skip navigation

More signal. Less noise.

Looking for an introduction to AI for security professionals?

Your wait is over. A new book is out from the Cylance data science team, covering artificial intelligence and machine learning techniques in practical situations to improve the security professional’s ability to thrive in a data driven world. Whether you are reviewing logs or analyzing malware, being able to derive meaningful results and improve productivity is key. Order your free copy today.

Daily briefing.

Congress has told US Energy Secretary Perry they expect prompt action to ensure power grid's security. Secretary Perry expressed confidence that the grid is capable of resisting Russian cyberattacks.

Facebook faces a very strong consumer backlash over the Cambridge Analytica affair. While Cambridge Analytica appears to have used data from Facebook in unanticipated ways, there are now more reports of similar use of customer information by others, including other political campaigns and consultants. The case is not a data breach, but rather analysis and use of information the owners provided Facebook. The US Congress intends to summon Facebook executives to testify on the company's data use policies, and the Federal Trade Commission has opened an investigation. There's international investigative interest as well: both the British and European Parliaments want to hear from Facebook's leaders.

Many observers call this a tipping point for the tech industry as a whole, dependent as it is on its ability to monetize personal information for marketing. A piece in the San Jose Mercury News suggests that Silicon Valley is ripe for anti-trust and other strong regulatory treatment. The Mercury News calls public mistrust and resentment "unprecedented," but there is a precedent, just not in the tech sector: Silicon Valley increasingly looks like the oil and steel sectors did when the trust-busters turned on them at the end of the 19th Century's Gilded Age.

The faces of Facebook, Mark Zuckerberg and Sheryl Sandberg, have been little seen. Many suggest it's time for them to lean in.

Notes.

Today's issue includes events affecting Canada, European Union, Iran, Democratic Peoples Republic of Korea, Russia, United Kingdom, United States.

A note to our readers: the CyberWire is happy to have been selected as a finalist for the Maryland Cybersecurity Diversity Award (and the Cybersecurity Association of Maryland's People's Choice Award). You can find out more about the awards (and how to vote for us, if you'd like) here. Voting has been extended now that weather has postponed the event until March 27th.

Don’t be liable for your third party’s data breach

Third party risk has spiked in the past few years, and with new regulations – GDPR, NY Cyber Regulations, etc. – in place, organizations need to be as informed as possible to arm themselves against a third party breach. However, third party risk exists across a spectrum – and not all vendors require the same level of attention. Read more in our eBook to learn how to match your solution to your third party risk.

In today's podcast we speak with our partners at the University of Maryland, as Jonathan Katz discusses the security of e-passports. Our guest is J.R. Cunningham from Optiv, who'd like to advise everyone not to get too carried away with GDPR. 

Cyber Security Summits: Denver on March 22 & May 15 in Dallas (Denver, Colorado, USA, March 22, 2018) Sr. Level Executives are invited to learn about the latest threats & solutions in Cyber Security from experts from The FBI, Darktrace, IBM and more. Register with promo code cyberwire50 for half off your admission (Regular price $350) https://CyberSummitUSA.com

The Startup Journey: From Public Service to Successful Entrepreneurship (Fulton, Maryland, USA, March 22, 2018) At this DataTribe Meetup, Will Grannis, Managing Director Google CTO Office, will discuss his professional experiences spanning across entrepreneurship, public service, and Silicon Valley. Free food & beverages will be provided.

CYBERTACOS San Francisco (San Francisco, California, United States, April 16, 2018) CYBERTACOS is back and becoming one of the biggest cybersecurity networking events! Register today and join us for networking, food and drinks. This event includes a 45-minute meet the press panel made up of influential security reporters who will discuss what they are covering and how to best work with them.

XM Cyber is coming to RSA (San Francisco, California, United States, April 16 - 20, 2018) Visit XM Cyber at the Israeli Pavilion, South Hall booth 635, to experience the first automated APT simulation platform to expose, assess and amend every attack path to organizational critical assets.

Cyber Attacks, Threats, and Vulnerabilities

Idle Threats Or a Harbinger of Things to Come? (CyberDB) How nation states respond to cyber attacks and significant cyber incidents can influence on what accused governments may do in response to any retaliation.

Critical Infrastructure: Stop Whistling Past the Cyber Graveyard (Dark Reading) An open letter to former colleagues in Homeland Security, peers in private sector cybersecurity firms, those who own and operate critical systems, academics, and politicians.

