skip navigation

More signal. Less noise.

Combating threats and protecting the enterprise data in the digital workspace.

Digital workspaces bring enormous benefits to organizations and their employees across the globe, but require new thinking when it comes to security. In our perimeter-less digital world, protecting, detecting, and remediating threats requires intelligence-driven approaches. Check out VMware’s insightful white paper describing a new, comprehensive and predictive approach. It highlights the importance of securing the evolving digital workspace and the need for enterprises to embrace a framework of trust between the components in their ecosystem.

Daily briefing.

Strikes against Syrian chemical weapons facilities over the weekend influence Western countries' calculations of the likelihood of Russian cyber retaliation. The coordinated strikes, carried out by US, British, and French forces operating in the region, were an attempt to cripple the Syrian government's chemical warfare capabilities and punish the regime for its recent use of them against Syrian civilians in the city of Douma. The strikes were also a warning to Russia, which is the Assad regime's principal international prop.

The first Russian responses to the strikes have been information operations, both online and published sympathetic media outlets following government lines in Syria, Russia, and Iran. The US Department of Defense Saturday reported a large increase in Russian trolling, quoting a figure of 2000%. This should probably be read as "a big increase in information operations" dressed up in some specious quantification ("2000% compared to what," as Sputnik asks).

British authorities have warned that a Russian attack on that country's critical infrastructure could prompt cyber retaliation. It's likely, however, that Russian reprisals for strikes in Syria will at least initially take a different form. Prime Minister May has been briefed on the likelihood that leading British public figures, including members of the Cabinet and other Members of Parliament, will be attacked through release of scurrilous material, "kompromat."

Germany's Foreign Minister this weekend reiterated his government's attribution of cyberattacks on German networks to Russia.

The US, also preparing for cyberattacks, is expected to impose further sanctions on Russian companies sometime today.

Notes.

Today's issue includes events affecting Australia, China, Germany, Iran, Russia, Syria, United Kingdom, United States.

Cyber is the new battlefield.

Become a Cyber Spartan and Defend the Gates of America. At Invictus International Consulting we are hiring elite cyber, intelligence, and technology experts to serve our government and commercial clients. Join us.

In today's podcast we'll hear from our partners at Terbium Labs, as Emily Wilson offers some tips for conference-goers. Our guest is Paul Martini from iboss, with thoughts on growing cyber security companies in a crowded marketplace.

XM Cyber is coming to RSA (San Francisco, California, United States, April 16 - 20, 2018) Visit XM Cyber at the Israeli Pavilion, South Hall booth 635, to experience the first automated APT simulation platform to expose, assess and amend every attack path to organizational critical assets.

HackNYC2018 (New York, New York, United States, May 8 - 10, 2018) Cyber attacks are often called non-violent or non-kinetic attacks, but the simple truth is that there is a credible capability to use cyber attacks to achieve kinetic effects. Kinetic Cyber refers to a class of cyber attacks that can cause direct or indirect physical damage, injury or death solely through the exploitation of vulnerable information systems and processes. Use code CWIRE20 for 20% off the $50.00 individual ticket price.

8th Annual (ISC)2 Security Congress (New Orleans, Louisiana, United States, October 9 - 11, 2018) The (ISC)2 Security Congress brings together the sharpest minds in cyber and information security for over 100 educational sessions covering 17 tracks. Join us to learn from the experts, share best practices, and make invaluable connections. Your all-access conference pass includes educational sessions, workshops, keynotes, networking events, career coaching, expo hall and pre-conference training. Save your seat at congress.isc2.org.

Dateline RSA

5 things to watch at RSA Conference 2018 (CIO Dive) If you haven't created an RSAC bingo card yet, now's the time. Be on the lookout for the overuse of terms like "nation state actors," "cyberwar" and "GDPR."

Government-backed Aussie delegation aims to strengthen US cyber alliance (ARN) Delegation of over 65 cyber security leaders will put Australian expertise on the global stage as part of plans to strengthen the US alliance.

