For the first time, members of the secretive "Five Eyes" intelligence-sharing group will make a joint public appearance to discuss how they collaborate, sharing a stage in Glasgow, Scotland, during the CyberUK conference. The Five Eyes alliance comprises Australia, Canada, New Zealand, the U.K. and U.S.
A sophisticated attack campaign dubbed "Operation ShadowHammer" involved an advanced persistent threat group planting backdoors within Asus computers by subverting the Taiwan-based PC maker's third-party supply chain and updater software, Kaspersky Lab warns.
This Valentine's Day, authorities are once again warning individuals to watch out for anyone perpetrating romance scams. The FTC says Americans lost $143 million to romance scams in 2017, while in the U.K., Action Fraud says reported romance scam losses in 2018 topped $64 million.
President Donald Trump is reportedly continuing to weigh an executive order that would ban all U.S. organizations from using telecommunications hardware built by China's Huawei and ZTE. Australia and New Zealand have blocked the firms from their 5G rollouts, while other nations weigh similar moves.
The massive data breach suffered by Equifax in 2017 "was entirely preventable," according to a report released by the House Oversight Committee's Republican majority. Some Democratic lawmakers have slammed the report for failing to advance legislative or oversight changes to help prevent breaches.
Explore the state of DDoS attacks as observed by network and security professionals directly responsible for operating and securing global networks. This session covers a range of issues from threat detection and IR to managed services and staffing . Hear about the daily operational challenges, as well as strategies...
Brett Johnson, referred to by the United States Secret Service as "The Original Internet Godfather" has been a central figure in the cybercrime world for almost 20 years. He founded and was the leader of Counterfeitlibrary.com and Shadowcrew.com. Working alongside the top cyber criminals of our time, he helped design,...
Open source and third-party components help developers build and deploy applications faster. But with increased speed comes greater risk. Vulnerabilities in components are a hidden cost of free software. And their widespread use creates opportunities for attackers looking to exploit the most possible victims by...
Digital Risk is the greatest facet of risk most organizations now face, driven by global acceleration of digitization. It's an issue that has risen well-above the security group, and is forcing executives and boards to think beyond the core competency of their organization; because in many cases, they've transformed...
This exclusive session delves into details of some of CrowdStrike's most eye-opening breach investigations of the past year, and their implications for organizations of all sizes, regardless of their industry or country of origin. Also: New research on "breakout time" -the time from initial intrusion to the first...
Organizations and people's security hygiene can be poor, and criminals know it. Fraudulent activity costs are in the billions worldwide across industries, and over 16 million consumers in the US were victims of identity theft or fraud in 2016. Learning to analyze data at the speed of the business will ensure your...
The concept of the Internet of Things (IoT) truly represents a radical shift in how companies will operate, governments will govern and individuals will live their lives.
Microcomputetechnologies and autonomous systems will permeate our day-to-day activities. They will introduce opportunities for simplification,...
Due to the volume of personally-identifiable information (PII) available on the black market as a result of high profile breaches, fraudsters can open an account with a real identity using a few key pieces of compromised information. Fraudsters have also begun creating synthetic identities by piecing together...
The scale of connectedness we're experiencing is unprecedented. The pace of change and technology advancement in recent years could be compared to another industrial revolution. But the connectedness that allowed us to bring the power and security of the Visa network to each transaction in real time, also created the...
We've spent countless hours and dollars getting ready for the arrival of the EU'S GDPR. In the months since, what's actually changed? How have companies reacted? What should we expect going forward in the EU, and in North America? Has it been all bark and no bite? This session will outline how companies dealt with...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.