skip navigation

More signal. Less noise.

Outmaneuver your most sophisticated cyber enemies—automatically.

Cyber attacks are getting more sophisticated. Cybercrime and data breach costs will reach the billions and even trillions in the next few years. These are things we already know. But what are you doing to help your cybersecurity teams (who are already stretched thin) mitigate the billions of threats? The ScoutShield threat intelligence gateway keeps your overburdened teams from throwing in the towel by blocking threats automatically – making their lives easier and saving you from cyber attacks. Watch our video to learn more.

Daily briefing.

Sports apparel manufacturer Under Armour disclosed yesterday that data associated with 150 million users of the company's fitness app MyFitnessPal had been exposed. Information at risk is said to include usernames, email addresses, and hashed passwords. The company began investigating on March 25th, when it discovered that an unauthorized party had accessed the data in February. Under Armour acquired MyFitnessPal for $475 million in February 2015. 

Boeing insists that reports of a massive WannaCry infection at its South Carolina manufacturing facilities have been massively exaggerated. The infection was minor and swiftly contained, and did not affect production or business operations. But it's worth noting that WannaCry is still a risk, and that enterprises shouldn't drop their guard.

North Korea's Lazarus Group is showing fresh signs of activity, probing financial sector targets and looking for ways of getting cryptocurrency.

Russia has responded to punitive US diplomatic moves with tit-for-tat expulsions and a consular closure of its own. US official policy toward Russia is hardening, with concern running high about Russia's threat to the grid. The Russian ambassador to the US is having trouble getting officials to take meetings with him.

Reports of vulnerabilities in India's Aadhaar national identification system circulate despite official assurances that all's well.

Baltimore's 911 hack was ransomware. Atlanta continues to recover from the ransomware attack it suffered.

Lenovo is looking over its shoulder at Huawei's regulatory problems in the US.

For their different reasons, Facebook's Mark Zuckerberg and WikilLeaks' Julian Assange have had a bad PR week.

Notes.

Today's issue includes events affecting Ecuador, France, Democratic Peoples Republic of Korea, Russia, Singapore, United Kingdom, United States.

Struggling with your DLP? It's time to rethink your data loss prevention strategy.

Traditional data loss prevention tools aren’t cutting it anymore. Why? They are high-maintenance and require endless fine-tuning. They often miss insider threats. They stymie communication between security and other departments. And they slow down endpoints, leading to crashes and failures that drive users crazy. Learn from ObserveIT why DLP tools aren’t getting the job done in 2018 and how you can stop data loss in its tracks. Read Now.

In today's podcast we hear from our partners at the University of Bristol, as  Awais Rashid talks us through blockchain trust issues. Our guest is Laurin Buchanan from Secure Decisions, discussing NICE competitions. (She's co-chair of the competitions subgroup.)

Register for the Women in Tech Social on April 5 from 5:00-7:30pm in Howard County, MD. (Woodstock, Maryland, USA, April 5, 2018) Women working in or pursuing a technology/cybersecurity career in Maryland: join us for delicious food and drink as you connect with other fabulous women in tech. This friendly and casual gathering promises to be fun for one and all!

XM Cyber is coming to RSA (San Francisco, California, United States, April 16 - 20, 2018) Visit XM Cyber at the Israeli Pavilion, South Hall booth 635, to experience the first automated APT simulation platform to expose, assess and amend every attack path to organizational critical assets.

Cyber Attacks, Threats, and Vulnerabilities

What Really Went on at Russia’s Seattle Consulate? (POLITICO Magazine) The closure of the facility could limit military and tech-industry espionage—and leaves Russia with no diplomatic presence on the West Coast.

Under Armour says 150 million MyFitnessPal accounts compromised in data breach (The Verge) Hackers obtained user names, email addresses, and hashed passwords

Sandiflux: Another Fast Flux infrastructure used in malware distribution emerges (Proofpoint) Proofpoint researchers studied a previously undocumented botnet providing Fast Flux infrastructure for cybercrime.

Boeing says no impact to military aircraft business after WannaCry cyberattack (Fifth Domain) Boeing says the WannaCry virus hit a small number of computers on its commercial side.

Boeing hit by WannaCry, reminding everyone the threat is still there (Naked Security) Is this the return of WannaCry? Or did it simply never go away?

