeli Pavilion, South Hall booth 635, to experience the first automated APT simulation platform to expose, assess and amend every attack path to organizational critical assets.

Cyber Job Fair, April 19, San Antonio visit ClearedJobs.Net or for details. (San Antonio, Texas, United States, April 19, 2018) Cleared and non-cleared cybersecurity pros make your next career move at the Cyber Job Fair, April 19 in San Antonio. Meet leading cyber employers including Bank of America, Parsons, Engility, Fulcrum and more. Visit ClearedJobs.Net or for details.

HackNYC2018 (New York, New York, United States, May 8 - 10, 2018) Cyber attacks are often called non-violent or non-kinetic attacks, but the simple truth is that there is a credible capability to use cyber attacks to achieve kinetic effects. Kinetic Cyber refers to a class of cyber attacks that can cause direct or indirect physical damage, injury or death solely through the exploitation of vulnerable information systems and processes. Use code CWIRE20 for 20% off the $50.00 individual ticket price.

Cyber Attacks, Threats, and Vulnerabilities

'Operation Parliament' Imitates Another Actor to Stay Undetected (SecurityWeek) A series of geopolitically motivated attacks ongoing since early 2017 and targeting high profile organizations worldwide appear to be a symptom of escalating tensions in the Middle East

New global cyberespionage campaign targets top legislative and judicial systems (BusinessTech) Kaspersky Lab says that a new cyberespionage campaign dubbed “Operation Parliament” is targeting high profile organisations from around the world with a focus on the Middle East and North Africa.

EITest: Sinkholing the oldest infection chain (Proofpoint) Proofpoint researchers detail the evolution of the EITest infection chain and help sinkhole the long-running operation.

Multi-Purpose Proxy Botnet Ensnares 65,000 Routers (SecurityWeek) More than 65,000 routers exposed to the Internet via the Universal Plug and Play (UPnP) protocol are being abused by cybercriminals as part of a large, multi-purpose proxy botnet.

Cyber-Espionage Groups Are Increasingly Leveraging Routers in Their Attacks (BleepingComputer) Cyber-espionage groups —also referred to as advanced persistent threats (APTs)— are using hacked routers more and more during their attacks, according to researchers at Kaspersky Lab.

Fake Hillary p[0]rn just the tip of Russia’s Reddit penetration (Naked Security) How Russian trolls embraced rule 34 (but Redditors didn’t buy it)

The Fake Facebook Pages Targeting Vietnam Veterans (The Atlantic) The pages are operated out of Eastern Europe and the social network took almost two months to shut one of them down.

LimeSurvey Flaws Expose Web Servers to Attacks (SecurityWeek) Hackers can chain two vulnerabilities in the popular online survey tool LimeSurvey to take control of web servers with little or no user interaction

New Mirai Variant Launching DDoS Attacks on IoT Devices (KoDDoS Blog) The financial sector has experienced a series of DDoS attacks executed by a Mirai botnet variation. The number of ‘Internet of Things’ devices the attack affected reaches 13,000.

Fake Chrome & Firefox browser update lead users to malware infection (HackRead) Another day, another malware scam - This one uses Chrome and Firefox browsers as bait to infect Windows users.

Glitch in malspam campaign temporarily reduces spread of GandCrab (SANS Internet Storm Center) Since March 2018, I've noticed malicious spam (malspam) pushing GandCrab ransomware.

Researchers Create Malware That Steals Data via Power Lines (BleepingComputer) A team of academics has successfully developed and tested malware that can exfiltrate data from air-gapped computers via power lines. The team —from the Ben-Gurion University of the Negev in Israel— named their data exfiltration technique PowerHammer.

Why Child Identity Theft Is a Growing Concern During Tax Season (Consumer Reports) Data obtained via child identity theft can be used by cybercriminals to file fake tax returns and loan requests. Consumer Reports explains how to protect your child's info.