Azure Guest Agent Design Enables Plaintext Password Theft (Dark Reading) Researchers find attackers can abuse the design of Microsoft Azure Guest Agent to recover plaintext administrator passwords.

15-Year-old Finds Flaw in Ledger Crypto Wallet (KrebsOnSecurity) A 15-year-old security researcher has discovered a serious flaw in cryptocurrency hardware wallets made by Ledger, a French company whose popular products are designed to physically safeguard public and private keys used to receive or spend the user’s cryptocurrencies.

Fake Amazon ad ranks top on Google search results (Naked Security) A tech support scam disguised as an Amazon ad was showing up above even the legitimate Amazon.com search result.

Hackers steal banking & personal data of 800,000 Orbitz customers (HackRead) Hackers have stolen personal and banking data of 800,000 Orbitz customers in a massive data breach that was identified on 1st March 2018.

Your old router could be a hacking group’s APT pawn (The Parallax) Symantec researchers say Inception Framework is hijacking vulnerable old routers to forward malicious traffic and thus obscure the source of its advanced persistent threats.

DDoS Attacks Are $10 per Hour on the Dark Web (BleepingComputer) A report released today by UK threat intelligence firm Armor shines a light on the prices practiced on Dark Web markets for a wide range of cybercrime-related services.

A look inside the big business of cybercrime (Help Net Security) Unlike the legitimate economy, the underground market is highly anonymized and can be difficult to access. Still, the big business of cybercrime is making some people very rich.

A Look at Cybercrime's Banal Nature (Dark Reading) Cybercrime is becoming a more boring business, a new report shows, and that's a huge problem for victims and law enforcement.

Insider threat examples: 7 insiders who breached security (CSO Online) You can build a wall, set up perimeter defenses, and spend massive resources maintaining it all. But if your enemy is within, that wall will do you no good.

Given Facebook’s Privacy Backlash, Why Aren’t We Angrier With the Broadband Industry? (Motherboard) If you're mad about Cambridge Analytica taking data from Facebook you should be absolutely livid about AT&T and Verizon.

Email Fraud is a Top Business Risk for 2018 (Infosecurity Magazine) Businesses concerned about email phishing campaigns

Security Patches, Mitigations, and Software Updates

AMD promises firmware fixes for security processor bugs (Ars Technica) All bugs require administrative access to exploit.

Apple burns the HSTS super cookie (Naked Security) HSTS tracking has been reduced to crumbs.

Cyber Trends

As Facebook security chief denies exit, you should know your data is bought, sold | WRAL TechWire (WRAL TechWire) Facebook's top security chief said he is still with the company following reports that his tenure may soon be over. The discussion about his status continues as it becomes clear that Facebook user information is Facebook's currency.

Spooked by the Facebook privacy violations? This is how much your personal data is worth on the dark web (MarketWatch) The chilling reasons the value of your personal data varies wildly, depending on how you lost it.

Armor’s ‘Black Market’ Report Highlights The Big Business of Cybercrime (BusinessWire) Proving the life of cybercrime does pay, Armor, today released its Black Market Report, exposing the hacker underground and detailing popular tools and services cybercriminals are peddling, as well as what types of data hold the most value.

The Black Market Report (Armor) In the web’s darkest corners, malware, hacking services, stolen data and more are changing digital hands every day. These underground marketplaces are where threat actors and cyber criminals buy and sell the tools and information they need to commit all kinds of fraud and all manner of attacks.

Understanding email fraud: Do you have visibility into email threats? (Help Net Security) Email fraud, also known as business email compromise (BEC), is one of today’s greatest cyber threats. These highly targeted, socially engineered attacks seek to exploit people rather than technology. They are difficult to combat with traditional security tools.

The future of computer security is machine vs machine (CSO Online) Better security automation at the OS level and via cloud services will force hackers to respond in kind.

Middle East oil and gas companies are unprepared to address OT cyber risk (Help Net Security) Cyber security breaches in the Middle East are widespread and frequently undetected, with 30 percent of the region’s attacks targeting operational technology, finds a study by Siemens and Ponemon Institute.

Meet the guy who went to North Korea to teach Bitcoin (Express VPN) North Korea is in virtual internet lockdown. So how did Federico Tenga end up teaching North Koreans about a lucrative cyber currency?

Do Americans Ever Change Their Passwords (Varonis Blog) Just how cautious are Americans when it comes to cybersecurity? In today’s hyper-connected, highly-digitized society, data breaches are becoming increasingly commonplace. And they affect both corporations and individuals.

