i-SIGMA Call For Presentations Now Open

IG Guru

i-SIGMA is looking for topic ideas and presentations for upcoming webinars and next year’s Annual Conference. The post i-SIGMA Call For Presentations Now Open appeared first on IG GURU.

Card-Not-Present Fraud Costs Mount

Data Breach Today

A Juniper Research analysis of why card-not-present fraud will continue to grow leads this week's edition of the ISMG Security Report. Also featured: Updates on a Neiman Marcus breach lawsuit settlement and a German hacking incident

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Card-Not-Present Fraud Growth: No End in Sight?

Data Breach Today

Card-not-present fraud will cost retailers worldwide $130 billion between 2018 and 2023, a new report from Juniper Research predicts. Steffen Sorrell, author of the study, explains the reasons behind this growth projection and describes what can be done to improve the fight against fraud

Retail 163

e-Records 2020 Call for Presentations

The Texas Record

TSLAC and DIR are looking for learner-focused presentations designed to engage virtual audiences. Prior experience presenting online is not required. We need virtual presenters! Requested Presentation Formats. This year the annual e-Records conference is online!

Open Source & Open Standards: Navigating the Intricacies of a Symbiotic Partnership

Speaker: Guy Martin, Executive Director of OASIS Open

The COVID-19 global pandemic has raised the already bright visibility of technology to an even higher level. Join Guy Martin, Executive Director at OASIS Open, as he presents this webinar that will discuss how we can make open source and open standards even more effective by helping them recapture their strong partnership.

Tenable experts found 15 flaws in wireless presentation systems

Security Affairs

Experts at Tenable discovered 15 vulnerabilities in eight wireless presentation systems, including flaws that can be exploited to remotely hack devices. Wireless presentation systems are used to display content on a screen or through several devices, including mobile devices and laptops. Researchers at Tenable discovered 15 vulnerabilities in eight wireless presentation systems, some of them can be exploited for command injection and for gaining access to a device.

Unixfreaxjp at #R2CON2020 presented shellcode basics for radare2

Security Affairs

In this presentation, I explain how to utilize radare2 for variation of shellcode analysis and will lead you as a tutorial from a basic know-how in analyzing shell code with multiple demonstrations.

GUEST ESSAY: ‘CyberXchange’ presents a much-needed platform for cybersecurity purchases

The Last Watchdog

Cybersecurity buyers will want a trusted place online to find, evaluate, and purchase products and services from home, as teleworking replaces more traditional methods of in-person sales presentations, trade shows, events and dinners. There is no shortage of innovative cybersecurity tools and services that can help companies do a much better job of defending their networks. Related: Welcome to the CyberXchange Marketplace In the U.S.

B2B 143

Windows 7 End of Life Presents Hacking Risk, FBI Warns

Adam Levin

The post Windows 7 End of Life Presents Hacking Risk, FBI Warns appeared first on Adam Levin. The FBI warned in a private industry notification published August 3 that companies and organizations still using Windows 7 are at risk.

Risk 80

e-Records Conference 2020: Call for Presentations Extended

The Texas Record

Update: The deadline for submitting a presentation proposal for the 2020 e-Records Conference has been extended to Tuesday, September 15, 2020. Check out our previous blog post for details about submitting your proposal.

71

Critical Flaws Found in Eight Wireless Presentation Systems

Threatpost

Crestron, Barco wePresent, Extron ShareLink and more wireless presentation systems have an array of critical flaws. IoT Vulnerabilities Barco wePresent Crestron critical vulnerability Extron ShareLink wireless presentation system

IoT 69

e-Records 2019 Call for Presentations

The Texas Record

We are now accepting presentation proposals from government organizations (state agencies, universities, or local governments), vendors and subject matter experts from various organizations. TSLAC and DIR are looking for learner-focused presentations that build core skills and share practical knowledge and experience related to digital collaboration, communication, security, and retention. Presentations should deliver takeaways that are immediately useful to attendees’ work.

Collibra presents Black History Month: Celebrating Black excellence in tech

Collibra

The post Collibra presents Black History Month: Celebrating Black excellence in tech appeared first on Collibra. Throughout February, Collibra celebrated US Black History Month by organizing events that highlighted the theme of ‘Black Excellence in Tech.’

FTC Issues Call for Presentations for PrivacyCon 2021

Hunton Privacy

The Federal Trade Commission issued a call for presentations on consumer privacy and data security research for its sixth annual PrivacyCon , which is to be held on July 27, 2021.

Singapore presented the Operational Technology (OT) Cybersecurity Masterplan

Security Affairs

The Cyber Security Agency of Singapore (CSA) presented the Operational Technology (OT) Cybersecurity Masterplan to increase the resilience of Critical Information Infrastructure (CII) sectors. The Cyber Security Agency of Singapore (CSA) presented the Operational Technology (OT) Cybersecurity Masterplan to enhance the security and resilience of Singapore’s Critical Information Infrastructure (CII) sectors in delivering essential services.