Australian ministers to meet with Google, Apple in the name of cybersecurity (ZDNet) The federal government is meeting with US counterparts and a handful of tech heavyweights to advance Australia's cyber capabilities, sending also 60 cybersecurity-focused individuals to the RSA Conference to show off local talent.

After Intense Criticism, RSA Tech Conference Adds More Women to Top Speaking Slots (Fortune) Previously, 19 of 20 keynote speakers were men.

Cyber Attacks, Threats, and Vulnerabilities

Pentagon claims 2,000% increase in Russian trolls after Syria strikes. What does that mean? (USA TODAY) "The Russian disinformation campaign has already begun," spokeswoman Dana White said in Saturday's Pentagon briefing.

Compared to What: Pentagon Says ‘2000%’ Rise in Russian Trolls After Airstrikes (Sputnik) Saturday morning’s missile attacks by the US, France and UK on Syrian installations allegedly used in the production of chemical weapons has compelled Moscow to retaliate in support of Bashar al-Assad’s government in the form of “Russian trolls,” claims the Pentagon.

Russia 'could launch cyber warfare within days' over Syria strikes (Evening Standard) Russia could “launch cyber warfare within weeks” in retaliation to US-led airstrikes on Syria bringing down City firms, the UK transport network and the NHS, experts have warned. Theresa May hailed “targeted and limited” action on key sites of Syria’s chemical weapons regime “a success” while Donald Trump branded the offensive “perfectly executed”. But Russia warned of “consequences” following the strike which has left the Prime Minister facing questions over why the decision was not put to a parliamentary vote.

What media in Russia, Iran and Syria are saying on Syria strikes (Al Jazeera) State outlets in countries allied to Syrian president carry unanimous condemnation of US-led strikes on Syria.

Russian threat to wage dirty campaign against Britain’s elite (Times) Spy chiefs are braced for a Russian revenge attack in which Kremlin-backed hackers release embarrassing information on ministers, MPs and other high-profile people. Theresa May has received...

UK could launch retaliatory cyber attack on Russia if infrastructure targeted (Geo TV) Britain’s relations with Russia are at a low after it blamed Russia for attack on former Russian spy

Weighing Syria Strike, U.S. Braces for Retaliation Beyond the Battlefield (Brinkwire) As President Donald Trump weighed a airstrike against Syria, American officials braced on Friday for the prospect of retaliation by its patrons Russia or Iran that could range beyond the physical battlefield and escalate with a counterattack on civilian or military cybersystems in the West.

Germany says it has to assume Russia behind recent cyber attack (Reuters) The German government has to assume that a cyber attack on its Foreign Ministry stemmed from Russia, Foreign Minister Heiko Maas told the broadcaster ZDF on Sunday.

RadRAT: An all-in-one toolkit for complex espionage ops (Bitdefender Labs) Around February this year, we came across a piece of malware that had previously gone unnoticed. Buried in the malware zoo, the threat seems to have been operational since at least 2015, undocumented by the research community. Our interest was stirred by its... #espionage #radrat #targetedattack

New malware mine cryptocurrency without open browser session (HackRead) Initially, the cryptomining malware aimed at generating cryptocurrency by using open browser session but that has changed now.

Hackers have a brand new scam, and it involves the service preparing your tax returns (CNBC) This tax season, scammers have gotten more sophisticated and are now targeting tax professionals in the quest to get their hands on your tax return.

Defense contractors face more aggressive ransomware attacks (TheHill) Cybersecurity experts say defense contractors are facing more aggressive attacks as nation states and other hacking groups increasingly use malicious software to block information or manipulate data.

Ex-NSA Analyst: Ransomware Hasn't Gone Anywhere, It's Still Dangerous (Bitsonline) We haven't heard much about ransomware since the massive global outbreak in 2017, but former NSA data science chief Oren Falkowitz warns that it's alive and well, and as dangerous as ever.

Website security firm Sucuri hit by large scale volumetric DDoS attacks (HackRead) Another day, another series of DDoS attacks - This time Sucuri and its customers have been hit by a series of attacks worldwide.

Common IT Tools are the Hacker's Favorites (Infosecurity Magazine) Monitoring and analyzing common IT tools will make life harder for attackers.

