Over the past few years, a very small number of cybercriminals have become quite sophisticated and are able to cause significant damage. At the same time, a much larger number of actors have found the decreasing amount skills and resources necessary to engage in profitable cybercrime reason enough Continue reading “Lower Barriers to Entry Fueling Growth in Cybercrime, Espionage and Even Security Research”
Like last year, we are very happy to have hosted Girls’ Day 2018. We had a great experience with the eleven girls who participated. Girls’ Day has been held annually since 2001 where around 1.8 million girls have participated to date. Continue reading “Girls’ Day 2018 @ DCSO”
Like last year, the main expo filled two complete buildings with more than 550 vendors. The floors were dominated by all kinds of machine learning related products (including malware detection, identification of suspicious user behavior or classification of sensitive information). Companies claiming Continue reading “Impressions of the RSA Conference 2018 part II – On the expo floor”
Later than usual, the annual RSA Conference in San Francisco started on April 16th. Breaking another record, about 50.000 participants came to attend talks and trainings, receive updates on the latest product developments or meet with partners and peers. For us as Technology Scouts Continue reading “Impressions of the RSA Conference 2018 part I – Keynotes and Innovations”
10. – 11.
The PITS − Public IT Security − is a 2-day specialist congress for IT and cyber security to be held at the Adlon Hotel in Berlin. Under the slogan “Security and Risk – Strategies for Successful Digitalization” administration officials from federal and state government and municipalities as well as experts from security agencies and the scientific community are invited to attend. According to the organizers, this congress provides excellent opportunities for networking and exchanging information. Continue reading “PITS 2018”
China’s cyber security law released in 2017, with a substantial implementing phase of one year, marks a significant overhaul of IT network regulations, surveillance and compliance rules for citizens and businesses in China. The overhaul comes on the heels of a significant push by the Continue reading “New Cyber Security Laws put Compliance and Policy in the Spotlight”