skip navigation

More signal. Less noise.

Combating threats and protecting the enterprise data in the digital workspace.

Digital workspaces bring enormous benefits to organizations and their employees across the globe, but require new thinking when it comes to security. In our perimeter-less digital world, protecting, detecting, and remediating threats requires intelligence-driven approaches. Check out VMware’s insightful white paper describing a new, comprehensive and predictive approach. It highlights the importance of securing the evolving digital workspace and the need for enterprises to embrace a framework of trust between the components in their ecosystem.

Daily briefing.

New Zealand has joined the three Five Eyes sisters who have called out exploitation of Cisco Smart-Install-enabled devices. CERT-NZ doesn't specifically call out Russia as the author of the ongoing campaign against such devices, but it does reference with agreement the US-CERT report that does, so it's safe to conclude that the view from Wellington is much the same as that from Canberra, London, and Washington.

Russia for its part has denied doing anything of the kind. Government spokesman Dmitry Peskov said the accusations were unfounded. Echoing the sorts fo demands for evidence Moscow issued after the nerve agent attack in Salisbury, Peskov called the accusations "feeble," and said Russia had no idea what the Five Eyes' assertions were based on: "Such accusations are typically thrown into the air and no one even bothers to offer any arguments anymore."

Symantec researchers warn of a new problem, "trustjacking." It occurs when a user pairs an iPhone to a Mac laptop or workstation, at the point where users are asked if they trust this computer. (Maybe users should be more circumspect.)

Radware warns of "Stresspaint," a Chrome login information-stealing Trojan served by a Windows app that presents itself as a stress-relief tool.

LocalBlox, a company that scrapes data from the various sources on the web and builds profiles of individuals for marketing purposes, has been found to have leaked data. It's apparently, according to researchers at UpGuard, an AWS misconfiguration issue: they say they found forty-eight-million records exposed in an S3 bucket.

Notes.

Today's issue includes events affecting Australia, China, Estonia, European Union, Russia, United Kingdom, United States.

Cyber is the new battlefield.

Become a Cyber Spartan and Defend the Gates of America. At Invictus International Consulting we are hiring elite cyber, intelligence, and technology experts to serve our government and commercial clients. Join us.

In today's podcast we hear from our partners at Palo Alto Networks, as Rick Howard talks about the very notion of a "cyber moon shot." Our guest is Malcolm Harkins from Cylance, who argues that it's unacceptable to adopt the attitude that bad guys getting in is inevitable.

XM Cyber is coming to RSA (San Francisco, California, United States, April 16 - 20, 2018) Visit XM Cyber at the Israeli Pavilion, South Hall booth 635, to experience the first automated APT simulation platform to expose, assess and amend every attack path to organizational critical assets.

HackNYC2018 (New York, New York, United States, May 8 - 10, 2018) Cyber attacks are often called non-violent or non-kinetic attacks, but the simple truth is that there is a credible capability to use cyber attacks to achieve kinetic effects. Kinetic Cyber refers to a class of cyber attacks that can cause direct or indirect physical damage, injury or death solely through the exploitation of vulnerable information systems and processes. Use code CWIRE20 for 20% off the $50.00 individual ticket price.

8th Annual (ISC)2 Security Congress (New Orleans, Louisiana, United States, October 9 - 11, 2018) The (ISC)2 Security Congress brings together the sharpest minds in cyber and information security for over 100 educational sessions covering 17 tracks. Join us to learn from the experts, share best practices, and make invaluable connections. Your all-access conference pass includes educational sessions, workshops, keynotes, networking events, career coaching, expo hall and pre-conference training. Save your seat at congress.isc2.org.

Dateline RSA

Photo gallery: RSA Conference 2018 Expo (Help Net Security) The RSA Conference 2018 is underway at the Moscone Center in San Francisco. Here are a few photos from the Expo floor. Featured companies: LogRhythm, Qualys, Sophos, RSA Conference, Intel, AWS, IBM Security, Wombat Security, A10

DHS Secretary Nielsen Bares Cyber Teeth at RSA (Meritalk) At the RSA Cybersecurity Conference in San Francisco, Department of Homeland Security (DHS) Secretary Kirstjen Nielsen made it clear that the United States has “a full spectrum of response options” to defend against cyber attacks and hacks.

