Cybercriminals today create and use botnets to perpetrate their criminal activities. Whether it is to send out Blackhole Exploit Kit spam or to use as entry points into organizations, the one constant is that most bots (victim computers) communicate back and forth with command and control (C&C) servers. Trend Micro’s Global Threat Intelligence, derived from [...]Read the full article
CSO hosts a breakfast event on cloud security for CSOs and ITS Managers featuring Raimund Genes, CTO, Trend Micro, Raimund Choo, Fulbright Scholar and Inventor, as well as industry moderated roundtables (Commissioner for Privacy and Data, Rob Livingstone Advisory, Serco, GWA Group, and RMSec).
Quality of Security - Defense in Depth
Next level Enterprise Security
Cyber Security interview with Richard Archdeacon, Head of Security Strategy at HP Enterprise Security Services conducted by David Braue, CSO Australia
Our key industry moderators from each roundtable discussion will come to stage to discuss each table's challenges, considerations and key takeaways in a panel format including Q&A with the audience.