Marketplace

​Beware marketers, the consumer data collection blowback is just starting (ZDNet) Deloitte found that 93 percent of consumers would want to delete their personal data held by various companies. Why? These consumers have little faith that service providers can secure it.

A Hurricane Flattens Facebook (WIRED) As the Cambridge Analytica story broke over the weekend, Facebook has struggled to formulate a response.

Facebook reaches a tipping point (Axios) With the Cambridge Analytica scandal, people seem less willing to hear its side of the story.

Cambridge Analytica Suspends CEO Alexander Nix Amid Scandals (WIRED) Alexander Nix has been suspended until further notice and replaced by Cambridge's head of data, Alexander Tayler.

After selling his company to Facebook for $19B, Brian Acton joins #deleteFacebook (TechCrunch) Brian Acton, the co-founder of messaging service WhatsApp (which Facebook bought in 2014 for $19 billion), is now joining the chorus of the #deletefacebook movement. It is time. #deletefacebook — Brian Acton (@brianacton) March 20, 2018 A tipster alerted us to the fact that Acton made the sam…

Cramer Remix: Here's how Mark Zuckerberg should respond to Facebook's crisis (CNBC) "Mad Money" host Jim Cramer explains why Facebook's current approach isn't working and how the company should proceed.

Who’s Afraid of Huawei? Security Worries Spread Beyond the U.S. (Wall Street Journal) National-security concerns surrounding China’s Huawei Technologies—the world’s biggest supplier of wireless equipment and No. 3 vendor of smartphones—are spreading to key allies.

DoD awards five-year cybersecurity training contract with Chiron Technology Services (Military Embedded Systems) Cyber services and training company Chiron Technology Services has won a five-year, sole-source contract from the Department of Defense (DoD) to deliver cyber training that supports the readiness of U.S. military forces to operate at top efficiency in cyberspace.

Cyber Threat Alliance Welcomes Juniper Networks as Newest Member (Cyber Threat Alliance) The Cyber Threat Alliance (CTA) today announced that Juniper Networks (NYSE:JNPR), an industry leader in automated, scalable and secure networks, is the latest company to join the organization as an Affiliate member.

GlobalPlatform and IoT Connectivity Alliance Sign Memorandum of Understanding (GlobalPlatform) GlobalPlatform is a not-for-profit industry association which advances standards to facilitate the secure and interoperable management of applications on secure chip technology.

Products, Services, and Solutions

Enhancements to CA Veracode Verified Program Validates Secure Coding for DevOps and Agile Processes (NASDAQ.com) Veracode, Inc., a leader in securing the world’ s software, acquired by CA Technologies, announced the evolution.

Alphabet's 'Outline' Software Lets Anyone Run a Homebrew VPN (WIRED) Alphabet tech incubator Jigsaw wants to make it easy to run your own, more private virtual private network.

Technologies, Techniques, and Standards

GDPR is more important than ever: The Cambridge Analytica-Facebook meltdown (CSO Online) Why its critical – existential in fact – for us to do our own “analytica” in this day and age.

Here's How To Actually Delete Your Social Media Accounts (WIRED) Breaking up is hard to do. Harder yet when there's a deactivation period.

4 Things You Need To Know Before Deleting Facebook () If you're thinking of deleting your Facebook account, here's how to save your photos, continue using Messenger, and keep your friend list.

This is how I went dark in Australia’s surveillance state for 2 years (CNET) They called me the nameless one, the ghost who commutes...

What new email security standards mean for federal agencies (Federal Times) An understanding and implementation of specific authentication steps could help make fake and malicious “government” emails a cyberthreat of the past.

How to Remove Adware and Pop-Up Ads from Windows 10 (MalwareFox) We need to remove adware and pop-up ads from Windows 10, to avoid security issues. There are various methods to remove them, some which are presented here.

The FCC Should Use Blockchain to Manage Wireless Spectrum (WIRED) Opinion: Blockchain technology can help distribute wireless spectrum more efficiently.

Navigating The Dark Side Of The IoT Revolution (ChiefExecutive.net) Smaller companies without resources to invest in a chief information security officer and trained IT security staff are most at risk to IoT-related threats.

Security – it Shouldn’t Just Be the Jewel in Your Crown, but Your Partners and Suppliers Too (Bitdefender) Security – it Shouldn’t Just Be the Jewel in Your Crown, but Your Partners and Suppliers Too

Design and Innovation

DoD strategy for AI has implications ranging from intel to business reform (FederalNewsRadio.com) The Defense Department is working to wrangle artificial intelligence projects across 40 different DoD organizations into a coherent S&T investment strategy.

