Intel launch in pictures
19 Jan | View galleries
The Software Assurance Forum for Excellence in Code (SAFECode) has issued guidelines to make it easier, especially for businesses trying to decide which products to buy.
Some products will be replaced, but admins will need to start over for setup and configuration
Cisco is tying with a Chinese partner for joint development and better access to the local market, according to a newspaper report.
Intel is creating the Automotive Security Review Board to help the automotive industry use its hardware in a secure way -- and to persuade security researchers to help it find bugs in its own automotive hardware.
Security researchers and hackers gathered in Las Vegas over the past week to show off and learn about the latest vulnerabilities that affect devices and software that the world relies on every day. Black Hat and DEF CON, the world's top security conferences, did not disappoint.
If the probability of your assets being prodded by attackers foreign and domestic doesn't scare the bejesus out of you, don't read this article. If you're operating in the same realm of reality as the rest of us, here's your shot at redemption via some solid preventive pen testing advice from a genuine pro.
Is it possible to secure the Internet? And if so, what would it cost?
Everyone knows that IT is a cost center. What many people don't know is that recognizing and leveraging the connection between security risk mitigation and profits can create profit margin growth.
There are plenty of cities in the U.S. that want to lay claim to becoming the "next" Silicon Valley, but a dusty desert town in the south of Israel called Beersheva might actually have a shot at becoming something more modest, and more focused. They want to be the first place you think about when it comes to cybersecurity research, education, and innovation. If things go right there, it may well happen.
In our recent article, we highlighted that every significant and public attack exploited people to either get an initial foothold in a target organization or as the entire attack vector. These attacks highlight the need for awareness as a top concern of security programs.
Our key industry moderators from each roundtable discussion will come to stage to discuss each table's challenges, considerations and key takeaways in a panel format including Q&A with the audience.
CSO interviews CSO moderators on key takeaways from the CSO CXO Series event sponsored by Trend Micro in Melbourne 31st July 2015. Interview conducted by David Braue, CSO Moderator.
CSO interviews CSO moderators on key takeaways from the CSO CXO Series event sponsored by Trend Micro in Melbourne 31st July 2015. Interview conducted by David Braue, CSO Moderator
Quality of Security - Defense in Depth
An interview with Ron Gula, CEO and CTO of Tenable Network Security conducted by David Braue, CSO Australia.