When Identity Thieves Hack Your Accountant (KrebsOnSecurity) The Internal Revenue Service has been urging tax preparation firms to step up their cybersecurity efforts this year, warning that identity thieves and hackers increasingly are targeting certified public accountants (CPAs) in a bid to siphon oodles of sensitive personal and financial data on taxpayers.

Great Western Railway is urging online customers to reset passwords (The Sun) GREAT Western Railway is urging online customers to reset passwords after confirming it was the target of a cyber attack. The firm said hackers used an automated system to gain access to customer a…

Kemi Badenoch MP, self-confessed website hacker (Graham Cluley) In 2008, the deputy leader of the British Labour party had her website hacked. And now we know who did it…

Dark Web Market Price Index (US Edition) ( Scammers are buying and selling your stolen personal info on the dark web and it's not just credit card details. With hacked dating profiles, streaming services, even Deliveroo accounts for sale, we've created the Dark Web Market Price Index to monitor this. Find out just what your personal information is worth.

New Research from CAST Exposes Risk in Open Source Software (GlobeNewswire News Room) The prevalence of open source software in enterprise applications signals the need for greater Software Intelligence to prevent exploitation by hackers

What Happens In Cyberspace Stays Online Forever: Cryptocurrencies And Privacy (Forbes) Bitcoin’s staggering growth and adoption brought strong scrutiny to its transaction rates capabilities.

Facebook shines a little light on ‘shadow profiles’ (Naked Security) Shadow… what now?

Security Patches, Mitigations, and Software Updates

Patch Tuesday brings some surprises, some early crashes, and a surreal solution (Computerworld) Windows 7 and Server 2008R2 continue to get beaten into the ground, and the Win10 1709 patch prompts complaints, as the Windows security patching business gets even more complex.

How Android Phones Hide Missed Security Updates From You (WIRED) A study finds that Android phones aren't just slow to get patched; sometimes they lie about being patched when they're not.

Apple has begun notifying macOS users of coming 32-bit app incompatibility (Ars Technica) Warnings have started, but 32-bit support will likely continue for many months.

Instagram bends to GDPR – a “download everything” tool is coming (Naked Security) The tool will let you get at your photos, videos and messages

Cyber Trends

Hot Topics at the 2018 RSA Conference (BankInfo Security) GDPR compliance. New uses for blockchain. IoT security. These are some of the hottest topics on tap at the 2018 RSA Conference, taking place April 16-20 in San Francisco.

U.S. faces evolving, emboldened adversaries in cyberspace, officials warn (Stripes Okinawa) As threats in cyberspace constantly evolve, the United States is facing adversaries that are increasingly sophisticated, capable and emboldened in that domain, top defense officials told lawmakers today.

Venafi Study Results: Will We See Future Browser Distrust Events? (Venafi) Venafi’s latest study reveals that IT professionals are concerned about future CA incidents, but few can quickly respond to them.

More than 2.5 billion records stolen or compromised in 2017 (BusinessWire) Gemalto (Euronext NL0000400653 GTO), the world leader in digital security, today released the latest findings of the Breach Level Index, revealing tha

Risk of compromised credentials an HR problem, say senior executives (Global Banking And Finance Review Magazine) Centrify report shows that around half believe only a major breach would change their opinion that compromised user credentials are a ‘significant risk’


Cyber security firm Avast plans watershed London tech listing (Reuters) Avast, the world’s largest consumer antivirus supplier by customers, said on Thursday it will apply to list its shares on the London Stock Exchange in what could be a blockbuster float expected to value the company at around $4 billion.

Sequoia Israel Partner Launches New $50 Million Cybersecurity Fund (CTECH) Called Cyberstarts, the fund established by Gili Raanan raised funding from the likes of Check Point and Palo Alto Network's founders

Governor Northam Announces Creation of the Virginia Founders Fund (Virginia Governor, Newsroom) New seed investment fund that brings increased access to venture capital to Virginia’s underrepresented entrepreneurs

SonicWall CEO squares up to Sophos after launching new cloud platform (Channelnomics) Security vendor launches a cloud platform it claims pits it against enterprise rivals such as Sophos

Could Palo Alto Networks Be a Millionaire-Maker Stock? (The Motley Fool) It’s been a good year for Palo Alto Networks’ investors. Will the good times keep rolling?