Not Even AI Can Make Total Sense of a Privacy Policy (Motherboard) Using artificial intelligence, researchers have created a tool that crawls privacy policies on popular websites like Facebook, Reddit, and Twitter. But the software’s findings are not as detailed as those done by humans.

App Lets Users Fill in Passwords Just By Looking at Their iPhone X - Mobile ID World (Mobile ID World) Abine has integrated Face ID support into its Blur password manager and autofill app, enabling users to automatically log into various mobile accounts...

Research and Development

DARPA wants to connect human brains and machines (C4ISRNET) Neurotechnology would significantly increase the speed at which information is transferred from humans to machines, and a brain-systems interface may be a requirement to keep up with the pace and complexity of future combat zones.

IBM Developing World’s Tiniest Computer Smaller than a Grain of Salt (HackRead) At Thank 2018, IBM has announced developing world’s tiniest computer that will cost less than ten cents to manufacture and can monitor, analyze, communicate, and even act on data.

Academia

WVU approves undergraduate and graduate cyber security programs (WV News) After a year’s work to formulate them, the West Virginia University Board of Governors recently approved undergraduate and graduate cybersecurity programs.

UWF touts Gulf Coast's cybersecurity achievements in Washington, DC (Pensacola News Journal) Christopher Middleton, UWF's director of strategic innovation, spoke in DC about the Gulf Coast as a hot spot for cybersecurity talent.

ASU faculty, students gear up for cybersecurity conference (ASU Now: Access, Excellence, Impact) More than 40,000 cybersecurity professionals will descend upon San Francisco's Moscone Center in mid-April for the annual RSA Conference, "Where the World Talks Security." Among them will be ASU director Kim Jones and ASU undergraduate students Alaura Symons and Dominique Smith.

Legislation, Policy, and Regulation

Rick Perry boasts new cybersecurity office can handle Russian targeting of US grid (Washington Examiner) Energy Secretary Rick Perry told senators Tuesday a new cybersecurity office he plans to create will be sufficient to respond to Russia’s targeting of the U.S. power grid, as Democrats argued that action is not aggressive enough.

Telegram Ordered to Hand Over Encryption Keys to Russian Authorities (Threatpost) Popular secure messaging service Telegram loses battle with Russian courts and now must hand over encryption keys or face being blocked from the country.

A New Front in Information Warfare (SIGNAL) The U.S. government and citizens must prepare to defend democracy and assess the truth.

New House Bills Take Aim at Foreign Propaganda (Foreign Policy) Two new measures try to provide Americans with greater disclosure about foreign influence.

Tech backlash: ‘Maybe Silicon Valley needs to be taken down to size’ (The Mercury News) Backlash against the region’s tech industry called “unprecedented.”

Canada Is Gearing Up to Regulate Cryptocurrency (Motherboard) Canada is poised to become a global hub for cryptocurrencies, and advocates worry excessive regulation will stifle innovation.

HUD CIO Joy resigns suddenly (FederalNewsRadio.com) News outlets report HUD Chief Information Officer Johnson Joy is resigning after he was accused of corruption by a former HUD employee.

Litigation, Investigation, and Law Enforcement

Senate Intel Unveils First Findings on Russia Election Meddling (Roll Call) The Senate Intelligence Committee’s recommendations for how to secure U.S. election systems from intrusion efforts by the Russians and others aren’t exactly earth-shattering.But that’s not to say they aren’t important.

Key Senate committee concludes Russian interference; calls for voting reforms (San Francisco Chronicle) With unanimity, both Republicans and Democrats on the Senate Intelligence Committee said Tuesday that Russia attempted to interfere in the 2016 presidential election and urged their congressional colleagues to help states upgrade their balloting systems to ensure the integrity of November's midterm elections.

US consumer watchdog 'probes Facebook' (BBC News) Claims that Cambridge Analytica misused Facebook users' data cause a furore and its chief is suspended.

FTC Probing Facebook Over Data Use by Cambridge Analytica (Wall Street Journal) The Federal Trade Commission is probing Facebook over the use of personal data by an analytics firm tied to President Trump’s campaign.