Speech by Vice-President Ansip on cybersecurity at the RSA Conference 2018 (European Commission) Ladies and gentlemen, It is a pleasure to be with you today. Many thanks for inviting me to San Francisco. When it comes to cyber-attacks, you could say my experience is somehow special. Estonia is

RSA President: Cybersecurity Tech Accord Statement Is "Too Broad," Offensive Capability Needs To Be Better Defined (CRN) "I think it's too broad of a statement," said RSA President Rohit Ghai. "I think it needs to be qualified with some more granular descriptors of 'what do we mean by offensive capability?'"

Gold Galleon Hacking Group Plunders Shipping Industry (Threatpost) Researchers have identified a hacking group behind several widescale maritime shipping industry business email compromise (BEC) attacks since June.

Cryptographers spank blockchain, social media (ZDNet) RSA Conference panel takes hard look at current issues. The group also questions the industry's obsession with increasing speeds at the expense of security.

ESET launches new enterprise security products (Computer Dealer News) After reaching out to enterprise IT security specialists across the world, cybersecurity firm ESET says it's developed a single console that can

Future cyber threats will come from inside the architecture (Fifth Domain) “The Five Most Dangerous Attack Techniques” read the marquee guiding attendees of the RSA cybersecurity conference to this morning’s keynote panel. As the audience shuffled to find seats in the bluely lit room, the four panelists from SANS institute launched into a rapid fire assessment of multiple threats, some of which certainly seemed dangerous.

Cyber Educators International (CEI) Launches at RSA 2018 (PRWeb) Cyber Educators International (CEI) announced today the launch of an industry-driven initiative focused on creating a global community of edu

Fidelis Cybersecurity Extends Its Automated Detection & Response Platform to Protect Cloud Assets with Intelligent Deception (BusinessWire) Fidelis Cybersecurity® (Fidelis), a leading automated detection and response provider, today announced that its latest release of the Fidelis Elevate™

In preparation for the GDPR, CoSoSys launches Endpoint Protector 5.1 (Help Net Security) CoSoSys announced the latest update of its award-winning flagship Data Loss Prevention product, Endpoint Protector 5.1, which brings added functionalities to key features and a boost for GDPR compliance.

Open-source library for improving security of AI systems (Help Net Security) IBM researchers have created the Adversarial Robustness Toolbox, an open-source library to help researchers improve the security of real-world AI systems.

Anomali partners with Visa to offer global payment breach intelligence (Help Net Security) Anomali announced a partnership with Visa to provide cyber security teams with global payment breach intelligence drawn from Visa Threat Intelligence, to better detect and manage breaches involving payment information in retail, hospitality, restaurant and other sectors.

CrowdStrike Wins SC Award for Best Security Company Second Year in a Row (BusinessWire) CrowdStrike, the leader in cloud-delivered endpoint protection, today announced that the company was recognized by the 2018 SC Awards as Best Security

All-woman tech panel warns of inadequate online legal protections (Irish Times) OURSA, set up as alternative to RSA conference, says emerging technologies can be used for surveillance of users

SC Media's Cable Car News Videos with Bradley Barth (SC Media US) SC Media's Senior Reporter Bradley Barth took five cybersecurity experts on a field trip during RSA 2018 and conducted what may be the industry's first ser

Cyber Attacks, Threats, and Vulnerabilities

Russia’s Grizzly Steppe gunning for vulnerable routers (Naked Security) Russian Government hackers stand accused of targeting millions of routers

Russia denies ‘feeble’ US, UK charges of internet tampering (Fifth Domain) In a joint statement Monday, the U.S. Department of Homeland Security, the FBI and the U.K.’s National Cyber Security Centre said the main targets in the alleged tampering of routers and other networking equipment include “government and private-sector organizations,” as well as providers of “critical infrastructure” and internet service providers.

Turnbull warns business of Russian cyber attacks (The West Australian) PM met with counterparts from Britain, Canada and NZ, who are part of the ‘five eyes’ group that shares intelligence.

Russian Cyber Threat (Information Security Buzz) Days after the missile strike on Syria, GCHQ and the FBI have warned of a potential retaliation by Russia– in the form of a cyber attack. The NCSC is on high alert and concern is growing among executives who fear severe disruption of critical infrastructure. IT security experts commented below. Bill Conner, CEO at SonicWall: “Cyber attacks like …

CERT NZ issues security alert about Smart Install-enabled Cisco devices (Security Brief) CERT NZ has issued a bulletin about a cyber attack campaign that is targeting Cisco devices that have enabled Smart Install (SMI).