Intelligence office needs industry help to attain ‘acquisition agility’ (Fedscoop) Industry stakeholders will likely have a voice in ODNI’s redesign of the intelligence community’s acquisition process, officials said Tuesday.

What's your security story? How to use security as a sales tool (Help Net Security) When your sales team not only knows your security story, but knows it so well that they can communicate it themselves, the sales cycle is dramatically accelerated.

Global operators team on security effort (Mobile World Live) Telefonica, Singtel, Etisalat and SoftBank created a global cyber security alliance, designed to protect enterprise ...

Former CIA Director, John O. Brennan Joins SecureAuth + Core Security Advisory Board to Fortify Gaps in Cybersecurity Battle Lines (GlobeNewswire News Room) Leading Expert in National Security to Advise on Market Approach, Product Strategy, and Customer Value for Identity Based Security Automation Solution

This Deloitte exec makes cybersecurity a contact sport (Washington Business Journal) How James Turgal transitioned from a long career at the FBI to the C-suite in the private sector.

Products, Services, and Solutions

Absolute Debuts GDPR Readiness Assessments to Help Global Organizations Jump-Start Compliance Ahead of May 2018 Deadline (BusinessWire) Absolute (TSX: ABT), the endpoint visibility and control company, today announced new GDPR Data Risk and Endpoint Readiness Assessments to accelerate

Digital Defense Announces the Launch of Cyber Threat Management Offering (Digital Defense) Digital Defense, Inc., a security technology and services provider, today announced the launch of a new product line offering, Frontline Cyber Threat Management (Frontline CTM™), a trio of predictive cyber intelligence solutions.

CYBRIC and IBM Resilient Integrate to More Quickly Identify and Remediate Cyber Threats (BusinessWire) CYBRIC, provider of the first continuous application security platform, today announced an integration with IBM Resilient, the leading platform for or

Cylance® Axiom Alliance Program Extends AI Based Security Approach Across Endpoints to Network and Cloud (BusinessWire) Cylance Inc., the company that revolutionized the antivirus and endpoint protection industry with true AI-powered prevention that blocks advanced cybe

Mocana Launches Supply Chain Integrity Platform to Secure IoT, ICS Devices (SecurityWeek) Mocana TrustCenter provides supply chain integrity, allows faster development and provisioning of devices containing TrustPoint security, and to reduce costs by automating secure enrollment and provisioning at a scale.

Infoblox and McAfee Deliver Comprehensive Threat Protection and Faster Threat Response (PR Newswire) Infoblox Inc., the network control company that provides...

Intezer Unveils Compromise Assessment Service Extending Threat Detection and Analysis Platform, Intezer Analyze (BusinessWire) Intezer Compromise Assessment service provides a complete health check of IT environment, detection of and remediation of cyber attack/s

Netwrix adds data discovery and classification functionality to Netwrix Auditor (Netwrix) The new edition empowers users to identify, classify and secure the sensitive data on their file shares

Echoing TRITON, CyberX's Innovative ICS Security Research Selected for 'Hackers & Threats' Session at the 2018 RSA Conference (PR Newswire) CyberX, the IIoT and industrial control system (ICS) security company, today...

