skip navigation

More signal. Less noise.

Combating threats and protecting the enterprise data in the digital workspace.

Digital workspaces bring enormous benefits to organizations and their employees across the globe, but require new thinking when it comes to security. In our perimeter-less digital world, protecting, detecting, and remediating threats requires intelligence-driven approaches. Check out VMware’s insightful white paper describing a new, comprehensive and predictive approach. It highlights the importance of securing the evolving digital workspace and the need for enterprises to embrace a framework of trust between the components in their ecosystem.

Daily briefing.

The US, British, and Australian governments yesterday unambiguously attributed a large-scale campaign against vulnerable routers to Russian security services. US-CERT (in an advisory worth reading in its entirety) identified the affected systems: "Generic Routing Encapsulation (GRE) Enabled Devices, Cisco Smart Install (SMI) Enabled Devices, [and] Simple Network Management Protocol (SNMP) Enabled Network Devices." These are, US-CERT notes, widely used by both enterprises and private individuals. Exploitation would need no zero-days. The campaign has successfully taken advantage of insecure legacy installations, beyond end-of-life systems that no longer receive patches, and other poor practices.

The governments making the attribution do so at a time of markedly increased tension between Russia and Western countries. The Salisbury nerve agent attack and Russian support of Syria's Assad regime contribute to those tensions. Observers in the US and UK suggest that Russia is preparing for a cyber campaign against critical infrastructure. Russian moves against connected devices strongly suggest ongoing battlespace preparation, and the prospective targets warn that Russia can expect retaliation should widespread attacks materialize. (British authorities have been notably direct in their warning.)

New US sanctions against Russia haven't yet appeared. They were expected as early as yesterday, but remain under consideration.

Chinese equipment manufacturer ZTE has been subjected to US sanctions, joining Huawei in the penalty box. The UK has also issued security warnings about Huawei devices.

Lookout finds "highly targeted" Desert Scorpion surveillanceware in Google Play. It's associated with APT-C-23, and seems most interested in Palestinian targets. Google has removed it from Play.


Today's issue includes events affecting Australia, China, Iran, Russia, Syria, United Kingdom, United States.

Cyber is the new battlefield.

Become a Cyber Spartan and Defend the Gates of America. At Invictus International Consulting we are hiring elite cyber, intelligence, and technology experts to serve our government and commercial clients. Join us.

In today's podcast we speak with our partners at Accenture, as Justin Harvey (joined for the occasion by the head of Accenture's Cyber Defense team, Ryan LaSalle) discuss their 2018 State of Cyber Resilience report. Our guest, Jason Brvenik from NSS Labs, talks us through their Advanced Endpoint Protection (AEP) Group Test, the results of which are being publicly released today.

XM Cyber is coming to RSA (San Francisco, California, United States, April 16 - 20, 2018) Visit XM Cyber at the Israeli Pavilion, South Hall booth 635, to experience the first automated APT simulation platform to expose, assess and amend every attack path to organizational critical assets.

HackNYC2018 (New York, New York, United States, May 8 - 10, 2018) Cyber attacks are often called non-violent or non-kinetic attacks, but the simple truth is that there is a credible capability to use cyber attacks to achieve kinetic effects. Kinetic Cyber refers to a class of cyber attacks that can cause direct or indirect physical damage, injury or death solely through the exploitation of vulnerable information systems and processes. Use code CWIRE20 for 20% off the $50.00 individual ticket price.

8th Annual (ISC)2 Security Congress (New Orleans, Louisiana, United States, October 9 - 11, 2018) The (ISC)2 Security Congress brings together the sharpest minds in cyber and information security for over 100 educational sessions covering 17 tracks. Join us to learn from the experts, share best practices, and make invaluable connections. Your all-access conference pass includes educational sessions, workshops, keynotes, networking events, career coaching, expo hall and pre-conference training. Save your seat at

Dateline RSA Conference 2018

RSAC Innovation Sandbox Leaderboard (RSA Conference) Each year, emerging infosec organizations from around the world come together to compete at the RSAC Innovation Sandbox Contest.

Here’s Your Federal RSA Rundown (NextGov) Officials from DHS, DARPA and NIST are all on the docket.

Microsoft and Intel to use GPU power to identify cyber threats in memory (Computing) New approach to security sparked by Spectre and Meltdown flaws

Securing the Digital World: Intel Announces Silicon-Level Security Technologies, Industry Adoption at RSA 2018 (Intel Newsroom) Microsoft and Cisco Integrate New Intel Threat Detection Technology to Help Defend Against Advanced Security Threats

Microsoft unveils new cloud and edge security offerings (CRN Australia) Revealed at the 2018 RSA security conference in San Francisco.