NSA: ‘We have not responded to a zero-day in two years – our adversaries are hitting known vulnerabilities’ (Public Technology) Cybersecurity unit director reveals how US intelligence agency is working to spread best practice by promoting openness and collaboration

Researchers use power lines to exfiltrate data from air-gapped computers (Help Net Security) Researchers from the Ben-Gurion University of the Negev have come up with another way to exfiltrate data from air-gapped computers: this time, its via malware that can control the power consumption of the system.

Hackers stole a casino's high-roller database through a thermometer in the lobby fish tank (Business Insider) Hacking internet of things devices is a growing problem for companies, the CEO of Darktrace told a conference this week.

BOCES: Cyber attack to blame for more ELA testing problems (WIVB) A cyber attack is to blame for additional issues with electronic English Language Arts testing that specifically impacted students in Central New York on Thursday.

Cyber Trends

The grim state of cybersecurity: It's awful, and it's only going to get worse (SiliconANGLE) This year has witnessed the embarrassing disclosure of 119,000 documents left on an unprotected server by Fedex Corp., a similar compromise of 37 million customer records by Panera Bread Co., the theft of up to 5 million records of Saks Fifth Avenue and Lord & Taylor customers, ransomware attacks at Boeing Co. and the City of Atlanta, and Facebook Inc.’s admission that 87 million customer accounts were compromised prior to the 2016 election.

Facebook data saga boosts demand for ethical consultants, analysts say (The National) Tech companies want to have systems that better protect user privacy

The Facebook data debacle may not change internet behavior (Science News) In the wake of the Facebook data breach, personal privacy experts say there’s little individuals can do to control their personal information online.

McAfee: 26% of companies have suffered cloud data theft (VentureBeat) Enterprises are moving their data to the cloud, but not everybody is certain that the cloud is as secure as it could be, according to the third annual report on cloud security from cybersecurity fi…

Technology and the challenge of election integrity (TheCable) Despite declines in political and civil liberties on the continent, regular elections – an indispensable foundation of democracy – signal that democracy is gradually taking root in Africa. The frequency

Marketplace

Effects of Cyber Breaches on Corporate Bottom Line: Viewpoint (Insurance Journal) Cyberattacks are an increasingly common threat to business, with risk officers listing cybersecurity as their greatest concern and more than 2,200 confirmed data breaches in 2017, according to a new report from Verizon. The headlines about hacking often focus on potential harm to consumers whose data is stolen, but

Developers Outnumber Security Pros 100:1 as Breaches Grow (Infosecurity Magazine) Developers Outnumber Security Pros 100:1 as Breaches Grow. Sonatype study urges greater use of DevSecOps

Cramer vets under-the-radar cybersecurity plays like ForeScout (CNBC) Jim Cramer inspects lesser-known cybersecurity stocks ForeScout, Okta and Zscaler to see if they can protect investors' portfolios.

Apple memo warning employees about leaking gets leaked (Ars Technica) Apple warns leakers that “they’re getting caught faster than ever.”

Lessons from cybersecurity exits (TechCrunch) Mahendra Ramsinghani Contributor Mahendra Ramsinghani is the founder of Secure Octane, a Silicon Valley-based cybersecurity seed fund. More posts by this contributor Is Symantec getting ready to buy Splunk? Can the security community grow up?

First Look At Carbon Black's IPO (Seeking Alpha) Carbon Black, an endpoint security company, has submitted filings for its upcoming IPO.

Air Force selects five firms for $950 million cyber contract (Military Embedded Systems) The U.S. Air Force has chosen five small businesses to participate in a potential five-year, $950 million contract vehicle to research and develop cyber technology platforms.

So you’ve got a zero-day – do you sell to black, grey or white markets? (Register) Bug bounty sales are getting very complicated, financially and morally

Inside BlackBerry’s Push to Dominate the Security Market for Autonomous Cars (Motherboard) After its epic smartphone failure, BlackBerry is determined to fend off competitors in automotive.