Boeing calls reported cyber attack, "Overstated and inaccurate" (WCIV) Boeing is the latest company to fall victim to a cyber attack. The airplane maker says some of its computers were infected by the wannacry virus, ABC News reports. The company says it affected a limited number of computers at the facility in North Charleston...

Boeing's systems nearly brought down by return of WannaCry ransomware (Computing) Return of the WannaCry malware could have disabled critical Boeing software

Boeing attack shows the fear over WannaCry is still very real (Cyberscoop) An apparent tempest-in-a-teapot intrusion shows how even the biggest organizations to come to a crippling halt at any sign of the notorious ransomware.

Cyber criminals now cryptojacking mobile phones (The Straits Times) Beware. Your mobile phone might actually be helping cyber criminals mine for cryptocurrency like Bitcoin, even if you were diligent enough not to download suspicious, malware-laden apps.. Read more at straitstimes.com.

Crypto mining runs rampant in higher education: Is it students? (Help Net Security) The higher education sector exhibited a startling increase in potentially damaging cryptocurrency mining behaviors, according to Vectra.

Assange and his groupies backed wrong side (Times) Pity the bien-pensants. Only five years ago, life was so simple. Julian Assange and Edward Snowden were heroes, defending individual freedom and privacy against the depredations of overweening...

The psychology behind Cambridge Analytica is massively overhyped (Quartz) The psychological techniques used to influence us are neither as precise nor as powerful as Cambridge Analytica bosses have promised. Yet.

Lazarus Group Targets More Cryptocurrency Exchanges and FinTech Companies (Intezer) Introduction Cyber attacks from the Lazarus Group, a threat actor associated with North Korea, has not slowed down and their malware toolset continues to evolve. A few months ago, we published a general research of the Lazarus Group and the Blockbuster campaign including code reuse and similarities throughout their malware up until the latest news …

Unmasking Monero: stripping the currency’s privacy protection (Naked Security) The features that make blockchains trustworthy may leave them vulnerable to retrospective action.

An in-depth malware analysis of QuantLoader (Security Boulevard) QuantLoader is a Trojan downloader that has been used in campaigns serving a range of malware, including ransomware, Banking Trojans, and RATs. In this post, we'll take a high-level look at the campaign flow, as well as a deep dive into how the malware executes. Categories: Malware Threat analysis Tags: backdoormalware analysisQuantLoaderQuantLoader Trojantrojan (Read more...) The post An in-depth malware analysis of QuantLoader appeared first on Malwarebytes Labs.

City: Cyber attack against Baltimore's 911 computer-aided dispatch system was ransomware (Technical.ly Baltimore) According to Baltimore's CIO, the vulnerability was left open during troubleshooting. Ransomware is among the most common attacks against public safety agencies, said SecuLore's Tim Lorello.

Atlanta has shut down courts and people there can't pay their bills online because of a crippling cyberattack the mayor has called 'a hostage situation' (Business Insider) A ransomware attack against Atlanta has forced the city to shut down municipal courts and has prevented residents from paying certain bills online.

Emails show Atlanta received multiple alerts about cyber threats (Atlanta Journal Constitution) A series of leaked emails dating back to June appear to suggest that software from an outside vendor might have been the source of infection for a ransomware cyber attack on city of Atlanta.

Even in Silicon Valley, government is under constant threat from ransomware, cyberattacks (The Mercury News) Experts troubled that more than a third of local governments don’t know whether their electronic information systems have been breached.

To Pay or Not to Pay Hackers? Ransomware Poses a Potentially Deadly Dilemma (Governing) Baltimore's 911 system and a range of city services in Atlanta were hijacked in the past week.

As Atlanta Seeks To Restore Services, Ransomware Attacks Are On The Rise (NPR.org) The FBI says the practice of locking computer systems in exchange for money has become increasingly common, and that cities, schools and hospitals are especially vulnerable to hackers.

Patient harm from hacked medical devices plausible: security researcher (Digital Health) A leading cyber security analyst at Kaspersky Lab has warned there is a viable danger of death from hacked medical devices if measures aren’t put in place to secure them.

‘I Found A Security Lapse In Aadhaar That Could Allow A Major Chunk Of Information To Be Stolen’ (IndiaSpend) For the second time in the first three months of 2018, the vulnerabilities of the Aadhaar programme--the world’s largest biometric database--were exposed when American business technology website ZDnet reported on March 23, 2018, that the personal data of millions of enrolled Indian...

