At Telecoms Cybersecurity UK & EU we will address how the sector is ensuring security by design and assurance as the communication backbone of digital security, IT, OT and IoT. As technology develops, our world grows, and as the threat landscape changes, cyber-attacks, specifically against the telecom industry, are on …
Read More »TimeLine Layout
April, 2023
-
9 April
Cybersecurity for Critical Assets (CS4CA) APAC 2023
The critical infrastructure that provides our energy, utilities, healthcare and other basic foundations of our societies is fundamentally changing. As we continue to move our traditional technologies online, our IT and OT systems face increasingly significant risks. Meanwhile, challenges emerging from an increasing cybersecurity skills gap, new regulations and today’s …
Read More » -
9 April
Hack Space Con 2023
The next cybersecurity, hacker, and space conference known as Hack Space Con 23 will take place on April 13-15, 2023. Hack Red Con, which took place in Louisville, Kentucky, was organized by the same people who are organizing this cybersecurity conference. The objective of the conference is to foster the …
Read More » -
9 April
16th Annual Sedona Conference Institute: Data Privacy & Cybersecurity Litigation
This Sedona Conference Institute program will kick off with a simulated tabletop exercise involving a cyber incident in which certain key players – IT, HR, inside and outside counsel, management, forensic investigators, regulators, and others – address the incident with an eye towards potential litigation. Over the next two days, …
Read More » -
9 April
Cybersecurity and Data Protection Task Force 2023
Come to the TaskForce ready to share your story, challenges, and/or questions. You can email your thoughts by contacting [email protected] before the call. · Participate live during the event by unmuting your mic, turning on your video, or sharing in the Zoom chat feature. · Understand the challenges and successes …
Read More » -
9 April
Identity Management Day 2023 Virtual Conference
Identity Management Day, started in 2021 and hosted by the Identity Defined Security Alliance and National Cybersecurity Alliance, aims to inform about the dangers of casually or improperly managing and securing digital identities by raising awareness and sharing best practices across the industry. In its second year, the 2023 Virtual …
Read More » -
9 April
IANS: Information Security Forum Philadelphia 2023
The Philadelphia Forum is designed for information security practitioners across all industries to dive deep on specific topics, share insights, and network with peers. This one-day event incorporates breakouts with IANS Faculty, spotlight sessions on emerging technologies, and opportunities to network with your peers. Topics fall into five tracks: Security …
Read More » -
9 April
Google: North Korea-Linked Hackers Target Subject Experts and Think Tanks
A North Korean government-backed hacking crew, tracked as ARCHIPELAGO, is targeting academics, government and military personnel, policymakers, researchers, and think tanks in South Korea and the U.S. According to Google researchers, it has launched cyberattacks against accounts belonging to individuals with expertise in North Korea policies such as sanctions, human rights, and …
Read More » -
9 April
Apple Ships Urgent iOS Patch for Newly Exploited Zero-Days
Apple on Friday pushed out a major iOS security update to fix a pair of zero-day vulnerabilities already being exploited in the wild. The newest iOS 16.4.1 and iPadOS 16.4.1 updates cover code execution software flaws in IOSurfaceAccelerator and WebKit, suggesting a complex exploit chain was detected in the wild …
Read More » -
9 April
Apple fixes two zero-days exploited to hack iPhones and Macs
Apple has released emergency security updates to address two new zero-day vulnerabilities exploited in attacks to compromise iPhones, Macs, and iPads. “Apple is aware of a report that this issue may have been actively exploited,” the company said when describing the issues in security advisories published on Friday. The first security flaw (tracked …
Read More »