The psychological impact of an $11 Facebook subscription (TechCrunch) Would being asked to pay Facebook to remove ads make you appreciate their value or resent them even more? As Facebook considers offering an ad-free subscription option, there are deeper questions than how much money it could earn. Facebook has the opportunity to let us decide how we compensate it f…

Myrna Soto Joins Trident Capital Cybersecurity As A Partner (PR Newswire) SAN MATEO, Calif., April 16, 2018 /PRNewswire/ -- Trident Capital Cybersecurity (TCC), a leading venture capital firm...

Products, Services, and Solutions

Splunk embraces industrial IoT (IoT Hub) Launches industrial asset intelligence system.

Symantec opens machine learning cyberthreat tools to customer use (Axios) The tool had been used internally to connect the Wannacry ransomware attack to the Sony hack.

MinerEye introduces AI-powered Data Tracker (Help Net Security) MinerEye is launching MinerEye Data Tracker, an AI-powered governance and data protection solution that will enable companies to continuously identify, organize, track and protect vast information assets including undermanaged, unstructured and dark data for safe and compliant cloud migration.

IBM Resilient enterprise security platform merges human, machine learning (ZDNet) IBM says that combining both human and machine intelligence gives us the best chance of responding to incidents before security breaches occur.

RSA Security Conference: InfoSec Global Launches a Solution to Cryptographic Compliance and Post-Quantum Readiness (PR Newswire) InfoSec Global (ISG) unveils AgileScan, a security management solution...

Estonia’s Guardtime delivers a specialised cyber exercise for the UK civil nuclear sector (Estonian World) The Estonian-founded, Amsterdam-based software security company, Guardtime, has planned and executed a custom cyber exercise for the UK civil nuclear sector.

Technologies, Techniques, and Standards

Ransomware, healthcare and incident response: Lessons from the Allscripts attack (CSO Online) The actors behind SamSam launched a devastating attack against Allscripts in January, 2018. As Allscripts worked its incident response plan, things started to unravel. Here are the lessons learned.

How to give your client a ‘wake-up call’ on cyber risk (Canadian Underwriter) Cyber insurance application forms can give companies a “good understanding” of how well prepared they are to deal with an information security-related loss, speakers said Thursday at the International Cyber Risk Management Conference in Toronto. “We have seen clients stop…

Symantec: Establish security procedures for the 'inevitable' smart office (ZDNet) Organisations soon won't be able to purchase office equipment that isn't internet connected, according to Symantec CTO Nick Savvides, and as a result will have to establish security policies in preparation.

CTIIC’s Role in Keeping America Safe in Cyber (The Cipher Brief) One day last May, employees of Britain’s health service logged on to their computers to find a startling discovery: their data had been encrypted, rendering it inaccessible until and unless they paid a ransom to have their data unscrambled and their access to it, returned. They were the first known victims of the WannaCry attack … Continue reading "CTIIC’s Role in Keeping America Safe in Cyber"

Let's stop talking about password strength (Security Boulevard) CC-BY licenseNear the top of most security recommendations is to use "strong passwords". We need to stop doing this.

Right behavior of employees lessens risks of cyber attacks (Saudigazette) He further said “it is effective because it provides practical trainings. Not only things to read, but also exercises and games because its the right way to retain the intention of employees. And tests, like sending fake fish campaign to understand who in the company is going to open the messages. It is a way to test their knowledge.”

Design and Innovation

Kaspersky Lab announces blockchain-based voting solution ‘Polys’ (EconoTimes) Cybersecurity company Kaspersky Lab has announced a blockchain-based online voting solution. A team of developers at Kaspersky Lab Business Incubator worked on an experimental project called Polys. They developed a...

Why has Satoshi Nakamoto remained anonymous? (Bravenewcoin) The Bitcoin whitepaper was first released towards the end of 2008 when its creator sent it to a number of recipients who were on a cryptography mailing list. Curiously, its creator assumed a fake identity under the pseudonym Satoshi Nakamoto that has persisted ever since.