Aadhaar security and authentication flaw can give access to data without OTP: Ethical hacker (Business Standard) Aadhaar comprises a unique 12-digit number assigned to Indian residents. 1.2 billion Indians or 99.7% of population enrolled in Aadhaar prgramme. Data security expert identifies that Aaadhar can reveal data without OTP.

Security Patches, Mitigations, and Software Updates

Microsoft Issues Out-Of-Band Security Update for Windows 7 & Windows Server 2008 (Bleeping Computer) Microsoft issued today an out-of-band security update for 64-bit versions of Windows 7 and Windows Server 2008 R2.

Apple Releases Security Updates for iOS, watchOS, tvOS, and Xcode (Bleeping Computer) Today Apple has released security updates for iOS, watchOS, tvOS, and Xcode. Many of the resolved vulnerabilities allow for privilege escalation, remote code execution, and information disclosure. Due to the nature of these vulnerabilities, it is strongly advised that all users update their devices as soon as possible.

Stop swearing on Skype! And don’t even think about sending that nude selfie… (Naked Security) Microsoft has banned nudity, swearing and other unsavoury behaviors in Skype, Xbox, email, and Office 365 docs.

Cyber Trends

Healthcare Security Expert: The Top Cyberthreat in Healthcare is Finance (Bricata) Security professionals in healthcare organizations struggle with a range of variables, but none may be so challenging as finance and budget. Emerging threats and new tactics typically require some level of investment to defend and this post turns... #healthcaresecurity #ransomware #securitybudgets

The State of Risk Management in 2018 I LogicManager (ERM Software) We surveyed hundreds of governance, risk, and compliance professionals across industries to learn more about the state of risk management in 2018.

Is it time to unify endpoint management and security? (CSO Online) Modern unified management makes sense, and the industry is reacting by providing solutions. The question is whether enterprise organizations will use them.

Marketplace

Boosting the Cyberworkforce (GovTech) Amid persistent shortages in cybersecurity positions, what can states do to strengthen their numbers?

Mark Zuckerberg won't lose his job any time soon (Engadget) This isn't going to be a Travis Kalanick situation.

Are there too many cybersecurity companies? (Help Net Security) There is too much noise in the market. CISOs don’t want to manage 80 products — they want to have a holistic solution involving fewer vendors.

Palo Alto Networks CEO: Consolidation thwarts innovation (Axios) "No one company can create all the innovation," McLaughlin said.

A big chunk of Israel’s tech scene is actually not based in Israel (Financial Post) When success begets success in America, some find their home country is less a market than an incubator

OPAQ Networks Acquires FourV Systems to Enhance Security Operations Management Automation (BusinessWire) The addition of FourV to the OPAQ Cloud will enable managed service providers to automate security and compliance measurement, monitoring & reporting.

CCA members look for answers amid U.S. crackdown on Huawei (FierceWireless) Some rural operators that have deployed gear from Huawei are wondering what will happen next.

Lenovo responds to U.S. government targeting Chinese equipment firm Huawei (WRAL TechWire) In response to the news that the Federal Communications Commission is joining other government agencies in targeting the giant Chinese network equipment maker, Huawei, Lenovo said in a statement that it is "Evaluating what it means for the industry and our business."

SAIC is 'very comfortable' at its size as competitors scale up (Washington Business Journal) If Science Applications International Corp. is going to make another aggressive bid for scale in a rapidly consolidating government services market, CEO Tony Moraco isn’t tipping his hand.

Tom McAndrew wants to keep entrepreneurial bent as he takes over as Coalfire CEO (FierceCEO) As Tom McAndrew prepares to take over as Coalfire’s CEO this weekend, he wants the cybersecurity advisory services provider to maintain its entrepreneurial way of operating.

The 5 Biggest D.C. Tech Hires to Know About from March (DCInno) Every month we recap the biggest tech hires and departures in the D.C. area.

Cylance Strengthens Executive Team with New CIO, CMO and CPO (Security Boulevard) Cylance is pleased to announce the appointment of Grant Johnson as Chief Marketing Officer (CMO) and Kumud Kalia as Chief Information Officer (CIO). The company also promoted Eric Cornelius to Chief Product Officer (CPO).

Products, Services, and Solutions

Proactive Device Security for Faculties: Wesleyan University (Prey Project) Case Study on Wesleyan University's implementation of Prey as a key part of their mobility program.