Tripwire Survey 70 Percent of Energy Security Professionals Concerned About Catastrophic Failure (Tripwire) While recognizing physical consequences of cyberthreats, proper investment lacking

'I Feel Free': Russian Students In U.K. Unmoved By Kremlin's Call To Come Home (RadioFreeEurope/RadioLiberty) Russia's state aid agency is urging students studying abroad to return home, citing growing anti-Russian sentiment in Europe. Russian students in England say such concerns are nonsense.

Cyber-terrorism: more Hollywood fad than genuine fear (ITWeb) While there can be no doubt that cyber-crime and cyber-terrorism are real threats, the dangers they pose are nowhere near what blockbuster films would have you believe.

New hacker groups emerging in Asia and in the Middle East, finds Kaspersky (SC Media UK) Security researchers observed a noticeable spurt in the activities of advanced persistent threat groups based in certain parts of Asia and the Middle East.

LocalBlox found leaking info on tens of millions of individuals (Help Net Security) LocalBlox, a company that "crawls, discovers, extracts, indexes, maps and augments data in a variety of formats from the web and from exchange networks" and ties it all together to create profiles on individuals for marketing purposes, has been found leaking information on tens of millions of individuals.

'Trustjacking' Could Expose iPhones to Attack (WIRED) Have you used a friend's laptop to charge your iPhone and gotten a prompt that says, "Trust This Computer?" Say yes, and the computer will be able to access your phone settings and data while they're connected. And while it doesn't feel like your answer really matters—your phone will charge either way—researchers from Symantec warn that this seemingly minor decision has much higher stakes than you'd think.

iOS Trustjacking Attack Exposes iPhones to Remote Hacking (Bleeping Computer) Symantec researchers have found a loophole in how iPhone users pair devices with Mac workstations and laptops. They say attackers can exploit this flaw —which they named Trustjacking— to take over devices without the phone owner's knowledge.

Stresspaint Malware Steals Facebook Credentials and Session Cookies (Bleeping Computer) Security researchers have spotted a new information stealer that collects Chrome login data from infected victims, along with session cookies, and appears to be looking for Facebook details in particular, according to a Radware threat alert the company shared with this reporter.

TaskRabbit Takes Down App And Website After Getting Hacked (Information Security Buzz) TaskRabbit, a web-based service that connects freelance handymen with clients in various local US markets, has emailed customers admitting it suffered a security breach. The company has taken down its app and website while law enforcement and a private cyber-security firm are investigating the incident. IT security experts commented below. Tim Helming, Director of Product …

Hard drive borking malware found lurking behind Minecraft skins (Inquirer) The unsophisticated malware looks more like a trolling attempt than a clever cyber attack

Cyber crooks are more interested in exploiting people, not software flaws, claims Proofpoint (Computing) Ransomware, phishing, cryptocurrency threats and cloud attacks all growing fast, warns security report

Cyber attack on testing company affected several other states (Franklin Home Page) The cyber attack that stopped some students from taking standardized tests in Tennessee this week also affected several other states. At a hearing about the testing problems in the Tenne

Security Patches, Mitigations, and Software Updates

Google Chrome 66 Released Today Focuses on Security (BleepingComputer) Google has moved Chrome 66 to the stable channel and starting earlier today has begun updating users to the browser's new major version — Chrome 66.0.3359.117.

Cisco plugs critical hole in WebEx, users urged to upgrade ASAP (Help Net Security) Cisco has fixed a critical vulnerability in its WebEx videoconferencing software that could be exploited to compromise meeting attendees' systems by simply opening a booby-trapped Flash file shared in a meeting.

Cyber Trends

State of Cybersecurity Study: Security Budgets Increasing, But Qualified Cybertalent Remains Hard to Find (BusinessWire) ISACA released its State of Cybersecurity 2018 report at RSA today. The report details the skills in most demand, time it takes to hire and more.

State of Cybersecurity 2018 (Cybersecurity Nexus) For the fourth year in a row, ISACA has surveyed security leaders worldwide to determine their insights and experiences with key cybersecurity issues, ranging from workforce challenges and opportunities to the emerging threat landscape.