How Facebook gives an asymmetric advantage to negative messaging (TechCrunch) Andrew Keen Contributor Andrew Keen is the author of three books: Cult of the Amateur, Digital Vertigo and The Internet Is Not The Answer. He produces Futurecast, and is the host of Keen On. More posts by this contributor Facebook co-founder says its rise reveals the fault lines destroying the R…

Microsoft launches Defending Democracy Program to protect against hacking and misinformation (BetaNews) Concern about Russian interference in both the US presidential election and the UK Brexit referendum highlighted the importance the internet now plays in political campaigns. But as well as being a powerful tool, it's also something that is open to abuse and manipulation.

Research and Development

Real-time detection of consumer IoT devices participating in DDoS attacks (Help Net Security) Could we detect compromised consumer IoT devices participating in a DDoS attack in real-time and do someting about it? A group of researchers Princeton University have presented some encouraging results showing that the first part of that equation can be relatively easily solved.

Cisco backs test to help classical crypto outlive quantum computers (Register) Borg helps Isara's post-quantum PKI cert test in the hope it future-proofs TLS

Academia

University of Virginia wins 2018 National Collegiate Cyber Defense Championship by protecting against network attacks from industry professionals (PR Newswire) University of Virginia prevailed over nine other finalist teams to win...

University of Arizona wins Deloitte's 2018 'Audit Innovation' competition (Accounting Today) The Eller College of Management team beat out 11 other schools for their ideas on applying AI to audits.

Networking helps Australia’s security industry steer cybersecurity students towards areas of greatest demand (CSO) Australian security firms looking for new cybersecurity talent have found great value in an AustCyber ‘speed dating’ event that this week gave around 130 aspiring cybersecurity students the chance to sit down with the experts that may one day employ them.

How NJ is sparking cybersecurity interest in high school girls (New Jersey 101.5) New Jersey high school girls do great in national cyber security competition.

Legislation, Policy, and Regulation

New Russia sanctions coming Monday, Haley says (POLITICO) Statement by US ambassador to the United Nations follows latest airstrikes on Syria.

Is America’s national security Facebook and Google’s problem? (TechCrunch) Jamie Metzl Contributor Share on Twitter Jamie Metzl is a Senior Fellow for Technology and National Security at the Atlantic Council. More posts by this contributor Homo Sapiens 2.0? We need a species-wide conversation about the future of human genetic enhancement Eleonore Pauwels Contributor Share…

Opinion | The Facebook hearings prove Congress needs technology policy experts (NBC News) The pace of technological change is hard for anyone to keep up with. But policy needs to reflect more than what worked a generation ago.

Russian Government Blocks Telegram, but Telegram Vows to Fight Back (Motherboard) The encryption debate has reached the Kremlin.

Lawmakers Call FBI's 'Going Dark' Narrative 'Highly Questionable' After Motherboard Shows Cops Can Easily Hack iPhones (Motherboard) US lawmakers have asked FBI Director Christopher Wray to answer questions around phone unlocking technology, after Motherboard found agencies have bought tools to crack iPhones.

Are MARSOC cyber operators on the horizon? (Marine Corps Times) The Raiders are working on plans to bring cyber capabilities to its teams.

National Guard preparing to defend cyberspace for states (FederalNewsRadio.com) National Guard units are ramping up their defensive cyber capabilities across the board, and will soon be able to quickly respond to cyber attacks in their home states and territories.

FBI Director Christopher Wray Announces Three Senior Executives (Imperial Valley News) FBI Director Christopher Wray has named executives to three senior leadership positions: David T. Resch as executive assistant director of the Criminal, Cyber, Response, and Services Branch; Andrew W. Vale as executive assistant director of the Human Resources Branch; and Nancy McNamara as assistant director in charge of the Washington Field Office.

Litigation, Investigation, and Law Enforcement

Watchdog report: Ex-FBI deputy director misled investigators (Federal Times) The report alleges that McCabe authorized FBI officials to speak with a Wall Street Journal reporter for a story about an investigation into the Clinton Foundation, in violation of agency rules, and then misled FBI and Justice Department officials when later questioned about it.