Netwrix Auditor Helps Automotive Manufacturer Secure Design Projects and Streamline J-SOX Compliance (CIO Dive) Netwrix Corporation, provider of a visibility platform for user behavior analysis and risk mitigation in hybrid environments, announced today that DENSO Manufacturing Hungary improved data security to ensure smooth business processes and achieve sustainable compliance, thanks to the complete visibility provided by Netwrix Auditor.

‘Cyber bullets’ were once a spy tool but may soon scan Wi-Fi networks for the Army (Fifth Domain) Leidos is working to enable local brigade commanders to use

Microsoft Unveils Project VAST Security Visualization Tool (Redmondmag) Microsoft described Project VAST this week, a new tool that promises to visually surface security problems.

XL Catlin and RedSeal launch risk analysis tool for cyber insurers (ReinsuranceNe.ws) Insurer and reinsurer XL Catlin and RedSeal have launched a risk analysis tool for cyber insurers with a dynamic measure of resilience to gauge risk and improve cybersecurity and insurance terms. The risk analysis objectively measures a network's resilience to help underwriters more thoroughly evaluate their clients’

Major UK e-Commerce Firm Embraces Pindrop Security for the Call Center (FindBiometrics) British e-commerce giant Shop Direct has embraced Pindrop's Phoneprinting technology, the companies have announced. The solution is being used to...

Zscaler Completes SOC 2, Type II Certification (GlobeNewswire News Room) Achievement Demonstrates Continued Commitment To Security and Availability

WISeKey unveils cryptocurrency payment solution for connected objects - Electronic Payments International (Electronic Payments International) WISeKey International, a Swiss cybersecurity and IoT solutions firm, has launched an IoT cryptocurrency smart payment solution that will enable connected objects to pay for …

National Hockey League Players’ Association deploys Darktrace AI (Cambridge Network) Darktrace, the world’s leading AI company for cyber defence, has today announced that the National Hockey League Players’ Association (NHLPA) has deployed the Enterprise Immune System to protect the sensitive personal information of its 750 members across the US and Canada.

Technologies, Techniques, and Standards

Thwarting a Power Grid Control Center Cyberattack (Nozomi Networks) Based on recent reports of Russian involvement in a multistage intrusion of the US power grid, it’s no longer a question of “if” threat actors will gain access to critical infrastructure control systems – it’s when it will happen again, and for what purpose. What can be done to thwart these potentially disruptive assaults?

The CNN Factor Adds More Complexity to Security Operations (SecurityWeek) Enterprises needed is a single, shared environment that fuses together threat data, evidence and users, so that all team members involved in the investigation process can collaborate.

A More Cyber-Conscious Supply Chain Management (SIGNAL) The Army is strengthening its cybersecurity posture through a system of systems look.

Design and Innovation

Patentability of Blockchain and Distributed Ledger Technology (The Legal Intelligencer) Decentralized data structure management technology (DDSM) such as blockchain and distributed ledger technology is grabbing ever-increasing attention as a result of its potential to revolutionize the way we conduct business run our governments and go about daily life.

Microsoft doubles down on artificial intelligence in engineering reorganization (GeekWire) Two key letters show up throughout Microsoft’s major reorganization announcement this morning: AI. Artificial intelligence will get even more emphasis as part of the company’s reshuffling of…

Research and Development

IBM sees quantum computing going mainstream within five years (CNBC) Within five years, IBM predicts, the tech industry will discover the first mainstream application of quantum computers alongside classical computers.

Academia

NDSU Institute, USMC Work Together to Prepare Next Generation of Cyber Warriors (Digital Journal) ​The North Dakota State University Institute for Cyber Security Education and Research, the NDSU Department of Computer Science and the United States Marine Corps will be working together this fall to prepare NDSU students to secure America.

Legislation, Policy, and Regulation

Russian Military Chief Lays Out the Kremlin’s High-Tech War Plans (Defense One) Robotics, artificial intelligence, and a willingness to strike the enemy’s non-military targets will figure in the country’s future strategies.

#TrollTracker: Stale Narratives In Response to Expelled Diplomats (Medium) Pro-Kremlin trolls compare the Skripal case to Iraq War and a #falseflag to start a war with Russia.

Coordinated Russian Expulsions a Great Start. What Next? (Atlantic Council) The announcement of the coordinated expulsion of more than 150 Russian diplomats and intelligence officers from the US, Europe, and other global partners showed what the deft hand of diplomacy can accomplish in countering Russian aggression. The...