Cylance Showcases AI Powered Endpoint Detection and Response Solution at RSA 2018 Conference (BusinessWire) Cylance Inc., the company that revolutionized endpoint security with true AI powered threat prevention, today announced its AI driven endpoint detecti

Akamai 2018 Spring Release, In A Nutshell (Security Boulevard) Akamai's most comprehensive and integrated intelligent cloud delivery platform has been serving as the crucial foundation for our customer's growing digital businesses by helping deliver amazing digital experiences their end users expect.

Anomali Announces Collaboration With Microsoft, Providing Customers With Unique Insights Into Their Threat Data (BusinessWire) Anomali, a leading provider of threat management solutions, announced today a collaboration with Microsoft to integrate threat intelligence from the A

Anomali Partners with Visa to Offer Global Payment Breach Intelligence (BusinessWire) Anomali, the leading provider of threat management and collaboration solutions, announced today a partnership with Visa to provide cyber security team

CRN Exclusive: Recorded Future Turns To The Channel To Help Build Integrations With Other Vendors (CRN) Recorded Future expects to encounter security vendors with the money but not the staff, to build integrations as the threat intelligence vendor grows its new Connect Xchange technology partner community.

Cisco Doubles Down on Security Innovation and Investment to Protect the Endpoint and Email (Cisco: the Network) Cisco Introduces New Email Security Services to More Effectively Prevent Phishing and Spoofing Attacks

McAfee Expands Cloud Security Program (SecurityWeek) New cloud security services from McAfee are centered on securing containers in the cloud, and adding consistent security to third-party cloud services.

FireMon Introduces New Global Policy Controller; Delivers Frictionless Network Security Management for the Hybrid Enterprise (Firemon) FireMon Introduces New Global Policy Controller; Delivers Frictionless Network Security Management for the Hybrid Enterprise

RedLock, Barracuda Join Forces to Help Organizations With a Cloud Threat Defense Strategy (WLNS) From the RSA Conference – RedLock, the Cloud Threat Defense company, and Barracuda Networks Inc., a provider of cloud-enabled security and data protection solutions, today announced their joint efforts to help organizations fulfill their responsibilities in securing public cloud environments.

CSS to Showcase Futureproof Digital Identity Solutions for Today's Enterprise & Internet of Things (IoT) at RSA Conference 2018 (PR Newswire) Next Generation, Crypto-Agile Public Key Infrastructure (PKI) and Digital Certificate Management Solutions Fit for Today's Enterprise and the Post-Quantum Computing Era

Qualys Brings Web Application Security to DevOps (PR Newswire) RSA® Conference 2018, Booth #N3815 – Qualys, Inc. (NASDAQ: QLYS), a...

Qualys Announces Two New Free Groundbreaking Services to Help Organizations Gain Visibility of their Digital Certificates and Cloud Assets (PR Newswire) RSA® Conference 2018, Booth #N3815 -- Qualys, Inc. (NASDAQ: QLYS), a...

Media Alert: CIO/CISO Interchange Launches With The Mission To Facilitate Building Security Into The Fabric Of Digital Transformation (PR Newswire) CIO/CISO Interchange, a new non-profit, non-commercial organization,...

Aqua Security Collaborates with VMware to Deliver Runtime Application Protection Across Virtualized and Container-Based Environments (Aqua) Aqua Security, the market-leading platform provider for securing containers and cloud-native applications, today announced a collaboration with VMware that will enable customers to protect applications deployed across both …

Teramind Prevents Insider Threats Combining New Data Loss Prevention F (PRWeb) Teramind Inc. (RSA booth #5110), a provider of insider threat solutions, today announced a new approach to data loss prevention that will continue to help

Echoing TRITON, CyberX's Innovative ICS Security Research Selected for 'Hackers & Threats' Session at the 2018 RSA Conference (PR Newswire) CyberX, the IIoT and industrial control system (ICS) security company, today...

ERPScan Won the Best AI-driven Cybersecurity Product Nomination (PR Newswire) PALO ALTO, Calif., April 17, 2018 /PRNewswire/ -- ERPScan announced today that Cyber Defense Magazine, the industry's...