C-suites are hopelessly under-prepared for AI (Business Insider Australia) Deloitte Human Capital Trends 2018 report says 1 in 4 organisations using AI and robotics

Ransomware Moving into Business-Critical Systems; Employees a Key Weakness, Research Shows (Security Boulevard) Ransomware attacks are moving away from the consumer space and into business-critical systems, encrypting entire databases and servers, commanding bigger ransom requests and inflicting more damage than ever, according to an analysis of data from 67 organizations.

Looking for the weak links in Australia’s data breach battle (ARN) More than half of Australian businesses may have experienced breaches in the past year, but how is the data getting out?

Marketplace

Army DCO using streamlined acquisition, data analytics to defend cyberspace (FederalNewsRadio.com) The Army’s new framework for a rapid process to acquire cyber defensive tools is a good example of how DoD acquisition systems are about providing the warfighters as much capability as possible.

Polaris Alpha builds out cyber offerings (Jane's 360) Polaris Alpha announced on 16 April that it had acquired Maryland-based cyber solutions firm Fourth Dimension Engineering.

MacB’s Enlighten IT Consulting Wins U.S. Cyber Command Contract (Washington Exec) Enlighten IT Consulting, a MacAulay-Brown Inc. company, has been awarded a prime contract to provide big data platform sustainment and engineering services to the U.S. Cyber Command.

Booz Allen Hamilton Announces Formation of the Booz Allen Foundation (BusinessWire) Booz Allen Hamilton today announced the formation of the Booz Allen Foundation with an initial pledge of $5 million.

ZeroFOX Names Industry Thought Leader Dr. Sam Small as Chief Security Officer (BusinessWire) ZeroFOX, the social media security category leader, today announced the hiring of Dr. Sam Small as Chief Security Officer (CSO). In his new role, Dr.

Products, Services, and Solutions

Securonix Unveils Strategic Alliance to Combat Cyberattacks in the Cloud (GlobeNewswire News Room) Protects cloud infrastructure and cloud apps against cyber attacks using the most advanced security analytics

Simplify and Secure Your Online Logins with a YubiKey (WIRED) As we become more dependent upon online platforms for social and professional purposes, it grows increasingly important that we embrace stronger online security measures.

Cyber Risk Assessment is Just the Beginning (CMMI Institute) Manage Up your cybersecurity resilience, readiness and board confidence with the world’s first cyber capability maturity management platform

Technologies, Techniques, and Standards

GDPR: securing data is more than just a technology fix, it’s about understanding human behaviour (MicroscopeUK) Neal Lillywhite, VP EMEA Channel at Forcepoint, argues GDPR is about people and processes as well as technology

Want to Prevent Cyberattacks? Don't Count on Employee Training to Stop Them. (Governing) Tips from a cybersecurity expert.

Verizon: Lack of Interoperability, Consistency Slows Automation (Light Reading) Verizon executive Vickie Lonker thinks both vendors and network service providers can do a better job to move forward faster.

Explaining the Crypto in Cryptocurrency (Investopedia) Cryptocurrencies like Bitcoin and Ethereum have gained immense popularity thanks to their decentralized, secure and anonymous nature, which supports the peer-to-peer architecture and makes it possible to transfer funds and other digital assets between two different individuals without a central authority.

Sophos Study Uncovers ‘Dirty Secrets’ of Firewalls (eWEEK) Dirty secret No. 1: IT managers simply cannot identify nearly half (45 percent) of their organization’s network traffic. In fact, nearly 25 percent cannot identify a whopping 70 percent of their network traffic.

Design and Innovation

Can data science save social media? (TechCrunch) The unfettered internet is too often used for malicious purposes and is frequently woefully inaccurate. Social media -- especially Facebook -- has failed miserably at protecting user privacy and blocking miscreants from sowing discord.

Research and Development

Energy Department announces funding opportunity for energy sector cybersecurity (Daily Energy Insider) The U.S. Department of Energy (DOE) made Monday a $25 million funding opportunity announcement (FOA) for research, development and demonstration (RD&D) of innovations that advance cyber resilient energy delivery systems.© Shutterstock “Energy cybersecurity is a ... Read More »

Researchers propose scheme to secure brain implants (Help Net Security) A group of researchers from KU Leuven, Belgium, have proposed a practical security scheme that would allow secure communications between a widely used implantable neurostimulator - an electrical brain implant used to treat a number of medical issues - and its external device programmer.

Academia

Texas A&M Shuts Down 2 Chinese Learning Institutes Deemed National Security Threats (The Daily Signal) A bipartisan letter from two Texas congressmen flagged the institutes as "a threat to U.S. national security" that serves as "a platform for China’s intelligence collection and political agenda."