IGEL OS 10 Now Supports UEFI Secure Boot (IGEL) IGEL met the requirements of the UEFI Secure Boot security standard

CipherCloud Announces Groundbreaking CASB+ Platform, Unifying Cloud Security Capabilities with End-to-End Data Protection in a Single Cloud-Native Security Platform (GlobeNewswire News Room) New CASB+ platform combines powerful CASB capabilities with award-winning, data protection technology enabling enterprises to rapidly deploy cloud-native security and compliance across any SaaS, PaaS or IaaS application

Etherparty Enhances Security with Aporeto Ahead of Rocket Launch (Aporeto) Etherparty Smart Contracts Inc. (“Etherparty”), a blockchain technology company providing smart contract solutions for enterprise and everyday use on the world’s most popular blockchains, has enlisted Zero Trust security solutions provider Aporeto, to provide an added layer of security to bolster the platform ahead of the ICO product launch...

Over 60s take up SAS cyber attack training (Mortgage Finance Gazette) It doesn’t matter whether you are an individual or run a business, everyone is susceptible to cyber attacks and scams. Santander is tacking this head on by taking the over 60s back to school; meanwhile businesses continue to be bombarded with cyber ammunition

Tanium Ambitions, How Can A Security Company Be A Platform Company? (Forbes) Every technology organization wants to position themselves as a platform company, let’s get over that core truism.

Effectively Detecting Low Throughput and Malicious DNS Exfiltration (Security Boulevard) In a previous blog post, we described how the DNS protocol, mainly designed for hostname to IP addresses resolution, can be abused for arbitrary data exchange. Based on throughput (i.e., bytes per hour), we distinguish between two classes of data...

DarkOwl Announces Release of Map the Dark (WebWire) DarkOwl, a Denver based information security company specializing in darknet intelligence information, today announced the release of Map the Dark, an interactive data visualization of the darknet...

Twistlock Advances Security For All Cloud Native Environments Beyond Containers and Serverless (PR Newswire) Twistlock, the leading provider of container and cloud native...

Technologies, Techniques, and Standards

UK’s GCHQ unveils the 6 levels of cyber attack and how to respond (CSO) The UK readies ministers and local police for an impending 'category 1' national cyber crisis.

Cybersecurity Drills More Important Than Ever for Data Centers (Data Center Knowledge) No amount of planning can replace regular drills. Here’s what they should include.

Uncovering Unknown Threats With Human-Readable Machine Learning (TrendLabs Security Intelligence Blog) In this blog post, we will discuss how we developed a human-readable machine learning system that is able to determine whether a downloaded file is benign or malicious in nature.

New threats mean new training for the Navy (C4ISRNET) The Navy's new Norfolk, Virginia-based group targets information warfare training.

How Effective Is Security Awareness Training for Threat Prevention? (Security Intelligence) Employees represent the first line of defense against cyberthreats, and effective security awareness training is more crucial than ever given the volatility and sophistication of the threat landscape.

Research and Development

Cisco and ISARA Collaborate on a Proof of Concept of the World’s First Digital Certificate Compatible with Both Classic and Quantum-Safe Cryptographic Algorithms (BusinessWire) Cisco Systems and ISARA Corp., the leading provider of security solutions for the quantum computing age, today announced the world’s first collaborati


Wagner Proposes Cutting CyberX Program To Help Fund Tax Credit (Community Idea Stations) Republican Senator Frank Wagner’s proposed tax credit to help middle-income earners pay their healthcare premiums is getting the attention of fellow GOP leaders. But how does he want to pay for it?

Legislation, Policy, and Regulation

Estonian Internal Security Service Annual Review 2017 (Estonian Internal Security Service) The specific nature of work of special services responsible both for national security and foreign intelligence has throughout the ages required operating as covertly as possible and certain mystery has always surrounded it...[2017 Annual Review available for download at this link.]

National cyber strategy could come by summer (FCW) A top Pentagon official told the House Armed Services Committee that the much-anticipated national cyber strategy 'should be forthcoming in the near future.'

Cyber Command has a role, but Pentagon leaders struggle to define it (Fifth Domain) DoD is still contemplating policy and employment of cyber forces several years after the stand up of Cyber Command.