Rambus Launches CryptoManager RISC-V Root of Trust Programmable Secure Processing Core (BusinessWire) Rambus Inc. (NASDAQ: RMBS) today announced the availability of the CryptoManager Root of Trust, a fully programmable hardware security core built with

IoT Security Milestone for Intrinsic ID Authentication: More Than 100 (PRWeb) Intrinsic ID, the world’s leading provider of digital authentication technology for Internet of Things security and embedded applications, tod

Passwordless enterprise authentication on Windows 10 and Azure AD (Help Net Security) Yubico announced that the new Security Key by Yubico supporting FIDO2 will be supported in Windows 10 devices and Microsoft Azure Active Directory (Azure AD). The feature is currently in limited preview for Microsoft Technology Adoption Program (TAP) customers.

Barracuda Introduces Innovative Approach to Measure Resistance to Phishing Attacks (News Room | Barracuda Networks) PhishLine Levelized Programs Provide an Effective Alternative to Click Rate Metrics

Radware Joins the Cyber Threat Alliance (GlobeNewswire News Room) Non-Profit Organization Brings Together Cyber Security Practitioners to Share Threat Information and Speed Adoption of Preventative Measures

Maryland cybersecurity companies head to San Francisco for RSA Conference ( Baltimore) From events to exhibitions, here's a look at the various ways Maryland has a presence at the big event.

Specialty cyber analytics and underwriting firm, Envelop Risk launches ( A new global specialty cyber insurance analytics and underwriting company has launched, called Envelop Risk. Envelop Risk announced the launch of its business at the RSA conference in San Francisco, explaining that it provides cyber risk underwriting to insurers and reinsurers, and partners with cyber security

Cyber Attacks, Threats, and Vulnerabilities

Russia Steps Up Hacking, Spurring U.S.-U.K. Warning on Risk (Bloomberg) Threat to attack networks through routers cited by officials

Russian cyberattacks have targeted millions of computers, including home wifi routers (Times) A global Russian hacking offensive has targeted millions of computers to spy on governments and lay the foundation for an attack on infrastructure, Britain and the United States warned last night.

Russian State-Sponsored Cyber Actors Targeting Network Infrastructure Devices (US-CERT) Since 2015, the U.S. Government received information from multiple sources—including private and public sector cybersecurity research organizations and allies—that cyber actors are exploiting large numbers of enterprise-class and SOHO/residential routers and switches worldwide. The U.S. Government assesses that cyber actors supported by the Russian government carried out this worldwide campaign. These operations enable espionage and intellectual property that supports the Russian Federation’s national security and economic goals.

U.S. and U.K. Jointly Warn of Russian Cyberattacks (Wall Street Journal) U.S. and U.K. intelligence agencies said Russian cyberattackers are targeting critical internet infrastructure to spy on Western companies and governments, the latest salvo in a diplomatic crisis.

UK And US Accuse Russia Of Hacking Home Routers In Global Cyberattacks (Forbes) A little warning from the British and American governments today: Kremlin-funded spies might have found a way into your home office.

Australian government condemns Russian hackers for attack on Cisco devices (CRN Australia) Routers and switches were targeted in attacks last year.

The White House Warns on Russian Router Hacking, But Muddles the Message (WIRED) By scolding Russia for what looks like typical espionage, the US and UK are blurring red lines in cybersecurity.

If Russia launches a cyber attack on the UK, this is what we can do (The Independent) As tensions rise with Russia, both over the Salisbury incident and the recent strikes on Syria, the risk of a serious cyber attack on the UK has gone up substantially. So, what do we expect?

U.S., Britain Issue Warnings Over Chinese Telecom Equipment Maker ZTE (Wall Street Journal) U.S. and British officials both issued warnings over giant Chinese telecommunications-equipment ZTE, signaling sharply escalating Western scrutiny of the sector.

Lookout finds new surveillanceware in Google Play with ties to known threat actor targeting the Middle East (Lookout Blog) Lookout researchers have identified a new, highly targeted surveillanceware family known as Desert Scorpion in the Google Play Store.

mAPT ViperRAT Found in Google Play (Lookout Blog) Lookout researchers discovered samples belonging to the ViperRAT malware family, a known mobile advanced persistent threat (mAPT), in the Google Play Store.

Security Patches, Mitigations, and Software Updates

Tracking protection in Firefox for iOS now on by default – why this matters (Naked Security) Turning it on by default might sound like a mere tweak, but its the first version of the browser to do this without the user having to consciously turn it on.

Cyber Trends

CenturyLink 2018 Threat Report (CenturyLink) As cyber threats proliferate, businesses, governments and consumers often seek to find the silver bullet for cyber security issues.

