17 Mar | View galleries
17 Mar | View galleries
Predictions for 2015 In the world of business, correctly seeing the future even a few months out can provide a leg up on the competition or, in the case of cybersecurity, on ever-present attackers. A missed guess can leave one scrambling to catch up. So, here are some predictions for 2015 on security from research firms Gartner and Forrester Research, and from Arthur W. Coviello Jr., executive chairman of RSA.
02 Jan | View galleries
CSO Trend Micro Workshop
30 Aug | View galleries
Governments and corporations alike must escalate the treatment of cybersecurity to the point where it is handled with the same severity as any other risk, speakers at this month’s Cisco Live! conference agreed as security and IT administrators gathered to weigh the progress of cybersecurity policy and technology.
It may not be a word that most CISOs use to describe their jobs, but the proclamation of Cisco Systems chief information security officer Steve Martino (read CSO Australia’s interview) that “it’s sexy to be a security person today” resonated strongly with the themes of this year’s Cisco Live! conference in Melbourne.
Australia’s mandatory breach disclosure legislation has leapfrogged that in other countries and reflects the government’s world-beating cybersecurity posture, Cisco Systems’ most senior security executive has advised while warning that Australian security innovators must not be afraid to “go for it” to help the country dominate the region’s cybersecurity agenda.
Seamless sharing of new threat information has pushed CSOs to give integrated security platforms more strategic urgency than in the past, a senior Cisco Security executive has warned as the company fills out its own platform offering to address increasing customer demands.
Organisational security capabilities may be improving on a regular basis but a confluence of issues means that security personnel are fighting an ever-widening ‘effectiveness gap’ that is keeping them on the back foot, a senior Cisco Systems security executive has warned.
Fraudsters are using legitimate executive names and email addresses to dupe unsuspecting employees to wire money or sensitive documents to their accounts. The CTO of the Boston Celtics, for one, is fighting back.
Cyber security has transformed from what most viewed as an IT issue to a central business concern, and the CIO and CISO roles are shifting in response. If we’re to keep up the pace and adopt emerging technologies, security needs to be a priority and CIOs and CISOs need to work together to mitigate risk in organizations across industries and throughout government.
Security executives urge firms not to lose focus on prevention. They advise developing a holistic plan for IT and business units to fight cybersecurity together.
Participants in the White House Summit on Cybersecurity and Consumer Protection on Friday called for government/private sector information sharing, updated regulations, and improving the trust citizens have in the government's respect for privacy and civil liberties.
Cloud, mobility, Internet of Everything (IoE), and social media technologies, combined with digital business practices, have helped countless organizations transform how they operate. But they have also increased the attack surface. Old methods of cybersecurity that focus on perimeter defense are no longer enough to keep an organization safe. Organizations recognize that cyber attacks will be launched against them. But by adopting cyber resilient architectures and business processes, they can shift from a reactive to proactive state and tackle cyber risks with confidence. This paper: • Defines cyber resilience • Outlines its major benefits • Describes the seven major system capabilities of a cyber resilient enterprise