Zuck and Sandberg go M.I.A. as Congress summons Facebook leadership by name (TechCrunch) The bad thing about making your face synonymous with the company you run: When you go M.I.A., everyone tends to notice. The callout posts began over the weekend. Normal Facebook users don’t always track the tech press outrage cycle, but a flurry of reporting on Facebook’s mishandling of…

Where's Zuck? Facebook CEO silent as data harvesting scandal unfolds (the Guardian) Amid calls for investigation and a #DeleteFacebook campaign, company releases an official statement but its figurehead keeps quiet

'Utterly horrifying': ex-Facebook insider says covert data harvesting was routine (the Guardian) Sandy Parakilas says numerous companies deployed these techniques – likely affecting hundreds of millions of users – and that Facebook looked the other way

Watch Cambridge Analytica Executives Say They Masterminded Trump's Election Win (Motherboard) A second documentary from Channel 4 News reveals Cambridge Analytica sharing the tactics it used to allegedly win the presidential election for Donald Trump.

Social media accounts of Cambridge Analytica whistleblower suspended (HackRead) Facebook has suspended Cambridge Analytica whistleblower Christopher Wylie's Instagram Facebook and WhatsApp accounts apparently for exposing the scandal.

Facebook’s Cambridge Analytica scandal, explained [Updated] (Ars Technica) Trump operatives got private data from 50 million Facebook users.

Trump campaign phased out use of Cambridge Analytica data before election (CBS News) CBS News chief White House correspondent Major Garrett reports that the campaign never used the psychographic data at the heart of a whistleblower's reporting

#Election2016: Propaganda-lytics & Weaponized Shadow Trackers (Medium) A journey into the behavioral tracking technologies of the right-wing “micro-propaganda machine”

Ex-Obama Campaign Director: It's 'Unfair' Facebook Let Us 'Ingest Entire Social Network of US' (IJR - Independent Journal Review) "...now there’s a disadvantage of information that, to me, seems unfair."

Ex-Obama Campaign Director Drops Bombshell Claim on Facebook: 'They Were on Our Side' (Independent Journal Review) "...they allowed us to do things...because they were on our side."

The Social-Media Panic (National Review) All that matters to liberals is whether Silicon Valley will keep them in power.

Commentary: What if Trump is right and there is no collusion? (CBS News) For over a year, Democrats in Congress have been promising proof that Trump colluded with Russia to steal the U.S. presidential election

UK High Court perma-bans efforts to extradite Lauri Love for US hacking trial (Ars Technica) Sets precedent for blocking extradition of hackers to US on humanitarian grounds.

UK Police Spend £1.3m on Cybersecurity Training (Infosecurity Magazine) UK Police forces spent around £1.3m over three years according to new report

YouTuber Faces Prison Time for Teaching a Dog a Nazi Salute (Motherboard) Courts ruled that Mark Meechan, aka “Count Dankula,” knew what he was doing when he filmed a pug watching Hitler speeches.

For a complete running list of events, please visit the Event Tracker on the CyberWire website.

Newly Noted Events

Borderless Cyber USA 2018 (Washington, DC, USA, October 3 - 5, 2018) How do you future proof your cybersecurity strategy? Can you identify and report cyber incidences so you can respond quickly to manage consequences? Public and private sector cyber experts from across...

Upcoming Events

Infosecurity Magazine Spring Virtual Conference (Online, March 21, 2018) Tune in on Wednesday March 21 for day two of our two-day online event to learn what’s going on at the heart of the industry. Our easy to digest format offers a mix of short sessions, panel debates and...

3rd Annual Billington International Cybersecurity Summit (Washington, DC, USA, March 21, 2018) With confirmed speakers from Estonia, Romania, Singapore, Sweden, the United States, and Kuwait, and with attendees from many more countries, this summit brings together world-class cybersecurity thought...

Infosecurity Magazine North America Virtual Conference (Online, March 21 - 22, 2018) Tune in on Wednesday March 21 for day two of our two-day online event to learn what’s going on at the heart of the industry. Our easy to digest format offers a mix of short sessions, panel debates and...

The Cyber Security Summit: Denver (Denver, Colorado, USA, March 22, 2018) This event is an exclusive conference connecting Senior Level Executives responsible for protecting their company’s critical data with innovative solution providers & renowned information security experts.

Women in CyberSecurity 2018 (Chicago, Illinois, USA, March 23 - 24, 2018) Through the WiCyS community and activities we expect to raise awareness about the importance and nature of cybersecurity career. We hope to generate interest among students to consider cybersecurity as...