Trump signs bill to shut down websites that facilitate prostitution (Ars Technica) FOSTA becomes law—sex work forums were already shutting down to prepare.

States Turn To National Guard To Help Protect Future Elections From Hackers (NPR) Election officials have traditionally focused on a smooth voting experience, but after the 2016 elections, they've also had to focus on cybersecurity.

UK cyber attack reporting set to be more streamlined (ComputerWeekly) Government funding has been allocated to help streamline cyber attack reporting, according to the National Cyber Security Centre.

Litigation, Investigation, and Law Enforcement

Congress chews up Zuckerberg, day two: A far more thorough mastication (Naked Security) “What’s the difference between Facebook and J. Edgar Hoover?”

Key Points From Facebook-Zuckerberg Hearings (SecurityWeek) Facebook chief Mark Zuckerberg testified for nearly 10 hours over two days on Facebook's privacy and data protection issues before committees of the Senate and House. Here are key points:

European Court of Justice to investigate Facebook's data transfers (Computing) Irish Court has referred long-running Schrems privacy case to the ECJ,Legislation and Regulation ,Facebook,Privacy Shield,Safe harbour,ECJ,Max Schrems,Privacy

Android ruling is unlikely to weaken Google in Europe (Computing) Google will be fined, but that won't affect its established dominance,Legislation and Regulation ,Google,European Union,anti-trust,Android

Death SWAT suspect tweets threats from jail using buggy inmate kiosk (Naked Security) He apparently got online when a jail kiosk software upgrade glitched. Alternatively, as his account explained it, because “I’m an eGod.”

For a complete running list of events, please visit the Event Tracker on the CyberWire website.

Newly Noted Events

AFCEA/GMU Critical Issues in C4I Symposium (Fairfax, Virginia, USA, May 22 - 23, 2018) The AFCEA/GMU Critical Issues in C4I Symposium brings academia, industry and government together annually to address important issues in technology and systems research and development. The agenda for...

International Cyber Risk Management Conference (Hamilton, Bermuda, December 6 - 7, 2018) Now in its fourth year in Canada, the International Cyber Risk Management Conference (ICRMC) has earned a reputation as one of the world’s most trusted cyber security forums. We are proud to bring ICRMC...

Upcoming Events

CYBERTACOS San Francisco (San Francisco, California, USA, April 16, 2018) CYBERTACOS is back and becoming one of the biggest cybersecurity networking events! Register today and join us for networking, food and drinks. This event includes a 45-minute meet the press panel made...

RSA Conference 2018 (San Francisco, California, USA, April 16 - 20, 2018) Take this opportunity to learn about new approaches to info security, discover the latest technology and interact with top security leaders and pioneers. Hands-on sessions, keynotes and informal gatherings...

Our Security Advocates (San Francisco, California, USA, April 17, 2018) OUR Security Advocates highlights a diverse set of experts from across information security, safety, trust, and other related fields. OURSA is a single-track, one-day conference with four topic sessions.

5th Annual Cybersecurity Summit (McLean, Virginia, USA, April 24, 2018) Join the Potomac Officers Club for the Fifth Annual Cybersecurity Summit to hear from public and private sector leaders on how federal agencies can improve their respective data security measures.

Secutech (Taipei, Taiwan, April 25 - 27, 2018) To meet the rising demand for intelligent and customised solutions, Secutech converges security and safety, ICT, IoT, artificial intelligence, big data, edge computing, intelligent video analytics and...

Industrial Control Systems (ICS) Cyber Security Conference Asia (Singapore, April 25 - 27, 2018) The Central ICS/SCADA Cyber Security Event of the Year for the APAC Region. Three days of multi-track training & workshops for days for operations, control systems and IT security professionals to connect...

INFILTRATE (Miami Beach, Florida, USA, April 26 - 27, 2018) INFILTRATE is a "pure offense" security conference aimed at the experienced to advanced practitioner. With the late-90s hacker con as its inspiration, the event has limited attendance in order to foster...