Why Mass Transit Could Be the Next Big Target for Cyber Attacks—and What to do About it (SecurityWeek) The constantly evolving tools and methods of cyber attackers has resulted in specific industries becoming the unfortunate subjects of sudden upswings in incident volume and severity.


Cybersecurity and Disruptive Innovations Top List of Concerns for Corporate Boards in 2018 (PR Newswire) Corporate Board Member, a division of Chief Executive Group and a...

70,000 contractors must get notarized letters in next 60 days to continue working for government ( The General Services Administration's System for Award Management still is recovering from a second fraud incident in the last three years.

2 days of DoD cloud chatter leaves us all continuing to guess ( Contractors and former Defense officials have been ringing the alarm bells over what many see is an internal preference for the military to move to Amazon Web Services.

Could FireEye Be a Millionaire Maker Stock? (The Motley Fool) The company has all the makings for all-star returns, but it hasn’t panned out.

Products, Services, and Solutions

Introducing Ember: An Open Source Classifier and Dataset (Endgame) Over the last decade, machine learning has achieved truly impressive results in fields such as optical character recognition, image labeling, and speech recognition. Advancements in hardware and rapidly growing datasets have been instrumental in this progress, as has the presence of public, open-source, benchmark datasets to track advancements in the field.

Great Bay Software Launches New Network Intelligence Platform to Provide Unmatched Visibility into IoT & Medical Devices on Hospital Networks (PR Newswire) Great Bay Software, a leader in Internet of Things (IoT) security and...

Bring Your Own Encryption to the Public Cloud | BYOE Solutions (Thales eSecurity) Thales eSecurity offers multi-cloud advanced Bring Your Own Encryption (BYOE) to secure your data and reach compliance effectively.

Pragma Crypto, SSH Server & Client Awarded New FIPS-140-2 Certificate (PR Newswire) Pragma Systems, a leading SSH and security software provider, announces...

Remediant Expands Ability to Bring a New Level of Control and Insight Over Privileged Access Through Partner Agreement with Optiv Security (PR Newswire) Remediant today announced participation in Optiv Security's, partner...

Tripwire Debuts Early Access Program for Container Analyzer Service (Tripwire) Security solution expands vulnerability visibility across DevOps life cycle

Symantec Releases Targeted Attack Analytics Tool (SecurityWeek) Symantec is releasing its own targeted attack analytics (TAA) tool to existing Symantec Advanced Threat Protection (ATP) customers free of additional charge.

IBM Adds Intelligence to Incident Response, Threat Management (SecurityWeek) IBM adds intelligent orchestration capabilities to incident response platform and launches new threat and vulnerability management service

EU approves Sectra’s secure smartphone for classified information (Sectra) International medical imaging IT and cybersecurity company Sectra’s (STO: SECT B) encrypted smartphone, Sectra Tiger®/R, has been approved by the European Union (EU) for the communication of information at the RESTRICTED security level (RESTREINT UE/EU RESTRICTED).

DNotes Global, Inc. Announces May 12 Cryptopia Listing Date for DNotes 2.0 (DNotes Global) DNotes Global, Inc. today announced that its DNotes 2.0 digital currency will be listed on the Cryptopia exchange, effective May 12, 2018.

Technologies, Techniques, and Standards

Signing pledge to fight cyberattacks, 34 leading companies promise equal protection for customers worldwide (Cybersecurity Tech Accord) The Cybersecurity Tech Accord is a public commitment among 34 global companies to protect and empower civilians online and to improve the security, stability and resilience of cyberspace.

Research and Development

DOE Announces Investment to Strengthen and Secure the Nation’s Critical Energy Infrastructure ( DOE Announces Investment to Strengthen and Secure the Nation’s Critical Energy Infrastructure

Legislation, Policy, and Regulation

White House says Russia sanctions still under consideration (Military Times) The White House scrambled Monday to walk back U.N. Ambassador Nikki Haley’s weekend announcement that new economic sanctions against Russia are imminent, but stressed the penalties are still being considered.

Russia wants Google and Apple to ban Telegram from their app stores (Computing) Russia continues with its assault on encrypted messaging service Telegram

Why New Russia Sanctions Won't Change Moscow's Behavior (Foreign Affairs) The newest round of U.S. sanctions against Russia are unlikely to produce any substantive policy changes from Moscow.