If we want to stop Putin, we need to go after his sources of money (WTVA News) More than 100 Kremlin diplomats in over 20 countries are in the midst of ...

How Not to Pressure Putin (Foreign Policy) Britain needs strategic patience, not shrill denunciations, to keep Russia in check.

Is US Policy on Russia Changing? (Atlantic Council) The coordinated move by the United States and two dozen other countries on March 26 to expel more than one hundred Russian diplomats, if followed with additional actions targeted at Russian influence and money, could mark a significant turning...

Exclusive: Russian ambassador pleads for help in securing Washington meetings (POLITICO) Anatoly Antonov has been rebuffed by U.S. government officials who are reluctant to be seen as friendly toward the Kremlin.

With Its New 'White Book,' France Looks to Become a World-Class Player in Cyber Space (War on the Rocks) On April 8, 2015, TV5 monde, an international French channel boasting 32 million viewers every week, was suddenly cut off air, with its websites eventually displaying banners advertising a so-called “Cyber Caliphate.” The channel had been the victim of a sophisticated cyber attack, stoking anxiety exactly four months

How Cyber Security Agency is protecting Singapore in the changing cyber landscape (OpenGovAsia) Mar 29, 2018 - by Nicky Lung - CSA Deputy Chief Executive (Development) Mr Teo Chin Hock iterates how CSA is protecting the cyber space of Singapore in the changing cyber landscape. - opengovasia.com

Record number of New Yorkers impacted by data breaches in 2017 (WKBW) New York's Attorney General says his office received a record number of data breach notices in 2017.

New York offers free cyber security tools to public to deter hackers (Reuters) New York City will offer free cyber security tools to the public as part of a new effort to improve online safety, officials said on Thursday, a week after Atlanta was hit with a ransomware attack that knocked some municipal systems offline.

Post WannaCry, NHS Seeks New Cyber-Security Deputy (Silicon UK) Government seeks candidate to lead £200m programme to sharpen cyber security resilience of the NHS

How the Air Force Changed Tune on Cybersecurity (GovTechWorks) Combining development, security and operations into an integrated process -- DevSecOps in industry parlance -- is the new name of the game. The aim: Build security in during devlopment, rather than bolting it on at the end.

Post Mortem Data Protection Laws (Security Boulevard) Once someone passes away, what security protections are in place to prevent their social media accounts from being hijacked, or worse, their online identity being stolen and used by fraudsters?

Litigation, Investigation, and Law Enforcement

Justice watchdog to review potential abuses by FBI in secretive court (Federal Times) The FBI is under review to see if it abused its power in an application submitted through the Foreign Intelligence Surveillance Court.

Minneapolis FBI agent charged with leaking classified information to reporter (MPR News) Terry Albury, who was working on counterterrorism, was charged this week by the Justice Department with one count of "knowingly and willfully" transmitting documents relating to national defense to a reporter.

High Court Allows NYPD to Evade Acknowledging Whether They Have Information About Muslim Surveillance (New York Law Journal) In a 4-3 decision the majority ruled that the NYPD was within its rights to give a nonresponse when it received Freedom of Information Law requests from two Islamic men who wanted records tied to possible police surveillance.

Leaving your job: what you can and can’t take with you (CIO) Outright theft is an obvious no-no, but there are still some gray areas when it comes to what you can take with you when you leave a job and what you could land you in legal hot water.

For a complete running list of events, please visit the Event Tracker on the CyberWire website.

Newly Noted Events

FutureTech Expo (Dallas, Texas, USA, September 14 - 16, 2018) With over 2,000 expected attendees, 70 top-notch speakers and 100+ exhibitors from the Blockchain & Bitcoin, Artificial Intelligence, Cyber Security / Hacking, Quantum Computing, 3D Printing, and Virtual...

Upcoming Events

4th Middle East Cyber Security Summit (Riyadh, Saudi Arabia, April 4 - 5, 2018) The summit will feature state of the art presentations, hackathons and technology showcasing from regional and international experts and leading technology providers. One of the focus areas of the summit...

Cybersecurity: A Shared Responsibility (Auburn, Alabama, USA, April 8 - 10, 2018) During the 2018 SEC Academic Conference, we will explore three themes within cyber security: the underlying computer and communication technology; the economic and physical systems that are controlled...

Sea-Air-Space: The Navy League’s Global Maritime Exposition (National Harbor, Maryland, USA, April 9 - 11, 2018) Join us this April for Sea-Air-Space, the largest maritime exposition in the U.S., with 275+ exhibitors displaying the latest in maritime, defense and energy technology. This year’s theme, “Learn. Compete.