'Nerd-speak' and thwarting hacks: Top youth cyber-security competition comes to Baltimore (Baltimore Sun) The Loyola Blakefield team — the only Maryland school to make it to the final round of the national CyberPatriot contest — spent hours in quiet concentration, trying to earn points by defeating hackers and securing the computer servers of a fictional company.

College of Southern Nevada recognized for cybersecurity education (Las Vegas Review-Journal) The College of Southern Nevada is the first school in the state to be recognized by two federal agencies for its work in cybersecurity education.

Cybersecurity Means Job Security (UANews) Meet Louis A. Clark. He is 54 years old, 6-foot-3 and 159 pounds. He lives at 4676 Joyce St. His blood type is B-positive, he drives a 1996 Maserati Ghibli and his favorite color is orange. But that's not all there is to know about Clark. He is active on social media. His mother's maiden name (Cottman), his first pet's name (Pirate) and his favorite sports team (Raiders) aren't the secure computer password questions he thinks they are. And there's this: He has connections to an organized-crime family.

Legislation, Policy, and Regulation

With proposed cuts, what happens to DISA’s mission? (C4ISRNET) If DISA gets eliminated, where will its functions go? The answer isn't clear.

Bolton era begins with exits and anxiety at National Security Council (CNN) By the start of John Bolton's second week as national security adviser, five top officials at the National Security Council had already resigned under pressure, been fired or decided to leave.

Two CIA Vet Takes on CIA Nominee Haspel & Those Tapes (The Cipher Brief) Cipher Brief experts Todd Rosenblum and General Michael Hayden share their views on Gina Haspel's nomination - and the destruction of "those tapes."

Litigation, Investigation, and Law Enforcement

Senators demand more information about DC mobile snooping devices (CNN) A bipartisan group of four Senate privacy hawks are demanding the Department of Homeland Security publish more information about the evidence of mobile snooping devices in Washington and surrounding areas.

Why Zuckerberg’s testimony doesn’t add up (New York Post) Mark Zuckerberg proudly trotted out a number when he was being questioned last week by Congress: His company, Facebook, would soon double the security team that monitors content on the site, to 20,…

Former Student Charged in Cyber Attack (WILX) An attack on Ingham Intermediate School District's online network and the person police say is responsible was one of its own students. The incident happened in February 2017.

For a complete running list of events, please visit the Event Tracker on the CyberWire website.

Upcoming Events

5th Annual Cybersecurity Summit (McLean, Virginia, USA, April 24, 2018) Join the Potomac Officers Club for the Fifth Annual Cybersecurity Summit to hear from public and private sector leaders on how federal agencies can improve their respective data security measures.

Secutech (Taipei, Taiwan, April 25 - 27, 2018) To meet the rising demand for intelligent and customised solutions, Secutech converges security and safety, ICT, IoT, artificial intelligence, big data, edge computing, intelligent video analytics and...

Industrial Control Systems (ICS) Cyber Security Conference Asia (Singapore, April 25 - 27, 2018) The Central ICS/SCADA Cyber Security Event of the Year for the APAC Region. Three days of multi-track training & workshops for days for operations, control systems and IT security professionals to connect...

INFILTRATE (Miami Beach, Florida, USA, April 26 - 27, 2018) INFILTRATE is a "pure offense" security conference aimed at the experienced to advanced practitioner. With the late-90s hacker con as its inspiration, the event has limited attendance in order to foster...

Automotive Cybersecurity Summit 2018 (Chicago, Illinois, USA, May 1 - 8, 2018) Smart Vehicles. Smart Infrastructures. The 2nd annual Automotive Cybersecurity Summit brings together public and private-sector manufacturers, suppliers, assemblers, technology providers and V2X partners...

Application of the Law of War to Cyber Operations (Washington, DC, USA, May 3, 2018) Cyber law experts meeting at the George Washington University will cover Title 10 vs. Title 32 vs. Title 50 and the lawful and operational restrictions related to these authorities. The panelists will...

Global Cyber Security in Healthcare & Pharma Summit (London, England, UK, May 3 - 4, 2018) The number of cyber-attacks in healthcare is on the rise, and the industry must do more to prevent and respond to these incidents. The Global Cyber Security in Healthcare & Pharma Summit 2018 will bring...