Prosecutors Say Cohen Under Investigation, Rebut Privilege Claims (New York Law Journal) Documents disclosed in the Southern District of New York show that Michael Cohen the personal lawyer for President Donald Trump is the subject of a criminal inquiry into his personal business dealings. He also received a $500000 alliance fee from Squire Patton Boggs.

Michael Cohen\'s Attorneys Claim Thousands of Privileged Documents Scooped Up in Raid (New York Law Journal) Counsel for President Trump said she'd only been brought on board Wednesday—two days after the White House and the world learned of the government's raid on Trump's attorney's offices.

Microsoft network engineer faces charges linked to Reveton ransomware (CSO Online) A Microsoft network engineer was charged with money laundering and conspiracy linked to Reveton ransomware.

US Navy Accused of Tech Piracy (Motherboard) The Navy is entangled in two long-running federal court cases involving intellectual property theft.

How a ‘Human Trafficking’ Narrative Was Used to Kill Backpage (Motherboard) Carl Ferrer, Backpage co-founder and CEO, pleaded guilty to charges of conspiracy to facilitate prostitution.

First Case Filed Under NYC's New Revenge Porn Law (Motherboard) An ex-boyfriend and other Tumblr users shared intimate photos of a CUNY associate professor. Now, she is fighting back using New York’s recently passed revenge porn legislation, and is putting much of the blame on Tumblr.

Just About Everyone with Bitcoin is Lying to the IRS (Gizmodo) Bitcoin may have peaked in terms of value and public interest in 2017, but the cryptocurrency has been far less popular this tax season. According to a recent report, fewer than 100 people have reported bitcoin holdings so far.

For a complete running list of events, please visit the Event Tracker on the CyberWire website.

Newly Noted Events

8th Annual (ISC)2 Security Congress (New Orleans, Louisiana, USA, October 8 - 10, 2018) The (ISC)2 Security Congress brings together the sharpest minds in cyber and information security for over 100 educational sessions covering 17 tracks. Join us to learn from the experts, share best practices,...

Upcoming Events

CYBERTACOS San Francisco (San Francisco, California, USA, April 16, 2018) CYBERTACOS is back and becoming one of the biggest cybersecurity networking events! Register today and join us for networking, food and drinks. This event includes a 45-minute meet the press panel made...

RSA Conference 2018 (San Francisco, California, USA, April 16 - 20, 2018) Take this opportunity to learn about new approaches to info security, discover the latest technology and interact with top security leaders and pioneers. Hands-on sessions, keynotes and informal gatherings...

Our Security Advocates (San Francisco, California, USA, April 17, 2018) OUR Security Advocates highlights a diverse set of experts from across information security, safety, trust, and other related fields. OURSA is a single-track, one-day conference with four topic sessions.

5th Annual Cybersecurity Summit (McLean, Virginia, USA, April 24, 2018) Join the Potomac Officers Club for the Fifth Annual Cybersecurity Summit to hear from public and private sector leaders on how federal agencies can improve their respective data security measures.

Secutech (Taipei, Taiwan, April 25 - 27, 2018) To meet the rising demand for intelligent and customised solutions, Secutech converges security and safety, ICT, IoT, artificial intelligence, big data, edge computing, intelligent video analytics and...

Industrial Control Systems (ICS) Cyber Security Conference Asia (Singapore, April 25 - 27, 2018) The Central ICS/SCADA Cyber Security Event of the Year for the APAC Region. Three days of multi-track training & workshops for days for operations, control systems and IT security professionals to connect...

INFILTRATE (Miami Beach, Florida, USA, April 26 - 27, 2018) INFILTRATE is a "pure offense" security conference aimed at the experienced to advanced practitioner. With the late-90s hacker con as its inspiration, the event has limited attendance in order to foster...

Automotive Cybersecurity Summit 2018 (Chicago, Illinois, USA, May 1 - 8, 2018) Smart Vehicles. Smart Infrastructures. The 2nd annual Automotive Cybersecurity Summit brings together public and private-sector manufacturers, suppliers, assemblers, technology providers and V2X partners...