2018 Mississippi College Cybersecurity Summit (Clinton, Mississippi, USA, April 10 - 11, 2018) The 2018 Mississippi College Cybersecurity Summit is a conference designed to engage, educate, and raise awareness about cybersecurity across the nation. The 2018 Cybersecurity Summit will provide valuable...

ISC West 2018 (Las Vegas, Nevada, USA, April 11 - 13, 2018) ISC West is THE largest security industry trade show in the U.S. At ISC West, you will have the chance to network with over 30,000 security professionals through New Products & Technologies encompassing...

CYBERTACOS San Francisco (San Francisco, California, USA, April 16, 2018) CYBERTACOS is back and becoming one of the biggest cybersecurity networking events! Register today and join us for networking, food and drinks. This event includes a 45-minute meet the press panel made...

RSA Conference 2018 (San Francisco, California, USA, April 16 - 20, 2018) Take this opportunity to learn about new approaches to info security, discover the latest technology and interact with top security leaders and pioneers. Hands-on sessions, keynotes and informal gatherings...

Our Security Advocates (San Francisco, California, USA, April 17, 2018) OUR Security Advocates highlights a diverse set of experts from across information security, safety, trust, and other related fields. OURSA is a single-track, one-day conference with four topic sessions.

5th Annual Cybersecurity Summit (McLean, Virginia, USA, April 24, 2018) Join the Potomac Officers Club for the Fifth Annual Cybersecurity Summit to hear from public and private sector leaders on how federal agencies can improve their respective data security measures.

Secutech (Taipei, Taiwan, April 25 - 27, 2018) To meet the rising demand for intelligent and customised solutions, Secutech converges security and safety, ICT, IoT, artificial intelligence, big data, edge computing, intelligent video analytics and...

Industrial Control Systems (ICS) Cyber Security Conference Asia (Singapore, April 25 - 27, 2018) The Central ICS/SCADA Cyber Security Event of the Year for the APAC Region. Three days of multi-track training & workshops for days for operations, control systems and IT security professionals to connect...

INFILTRATE (Miami Beach, Florida, USA, April 26 - 27, 2018) INFILTRATE is a "pure offense" security conference aimed at the experienced to advanced practitioner. With the late-90s hacker con as its inspiration, the event has limited attendance in order to foster...

Automotive Cybersecurity Summit 2018 (Chicago, Illinois, USA, May 1 - 8, 2018) Smart Vehicles. Smart Infrastructures. The 2nd annual Automotive Cybersecurity Summit brings together public and private-sector manufacturers, suppliers, assemblers, technology providers and V2X partners...

Application of the Law of War to Cyber Operations (Washington, DC, USA, May 3, 2018) Cyber law experts meeting at the George Washington University will cover Title 10 vs. Title 32 vs. Title 50 and the lawful and operational restrictions related to these authorities. The panelists will...

Global Cyber Security in Healthcare & Pharma Summit (London, England, UK, May 3 - 4, 2018) The number of cyber-attacks in healthcare is on the rise, and the industry must do more to prevent and respond to these incidents. The Global Cyber Security in Healthcare & Pharma Summit 2018 will bring...

Secure Summit DC (Washington, DC, USA, May 7 - 8, 2018) (ISC)² Secure Summit DC will assemble the best minds in cybersecurity for two days of insightful discussions, workshops and best-practices sharing. The goal of the event is to equip security leaders to...

HACKNYC (New York, New York, USA, May 8 - 10, 2018) The recent flood of data breach news may numb us to the threat of attacks with kinetic effects--direct or indirect physical damage, injury, or death. Hack NYC focus’ on our preparation for, and resilience...

Insider Threat Program Management With Legal Guidance Training Course (Herndon, Virginia, USA, May 8 - 9, 2018) This training will provide the ITP Manager, Facility Security Officer, and others (CIO, CISO, Human Resources, IT, Etc.) supporting an ITP, with the knowledge and resources to develop, manage, or enhance...

SecureWorld Kansas CIty (Kansas City, Missouri, USA, May 9, 2018) Connecting, informing, and developing leaders in cybersecurity. SecureWorld conferences provide more content and facilitate more professional connections than any other event in the Information Security...

Grow your brand and reach new customers.

Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.

Be a part of the CyberWire story.

People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.