Upcoming Events

Cyber Threat Intelligence Solutions Forum: Intel-Use Cases for Destructive Scenarios
2020-03-27 08:30 | 2020-03-27 09:30
seeks to identify use-cases seen from some of the leading cyber threat intelligence vendors and solutions providers so that they can share their knowledge from the field with the SANS community.
...Read more

Black Hat Asia 2020
2020-03-31 | 2020-04-03
Black Hat returns to Marina Bay Sands in Singapore, March 31 - April 3, 2020. The information security community comes together for esteemed Trainings taught by industry experts, innovative research presentations at Briefings, the latest open-source tool
...Read more

Black Hat USA 2020
2020-08-01 | 2020-08-06
Convention Housing Partners US: 1.866.642.2056 International: +1.415.813.6088 use option 11 Hours: 7am - 5pm PT Monday through Friday Email:
...Read more

Black Hat Europe 2020
2020-11-09 | 2020-11-12
November 9-12, 2020 | London, UK
...Read more

What is security's role in digital transformation?
With security regaining priority, CISOs are dispersing security responsibility throughout the organization...Read more

Georgia Man Charged Over False Allegations of HIPAA Violations
Georgia man has been charged over an elaborate scheme to frame an acquaintance for HIPAA violations...Read more

Response to IT industry trends analysis 2020
"...there are major questions around safety, privacy, sustainability, and trust” …...Read more

If you haven't shored up that Citrix hole, you were probably hacked over the weekend: Exploit code now available
Admins who haven't put mitigations in place by now will want to make sure they address their situation immediately...Read more

Travelex still down two weeks after Sodinokibi ransomware infection
Last week Travelex learned it had fallen victim to a cyber-attack that had lasted six months. It continues....Read more

U.S. Healthcare Data Breach Cost $4 Billion in 2019. 2020 Won't Be Any Better
The race within healthcare is will continue to move workloads to cloud computing, embrace medical IoT, EHR, etc....Read more

A case for establishing a common weakness enumeration for hardware security
Sophisticated attacks often progress past the software layer and compromising hardware....Read more

Do Midsized Companies Need a CISO?
Factors include regulatory requirements, industry, geography and whether infosec is a corporate priority...Read more

CISA on Iran’s Cyber Threat: It’s Time to Review Your Cyber Security Posture!
It is always prudent to stay alert and continually update your cybersecurity programs regardless of opponent...Read more

The Marriage of Data Exfiltration and Ransomware
Ransomware and Data Exfiltration, have been combined to further complicate the lives of victims....Read more

The Consequences of Security Breaches Are Becoming More Severe
It’s becoming commonplace for employees to part ways with their organization after a security incident....Read more

Alleged Member of Neo-Nazi Swatting Group Charged
The group used VPN services to hide true Internet locations and VoIP services to conduct the swatting calls...Read more

Major Brazilian Bank Tests Homomorphic Encryption on Financial Data
The approach allowed researchers to use machine learning on encrypted data without first decrypting it....Read more

Study Points to Lax Focus on Cybersecurity
Despite ranking at the top of respondents' concerns, organizations still show gaps in acting on cybersecurity...Read more