3 Steps CISOs Can Take to Convey Strategy for Budget Presentations

Dark Reading

Answering these questions will help CISOs define a plan and take the organization in a positive direction

88

Toyota presented PASTA (Portable Automotive Security Testbed) Car-Hacking Tool

Security Affairs

At the BLACK HAT EUROPE 2018 held in London the duo presented the tool and confirmed that Toyota plans to share the specifications on Github and will start selling the fully built system in Japan. A research team from Toyota InfoTechnology Center will present “PASTA: Portable Automotive Security Testbed with Adaptability” in a new Briefing at #BlackHat Europe in London, December 3-6 [link].

Paper 87

Past, present, and future of the Dark Web

Security Affairs

Considerations about past, present, and future of the Dark Web. The post Past, present, and future of the Dark Web appeared first on Security Affairs. Which is the difference between the Deep Web and Dark Web? These are intense days for the Dark Web. Operations conducted by law enforcement agencies lad to the arrests of many individuals and the closure of the most popular Black Marketplaces, many of which remained alive over the years.

Researchers presented an improved version of the WPA KRACK attack

Security Affairs

Now the experts presented a new variant of the attack technique at the Computer and Communications Security (CCS) conference. We believe the main reason vulnerabilities are still present is because the Wi-Fi standard is large, is continually being expanded with new features, and requires domain-specific knowledge to understand,” the researchers conclude. The post Researchers presented an improved version of the WPA KRACK attack appeared first on Security Affairs.

Paper 87

Stop Macs from falling asleep during presentations with Jamf

Jamf on EdTech

Help your users have successful presentations with a Self Service policy which temporarily extends screensaver password timeouts, computer sleep options and automatic policy executions, then automatically restores approved security settings after a configurable duration: Presentation Mode.

Reminder: e-Records 2019 Call for Presentations

The Texas Record

If you are interested in presenting at the conference this year, please complete the presentation proposal form soon. The theme for this year’s e-Records Conference is Better Together in a Digital World: Security and Retention and will be held on Friday, November 15th at The Commons Learning Center in Austin, Texas. Thank you to everyone who has already submitted your speaking proposals.

Expert presented a new attack technique to compromise MikroTik Routers

Security Affairs

The experts at Tenable Research presented the technique on October 7 at DerbyCon 8.0 The post Expert presented a new attack technique to compromise MikroTik Routers appeared first on Security Affairs. Experts from Tenable Research have devised a new attack technique to fully compromise MikroTik Routers. MikroTik routers continue to be under attack, and the situation is getting worse because of the availability of a new PoC code.

Interserve UK defense contractor hacked, up to 100,000 past and present employees details exposed

Security Affairs

Britain’s Ministry of Defence contractor Interserve has been hacked, intruders have stolen up to 100,000 past and present employees’ details. According to the defense contractor’s website, Interserve is present on 35 MoD sites, the company also announced that it is supporting the NHS during COVID-19. The post Interserve UK defense contractor hacked, up to 100,000 past and present employees details exposed appeared first on Security Affairs.

MER 2019 – CALL FOR PRESENTERS

IG Guru

We are looking for presentations on solutions to the IG challenges created by new and emerging technologies, the latest legal and regulatory developments that affect IG programs and professionals, practical advice and guidance on traditional IG challenges, and relevant case studies […]. The post MER 2019 – CALL FOR PRESENTERS appeared first on IG GURU. MER Conference 2019 program is shaping up! Still time to join the speaking team!

FOIA 40

MITRE presents ATT&CK for ICS, a knowledge base for ICS

Security Affairs

The post MITRE presents ATT&CK for ICS, a knowledge base for ICS appeared first on Security Affairs. MITRE announced the initial release of a version of its MITRE ATT&CK knowledge base that focuses on industrial control systems (ICS). MITRE’s ATT&CK framework is becoming a standard in cybersecurity community for the classification of attacker behavior. Now the organization is going to propose a knowledge base that focused on ICS systems for its MITRE’s ATT&CK.

Risk 63

Data Science Virtual Expert Panel Presented by AWS

Perficient Data & Analytics

Join us and our partner Amazon Web Services (AWS) for a virtual Q&A session on Wednesday, April 15. AWS will feature one of our experts to speak on a panel about the evolution and progress being made to solve critical business problems such as customer personalization and forecasting through the use of data science. Perficient and the panel will be ready to answer questions about machine learning, services such as Amazon Personalize and Amazon Forecast , and more.

e-Records Conference 2018: Call for Presentations

The Texas Record

We are now accepting presentation proposals from state government organizations (state agencies, universities or local governments), vendors and subject matter experts from various organizations to share both their challenges and successes with managing electronic records. Presentation formats could include 1-2 presenters or 3-4 panelists for 45 or 75-minute sessions. The deadline for submitting presentation proposals is FRIDAY, JULY 20, 2018.