Decompiling the Government: Getting Technologists and Policymakers to Speak the Same Language (New York, New York, USA, May 3, 2018) This event brings together technologists and leading policymakers, lawyers, and journalists to bridge the gap between non-technical and technical cyber professionals and features Lisa Monaco, former Assistant...

Secure Summit DC (Washington, DC, USA, May 7 - 8, 2018) (ISC)² Secure Summit DC will assemble the best minds in cybersecurity for two days of insightful discussions, workshops and best-practices sharing. The goal of the event is to equip security leaders to...

HACKNYC (New York, New York, USA, May 8 - 10, 2018) The recent flood of data breach news may numb us to the threat of attacks with kinetic effects--direct or indirect physical damage, injury, or death. Hack NYC focus’ on our preparation for, and resilience...

Insider Threat Program Management With Legal Guidance Training Course (Herndon, Virginia, USA, May 8 - 9, 2018) This training will provide the ITP Manager, Facility Security Officer, and others (CIO, CISO, Human Resources, IT, Etc.) supporting an ITP, with the knowledge and resources to develop, manage, or enhance...

SecureWorld Kansas CIty (Kansas City, Missouri, USA, May 9, 2018) Connecting, informing, and developing leaders in cybersecurity. SecureWorld conferences provide more content and facilitate more professional connections than any other event in the Information Security...

Cyber Investing Summit (New York, New York, USA, May 15, 2018) Now in its third year, the Cyber Investing Summit is an all-day conference focusing on investing in the cyber security industry, which is predicted to exceed $1 trillion in cumulative spending on products...

Third Annual Cyber Investing Summit (New York, New York, USA, May 15, 2018) Renowned cyber security executive David DeWalt will deliver the keynote address at the Third Annual Cyber Investing Summit. The Cyber Investing Summit is a unique all-day conference focused on the financial...

The Cyber Security Summit: Dallas (Dallas, Texas, USA, May 15, 2018) This event is an exclusive conference connecting Senior Level Executives responsible for protecting their company’s critical data with innovative solution providers & renowned information security experts.

Digital Utilitites Europe (Amserdam, the Netherlands, May 16 - 17, 2018) The conference will bring together key industry stakeholders to address the current challenges of the digitisation in the utilities sector. Join us in Amsterdam to hear latest business case studies and...

SecureWorld Houston (Houston, Texas, USA, May 17, 2018) Connecting, informing, and developing leaders in cybersecurity. SecureWorld conferences provide more content and facilitate more professional connections than any other event in the Information Security...

Ignite18 (Anaheim, California, USA, May 21 - 24, 2018) Palo Alto Networks' sixth annual conference features highly technical insights based on firsthand experiences with next-generation security technologies, groundbreaking new threat research, or innovative...

AFCEA/GMU Critical Issues in C4I Symposium (Fairfax, Virginia, USA, May 22 - 23, 2018) The AFCEA/GMU Critical Issues in C4I Symposium brings academia, industry and government together annually to address important issues in technology and systems research and development. The agenda for...

3rd Annual Nuclear Industrial Control Cybersecurity and Resilience Overview (Warrington, England, UK, May 22 - 23, 2018) Now in its 3rd year, the Cyber Senate Nuclear Industrial Control Cyber Security and Resilience Conference will take place on May 22/23rd in Warrington United Kingdom. This two day executive forum will...

PCI Security Standards Council’s Asia-Pacific Community Meeting (Tokyo, Japan, May 23 - 24, 2018) Join us for: networking opportunities, updates on industry trends, insights and strategies on best practices, engaging keynotes and industry expert speakers. The PCI Security Standards Council’s 2018...

North American Financial Information Summit (New York, New York, USA, May 23, 2018) Data is the most vital asset of any financial services firm. With volumes increasing exponentially, and the complexity and structure continuously changing, it is more vital than ever to keep on top of...

SecureWorld Atlanta (Atlanta, Georgia, USA, May 30 - 31, 2018) Connecting, informing, and developing leaders in cybersecurity. SecureWorld conferences provide more content and facilitate more professional connections than any other event in the Information Security...

RISKSEC (New York, New York, USA, May 31, 2018) Welcome to the 2018 New York City RiskSec Conference. As SC Media approaches our 30th anniversary, we fully understand the avalanche of cybersecurity-related problems, responsibilities and aspirations...

Grow your brand and reach new customers.

Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.

Be a part of the CyberWire story.

People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.