US slaps ZTE with seven-year sales ban a day after NCSC issues security warning over ZTE kit (Computing) ZTE accused of breaking the terms of a settlement over sanctions busting

U.S. Weighs New Trade Action Against China, Over Curbs on Tech Companies (Wall Street Journal) The U.S. is examining ways to retaliate against Beijing’s restrictions on U.S. providers of cloud computing and other high-tech services, effectively opening a new front on its trade offensive against China.

US senators introduce new war authorization with no expiration date (Defense News) Congress wrestles to update presidential 'war on terror' authorization

White House loses cyber coordinator amid adviser exodus (Fifth Domain) Rob Joyce will return to the NSA amid a steady exodus from Trump administration advisory positions.

Litigation, Investigation, and Law Enforcement

Facebook to face US class-action lawsuit over facial recognition photo tagging (Computing) Facebook tagged used facial recognition technology without users' explicit consent

FBI sought search warrant for CIA, NSA chief Michael Hayden's private email account: Report (Washington Examiner) The FBI filed an application for a search warrant in 2012 for an email account belonging to Michael Hayden, former head of the National Security Agency and CIA, demonstrating the breadth of the Obama administration’s efforts to pursue leaks of classified information to the press.

For a complete running list of events, please visit the Event Tracker on the CyberWire website.

Newly Noted Events

3rd Annual Nuclear Industrial Control Cybersecurity and Resilience Overview (Warrington, England, UK, May 22 - 23, 2018) Now in its 3rd year, the Cyber Senate Nuclear Industrial Control Cyber Security and Resilience Conference will take place on May 22/23rd in Warrington United Kingdom. This two day executive forum will...

Nuclear Asset Information Monitoring and Maintenance (Warrington, England, UK, July 3 - 4, 2018) On July 3rd and 4th in Warrington United Kingdom, nuclear industry leaders will meet for the IoE Events Nuclear Asset Information, Monitoring and Maintenance conference to further develop the sector’s...

Gartner Security and Risk Management Summit 2018 (National Harbor, Maryland, USA, June 4 - 7, 2018) Prepare to meet the pace and scale of today’s digital business at Gartner Security & Risk Management Summit 2018. Transform your cybersecurity, risk management and compliance strategies and build resilience...

Cyber Security Summit 2018 (Newport, Rhode Island, USA, July 18 - 20, 2018) Join us for Opal Group’s Cyber Security Summit – set in Newport, RI, this premier event will gather C-Level & Senior Executives responsible for defending their companies’ critical infrastructures together...

5th Annual Industrial Control Cyber Security USA (Sacramento, California, USA, September 18 - 19, 2018) Now in its 5th year, this two day executive forum will include presentations, roundtable working groups and panel sessions. Together we will address the escalating cyber risk and resilience challenges...

2nd Annual Aviation Cyber Security Summit Summit (London, England, UK, November 6 - 7, 2018) Now in its 2nd year, the Cyber Senate Aviation Cyber Security and Resilience Summit (AVCIP2018) will take place on 6th and 7th in London United Kingdom 2018. This two-day executive forum will include presentations,...

Upcoming Events

Our Security Advocates (San Francisco, California, USA, April 17, 2018) OUR Security Advocates highlights a diverse set of experts from across information security, safety, trust, and other related fields. OURSA is a single-track, one-day conference with four topic sessions.

5th Annual Cybersecurity Summit (McLean, Virginia, USA, April 24, 2018) Join the Potomac Officers Club for the Fifth Annual Cybersecurity Summit to hear from public and private sector leaders on how federal agencies can improve their respective data security measures.

Secutech (Taipei, Taiwan, April 25 - 27, 2018) To meet the rising demand for intelligent and customised solutions, Secutech converges security and safety, ICT, IoT, artificial intelligence, big data, edge computing, intelligent video analytics and...

Industrial Control Systems (ICS) Cyber Security Conference Asia (Singapore, April 25 - 27, 2018) The Central ICS/SCADA Cyber Security Event of the Year for the APAC Region. Three days of multi-track training & workshops for days for operations, control systems and IT security professionals to connect...

INFILTRATE (Miami Beach, Florida, USA, April 26 - 27, 2018) INFILTRATE is a "pure offense" security conference aimed at the experienced to advanced practitioner. With the late-90s hacker con as its inspiration, the event has limited attendance in order to foster...

Automotive Cybersecurity Summit 2018 (Chicago, Illinois, USA, May 1 - 8, 2018) Smart Vehicles. Smart Infrastructures. The 2nd annual Automotive Cybersecurity Summit brings together public and private-sector manufacturers, suppliers, assemblers, technology providers and V2X partners...