Automotive Cybersecurity Summit 2018 (Chicago, Illinois, USA, May 1 - 8, 2018) Smart Vehicles. Smart Infrastructures. The 2nd annual Automotive Cybersecurity Summit brings together public and private-sector manufacturers, suppliers, assemblers, technology providers and V2X partners...

Application of the Law of War to Cyber Operations (Washington, DC, USA, May 3, 2018) Cyber law experts meeting at the George Washington University will cover Title 10 vs. Title 32 vs. Title 50 and the lawful and operational restrictions related to these authorities. The panelists will...

Global Cyber Security in Healthcare & Pharma Summit (London, England, UK, May 3 - 4, 2018) The number of cyber-attacks in healthcare is on the rise, and the industry must do more to prevent and respond to these incidents. The Global Cyber Security in Healthcare & Pharma Summit 2018 will bring...

Secure Summit DC (Washington, DC, USA, May 7 - 8, 2018) (ISC)² Secure Summit DC will assemble the best minds in cybersecurity for two days of insightful discussions, workshops and best-practices sharing. The goal of the event is to equip security leaders to...

HACKNYC (New York, New York, USA, May 8 - 10, 2018) The recent flood of data breach news may numb us to the threat of attacks with kinetic effects--direct or indirect physical damage, injury, or death. Hack NYC focus’ on our preparation for, and resilience...

Insider Threat Program Management With Legal Guidance Training Course (Herndon, Virginia, USA, May 8 - 9, 2018) This training will provide the ITP Manager, Facility Security Officer, and others (CIO, CISO, Human Resources, IT, Etc.) supporting an ITP, with the knowledge and resources to develop, manage, or enhance...

SecureWorld Kansas CIty (Kansas City, Missouri, USA, May 9, 2018) Connecting, informing, and developing leaders in cybersecurity. SecureWorld conferences provide more content and facilitate more professional connections than any other event in the Information Security...

Cyber Investing Summit (New York, New York, USA, May 15, 2018) Now in its third year, the Cyber Investing Summit is an all-day conference focusing on investing in the cyber security industry, which is predicted to exceed $1 trillion in cumulative spending on products...

Third Annual Cyber Investing Summit (New York, New York, USA, May 15, 2018) Renowned cyber security executive David DeWalt will deliver the keynote address at the Third Annual Cyber Investing Summit. The Cyber Investing Summit is a unique all-day conference focused on the financial...

The Cyber Security Summit: Dallas (Dallas, Texas, USA, May 15, 2018) This event is an exclusive conference connecting Senior Level Executives responsible for protecting their company’s critical data with innovative solution providers & renowned information security experts.

Digital Utilitites Europe (Amserdam, the Netherlands, May 16 - 17, 2018) The conference will bring together key industry stakeholders to address the current challenges of the digitisation in the utilities sector. Join us in Amsterdam to hear latest business case studies and...

SecureWorld Houston (Houston, Texas, USA, May 17, 2018) Connecting, informing, and developing leaders in cybersecurity. SecureWorld conferences provide more content and facilitate more professional connections than any other event in the Information Security...

Ignite18 (Anaheim, California, USA, May 21 - 24, 2018) Palo Alto Networks' sixth annual conference features highly technical insights based on firsthand experiences with next-generation security technologies, groundbreaking new threat research, or innovative...

PCI Security Standards Council’s Asia-Pacific Community Meeting (Tokyo, Japan, May 23 - 24, 2018) Join us for: networking opportunities, updates on industry trends, insights and strategies on best practices, engaging keynotes and industry expert speakers. The PCI Security Standards Council’s 2018...

North American Financial Information Summit (New York, New York, USA, May 23, 2018) Data is the most vital asset of any financial services firm. With volumes increasing exponentially, and the complexity and structure continuously changing, it is more vital than ever to keep on top of...

Grow your brand and reach new customers.

Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.

Be a part of the CyberWire story.

People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.