Northeast Regional Security Education Symposium (Jersey City, New Jersey, USA, March 23, 2018) The Professional Security Studies Department at New Jersey City University (NJCU) will hold its Northeast Regional Security Education Symposium on Friday, March 23, 2018, from 8 am to 2 pm. The symposium...

KNOW Identity Conference 2018 (Washington, DC, USA, March 26 - 28, 2018) The premier global event for the identity industry, the KNOW Identity Conference is the nexus for identity innovation, offering a uniquely differentiated, powerful, and immersive event that convenes the...

SecureWorld Philadelphia (Philadelphia, Pennsylvania, USA, March 28 - 29, 2018) Connecting, informing, and developing leaders in cybersecurity. SecureWorld conferences provide more content and facilitate more professional connections than any other event in the Information Security...

National Cyber League Spring Season (Chevy Chase, Maryland, USA, March 30 - May 25, 2018) The NCL is a defensive and offensive puzzle-based, capture-the-flag style cybersecurity competition. Its virtual training ground helps high school and college students prepare and test themselves against...

4th Middle East Cyber Security Summit (Riyadh, Saudi Arabia, April 4 - 5, 2018) The summit will feature state of the art presentations, hackathons and technology showcasing from regional and international experts and leading technology providers. One of the focus areas of the summit...

Cybersecurity: A Shared Responsibility (Auburn, Alabama, USA, April 8 - 10, 2018) During the 2018 SEC Academic Conference, we will explore three themes within cyber security: the underlying computer and communication technology; the economic and physical systems that are controlled...

Sea-Air-Space: The Navy League’s Global Maritime Exposition (National Harbor, Maryland, USA, April 9 - 11, 2018) Join us this April for Sea-Air-Space, the largest maritime exposition in the U.S., with 275+ exhibitors displaying the latest in maritime, defense and energy technology. This year’s theme, “Learn. Compete.

2018 Mississippi College Cybersecurity Summit (Clinton, Mississippi, USA, April 10 - 11, 2018) The 2018 Mississippi College Cybersecurity Summit is a conference designed to engage, educate, and raise awareness about cybersecurity across the nation. The 2018 Cybersecurity Summit will provide valuable...

ISC West 2018 (Las Vegas, Nevada, USA, April 11 - 13, 2018) ISC West is THE largest security industry trade show in the U.S. At ISC West, you will have the chance to network with over 30,000 security professionals through New Products & Technologies encompassing...

CYBERTACOS San Francisco (San Francisco, California, USA, April 16, 2018) CYBERTACOS is back and becoming one of the biggest cybersecurity networking events! Register today and join us for networking, food and drinks. This event includes a 45-minute meet the press panel made...

RSA Conference 2018 (San Francisco, California, USA, April 16 - 20, 2018) Take this opportunity to learn about new approaches to info security, discover the latest technology and interact with top security leaders and pioneers. Hands-on sessions, keynotes and informal gatherings...

Our Security Advocates (San Francisco, California, USA, April 17, 2018) OUR Security Advocates highlights a diverse set of experts from across information security, safety, trust, and other related fields. OURSA is a single-track, one-day conference with four topic sessions.

Secutech (Taipei, Taiwan, April 25 - 27, 2018) To meet the rising demand for intelligent and customised solutions, Secutech converges security and safety, ICT, IoT, artificial intelligence, big data, edge computing, intelligent video analytics and...

Industrial Control Systems (ICS) Cyber Security Conference Asia (Singapore, April 25 - 27, 2018) The Central ICS/SCADA Cyber Security Event of the Year for the APAC Region. Three days of multi-track training & workshops for days for operations, control systems and IT security professionals to connect...

INFILTRATE (Miami Beach, Florida, USA, April 26 - 27, 2018) INFILTRATE is a "pure offense" security conference aimed at the experienced to advanced practitioner. With the late-90s hacker con as its inspiration, the event has limited attendance in order to foster...

Automotive Cybersecurity Summit 2018 (Chicago, Illinois, USA, May 1 - 8, 2018) Smart Vehicles. Smart Infrastructures. The 2nd annual Automotive Cybersecurity Summit brings together public and private-sector manufacturers, suppliers, assemblers, technology providers and V2X partners...

Global Cyber Security in Healthcare & Pharma Summit (London, England, UK, May 3 - 4, 2018) The number of cyber-attacks in healthcare is on the rise, and the industry must do more to prevent and respond to these incidents. The Global Cyber Security in Healthcare & Pharma Summit 2018 will bring...

Grow your brand and reach new customers.

Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.

Be a part of the CyberWire story.

People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.