Application of the Law of War to Cyber Operations (Washington, DC, USA, May 3, 2018) Cyber law experts meeting at the George Washington University will cover Title 10 vs. Title 32 vs. Title 50 and the lawful and operational restrictions related to these authorities. The panelists will...

Global Cyber Security in Healthcare & Pharma Summit (London, England, UK, May 3 - 4, 2018) The number of cyber-attacks in healthcare is on the rise, and the industry must do more to prevent and respond to these incidents. The Global Cyber Security in Healthcare & Pharma Summit 2018 will bring...

Secure Summit DC (Washington, DC, USA, May 7 - 8, 2018) (ISC)² Secure Summit DC will assemble the best minds in cybersecurity for two days of insightful discussions, workshops and best-practices sharing. The goal of the event is to equip security leaders to...

HACKNYC (New York, New York, USA, May 8 - 10, 2018) The recent flood of data breach news may numb us to the threat of attacks with kinetic effects--direct or indirect physical damage, injury, or death. Hack NYC focus’ on our preparation for, and resilience...

Insider Threat Program Management With Legal Guidance Training Course (Herndon, Virginia, USA, May 8 - 9, 2018) This training will provide the ITP Manager, Facility Security Officer, and others (CIO, CISO, Human Resources, IT, Etc.) supporting an ITP, with the knowledge and resources to develop, manage, or enhance...

SecureWorld Kansas CIty (Kansas City, Missouri, USA, May 9, 2018) Connecting, informing, and developing leaders in cybersecurity. SecureWorld conferences provide more content and facilitate more professional connections than any other event in the Information Security...

Cyber Investing Summit (New York, New York, USA, May 15, 2018) Now in its third year, the Cyber Investing Summit is an all-day conference focusing on investing in the cyber security industry, which is predicted to exceed $1 trillion in cumulative spending on products...

Third Annual Cyber Investing Summit (New York, New York, USA, May 15, 2018) Renowned cyber security executive David DeWalt will deliver the keynote address at the Third Annual Cyber Investing Summit. The Cyber Investing Summit is a unique all-day conference focused on the financial...

The Cyber Security Summit: Dallas (Dallas, Texas, USA, May 15, 2018) This event is an exclusive conference connecting Senior Level Executives responsible for protecting their company’s critical data with innovative solution providers & renowned information security experts.

Digital Utilitites Europe (Amserdam, the Netherlands, May 16 - 17, 2018) The conference will bring together key industry stakeholders to address the current challenges of the digitisation in the utilities sector. Join us in Amsterdam to hear latest business case studies and...

SecureWorld Houston (Houston, Texas, USA, May 17, 2018) Connecting, informing, and developing leaders in cybersecurity. SecureWorld conferences provide more content and facilitate more professional connections than any other event in the Information Security...

Ignite18 (Anaheim, California, USA, May 21 - 24, 2018) Palo Alto Networks' sixth annual conference features highly technical insights based on firsthand experiences with next-generation security technologies, groundbreaking new threat research, or innovative...

AFCEA/GMU Critical Issues in C4I Symposium (Fairfax, Virginia, USA, May 22 - 23, 2018) The AFCEA/GMU Critical Issues in C4I Symposium brings academia, industry and government together annually to address important issues in technology and systems research and development. The agenda for...

PCI Security Standards Council’s Asia-Pacific Community Meeting (Tokyo, Japan, May 23 - 24, 2018) Join us for: networking opportunities, updates on industry trends, insights and strategies on best practices, engaging keynotes and industry expert speakers. The PCI Security Standards Council’s 2018...

North American Financial Information Summit (New York, New York, USA, May 23, 2018) Data is the most vital asset of any financial services firm. With volumes increasing exponentially, and the complexity and structure continuously changing, it is more vital than ever to keep on top of...

SecureWorld Atlanta (Atlanta, Georgia, USA, May 30 - 31, 2018) Connecting, informing, and developing leaders in cybersecurity. SecureWorld conferences provide more content and facilitate more professional connections than any other event in the Information Security...

RISKSEC (New York, New York, USA, May 31, 2018) Welcome to the 2018 New York City RiskSec Conference. As SC Media approaches our 30th anniversary, we fully understand the avalanche of cybersecurity-related problems, responsibilities and aspirations...

Grow your brand and reach new customers.

Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.

Be a part of the CyberWire story.

People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.