NOMINATIONS NOW OPEN

Data Protection — News

AusCERT 2013: Ashley Deuble: Network Security Monitoring with Security Onion

Although web application attacks have existed for over the last 10 years, simple coding errors, failed input validation and output sanitization continue to exist in web applications that have led to disclosures for many well-known companies. The most prevalent web application attacks are SQL Injection, Cross Site Scripting and OS Command Injection. With an increased number of companies conducting buisness over the Internet, many attackers are taking advantage of lax security and poor coding techniques to exploit web applications for fame, notoriety and financial gain.

CSO staff | 23 May | Read more

AusCERT 2013: Home-electronics gear’s UPnP as insecure in Australia as rest of world: Metasploit

Australia’s Internet space shows the same distribution of vulnerable IP ports as the rest of the world and a dangerous preponderance of insecure Universal Plug ‘n’ Play (UPnP) devices, Metasploit Project founder HD Moore has warned while recounting the surprising results of his efforts to catalogue the results of communicating with every IP address on the Internet.

David Braue | 22 May | Read more

ACMA database keeps finger on Australia’s malware pulse

Australian ISPs and universities are sending more than 10,000 emails a day to warn customers their systems appear to be infected by malware – but as few as one in five is ever read by its recipient, statistics from the Australian Communications and Media Authority’s (ACMA’s) Australian Internet Security Initiative (AISI) show.

David Braue | 21 May | Read more

Virtual desktops win the security case for Brisbane lawyers

It may have started out as a way of simplifying an increasingly complicated IT environment, but Brisbane law firm Cooper Grace Ward (CGW) has found its virtual desktop infrastructure (VDI) investment is also delivering improved remote-access security, data protection and integrity of sensitive information.

David Braue | 17 May | Read more

The new IAM: nailing shut the door on the Trojan horse

Cloud, mobility and bring-your-own-device (BYOD) computing are providing so many new potential ingress points to your network that it’s getting near impossible to keep up. The solution, as David Braue finds, lies in reconsidering your exposure, revisiting your IAM strategy – and picking your battles carefully.

David Braue | 15 May | Read more

Evolve Security Conference 2013 rolling coverage

What a time to be in the IT industry - right now technology is changing almost every aspect of our lives, and as IT professional we have front row tickets! The decisions we make today will be felt for years to come by the organisations we work for, their owners, their customers, and their partners. (Sanjay Mehta)

CSO staff | 14 May | Read more

Editor's Recommendations

Solution Centres

Events

View all events Submit your own security event

Latest Videos

More videos

Blog Posts

Media Release

More media release

Market Place