Application of the Law of War to Cyber Operations (Washington, DC, USA, May 3, 2018) Cyber law experts meeting at the George Washington University will cover Title 10 vs. Title 32 vs. Title 50 and the lawful and operational restrictions related to these authorities. The panelists will...

Global Cyber Security in Healthcare & Pharma Summit (London, England, UK, May 3 - 4, 2018) The number of cyber-attacks in healthcare is on the rise, and the industry must do more to prevent and respond to these incidents. The Global Cyber Security in Healthcare & Pharma Summit 2018 will bring...

Secure Summit DC (Washington, DC, USA, May 7 - 8, 2018) (ISC)² Secure Summit DC will assemble the best minds in cybersecurity for two days of insightful discussions, workshops and best-practices sharing. The goal of the event is to equip security leaders to...

HACKNYC (New York, New York, USA, May 8 - 10, 2018) The recent flood of data breach news may numb us to the threat of attacks with kinetic effects--direct or indirect physical damage, injury, or death. Hack NYC focus’ on our preparation for, and resilience...

Insider Threat Program Management With Legal Guidance Training Course (Herndon, Virginia, USA, May 8 - 9, 2018) This training will provide the ITP Manager, Facility Security Officer, and others (CIO, CISO, Human Resources, IT, Etc.) supporting an ITP, with the knowledge and resources to develop, manage, or enhance...

SecureWorld Kansas CIty (Kansas City, Missouri, USA, May 9, 2018) Connecting, informing, and developing leaders in cybersecurity. SecureWorld conferences provide more content and facilitate more professional connections than any other event in the Information Security...

Cyber Investing Summit (New York, New York, USA, May 15, 2018) Now in its third year, the Cyber Investing Summit is an all-day conference focusing on investing in the cyber security industry, which is predicted to exceed $1 trillion in cumulative spending on products...

Third Annual Cyber Investing Summit (New York, New York, USA, May 15, 2018) Renowned cyber security executive David DeWalt will deliver the keynote address at the Third Annual Cyber Investing Summit. The Cyber Investing Summit is a unique all-day conference focused on the financial...

The Cyber Security Summit: Dallas (Dallas, Texas, USA, May 15, 2018) This event is an exclusive conference connecting Senior Level Executives responsible for protecting their company’s critical data with innovative solution providers & renowned information security experts.

Digital Utilitites Europe (Amserdam, the Netherlands, May 16 - 17, 2018) The conference will bring together key industry stakeholders to address the current challenges of the digitisation in the utilities sector. Join us in Amsterdam to hear latest business case studies and...

SecureWorld Houston (Houston, Texas, USA, May 17, 2018) Connecting, informing, and developing leaders in cybersecurity. SecureWorld conferences provide more content and facilitate more professional connections than any other event in the Information Security...

Ignite18 (Anaheim, California, USA, May 21 - 24, 2018) Palo Alto Networks' sixth annual conference features highly technical insights based on firsthand experiences with next-generation security technologies, groundbreaking new threat research, or innovative...

AFCEA/GMU Critical Issues in C4I Symposium (Fairfax, Virginia, USA, May 22 - 23, 2018) The AFCEA/GMU Critical Issues in C4I Symposium brings academia, industry and government together annually to address important issues in technology and systems research and development. The agenda for...

PCI Security Standards Council’s Asia-Pacific Community Meeting (Tokyo, Japan, May 23 - 24, 2018) Join us for: networking opportunities, updates on industry trends, insights and strategies on best practices, engaging keynotes and industry expert speakers. The PCI Security Standards Council’s 2018...

North American Financial Information Summit (New York, New York, USA, May 23, 2018) Data is the most vital asset of any financial services firm. With volumes increasing exponentially, and the complexity and structure continuously changing, it is more vital than ever to keep on top of...

SecureWorld Atlanta (Atlanta, Georgia, USA, May 30 - 31, 2018) Connecting, informing, and developing leaders in cybersecurity. SecureWorld conferences provide more content and facilitate more professional connections than any other event in the Information Security...

Grow your brand and reach new customers.

Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.

Be a part of the CyberWire story.

People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.