COVID-19 Interest Rates Present Mortgage Industry Challenges

InfoGoTo

As terrible as the pandemic is, COVID-19 interest rates are at an all-time low never seen before. As a result, people are rushing to refinance their mortgages. According to a CNBC report, in mid-March, mortgage refinance applications spiked 79% as homeowners rushed to take advantage of lower rates. The mortgage industry is hardly prepared for this business influx under normal circumstances, let alone now.

Flaws in SanDisk SSD Dashboard Present Malware & Data Loss Risks

Dark Reading

Organizations using the utility should immediately install the latest version of the software, security vendor Trustwave says

Risk 70

Analytics experts discuss AI's present and future

IBM Big Data Hub

Where is AI headed? How should you be thinking about AI? What should you be doing with AI? To answer these questions, we recently convened a round table of tech influencers to discuss some of the most burning issues arising from AI — starting with why we should think of it as “augmented intelligence” rather than “artificial intelligence

Baltimore SharePoint User's Group Presentation

JKevinParker

Get the slides from my presentation on "Don't Make Me Think: Getting SharePoint to be Useful, Usable, and Used": Don't Make Us Think: Getting SharePoint to be Useful, Usable, and Used from Kevin Parker, CIP. Presentation SharePointLast night I had the privilege of speaking at the Baltimore SharePoint User's Group. I really enjoyed the interaction with these professionals.

40

Duo Labs presents CRXcavator Service that analyzes Chrome Extensions

Security Affairs

The post Duo Labs presents CRXcavator Service that analyzes Chrome Extensions appeared first on Security Affairs. Researchers at Duo Labs has launched a new service called CRXcavator that allows users to analyze Chrome extensions and deliver security reports on them. Researchers at Duo Labs, a division of Duo Security, has launched a new service called CRXcavator that allows users to analyze Chrome extensions and deliver security reports on them.

Experts presented BOTCHAIN, the first fully functional Botnet built upon the Bitcoin Protocol

Security Affairs

Security experts Antonio Pirozzi and Pierluigi Paganini presented BOTCHAIN, the first fully functional Botnet built upon the Bitcoin Protocol. Security expert Antonio Pirozzi, director at ZLab malware lab at Cybaze firm, presented at the EU Cyber Threat Conference in Dublin conducted a research along with Pierluigi Paganini (aka @securityaffairs ), about how crooks could abuse blockchain for malicious purposes.

IRMS Conference Presentation – Professional Development for DPOs

Managing Your Information

This presentation considered: Tkm is a training partner of the IRMS. The presentation was given at the IRMS conference on 21 May 2019. IRMS conference presentation professional development for DPOs Download. The post IRMS Conference Presentation – Professional Development for DPOs appeared first on Tkm Consulting.

GDPR 28

IRMS Conference Presentation – Professional Development for DPOs

Managing Your Information

This presentation considered: Tkm is a training partner of the IRMS. The presentation was given at the IRMS conference on 21 May 2019. IRMS conference presentation professional development for DPOs Download. The post IRMS Conference Presentation – Professional Development for DPOs appeared first on Managing Your Information.

GDPR 28

The past, present and future of data warehouse appliances

IBM Big Data Hub

The IBM Integrated Analytics System (IIAS), is a unique, cloud-ready appliance and machine learning platform wields the power of an in-memory, massively parallel processing database engine with embedded Spark. It also runs on market-leading IBM Big Data Servers and IBM FlashSystem 900 storage arrays enabling a high-performance system optimized for business insight as well as advanced operational and in-database analytics

e-Records Conference 2019: Call for Presentations Extended

The Texas Record

Update: The deadline for submitting a presentation proposal for the 2019 e-Records Conference has been extended to Friday, July 26, 2019. Check out our previous blog post or the event web page for all the up-to-date information. News eRecords eRecords2019

43

A few hours after Apple released iOS 12.1, a researcher presented a Passcode Bypass issue

Security Affairs

a researcher presented a Passcode Bypass issue appeared first on Security Affairs. A few hours after Apple released iOS 12.1 the iPhone bug hunter Jose Rodriguez has found a new passcode bypass issue that could be exploited to see all contacts’ private information on a locked iPhone.

Insecure Home IoT Devices a Clear and Present Danger to Corporate Security

Dark Reading

Avast-sponsored study shows wide prevalence of IoT devices, many with weak credentials and other security vulnerabilities

IoT 82

Group-IB presented latest cybercrime and nation-state hacking trends in Asia

Security Affairs

According to Group-IB’s report findings, Asia is one of the most actively attacked regions in the world, the company presented latest cybercrime trends. Hong Kong, 16.11.2018 – Group-IB, an international company that specializes in preventing cyber attacks, presented the findings of its latest Hi-Tech Crime Trends 2018 report at the FinTech Security Conference in Hong Kong organized by Binary Solutions Limited in partnership with Group-IB.