Besides form factor, virtual systems are not really that different than physical systems. They both use the same operating systems and applications. They both present users with computing resources such as RAM and hard drives. Consequently, the ability to exploit vulnerabilities in a physical environment will present a significant threat to virtualised environments as well. This paper examines the different endpoint security methods for virtualised environments and presents how Endpoint Protection security provides optimal performance, protection and manageability.
Keeping your company secure is as much about detecting and responding to attacks as they occur as it is about preventing attacks before they happen. Given the proliferation and sophistication of malicious entities, organizations must assume that they will be infiltrated and have an effective detection and response strategy. In this report Forrester Consulting evaluates how the capabilities of SIEM and security analytics solutions stack up against the current threat landscape. Download whitepaper »
Cybercriminals are adapting to a changing world. And while that’s obvious to the everyone working in security, ESETs Chief Research Officer Juraj Malcho wonders whether we are doing enough to adapt to a rapidly changing threat landscape. Download whitepaper »
Organised criminals are using new tactics to put a new face on old crimes, and with overwhelming success. Better analysis of network data is emerging as a powerful defence helping Australian companies to harness the power of analytics to detect breaches early and minimize their exposure. Download whitepaper »
Our key industry moderators from each roundtable discussion will come to stage to discuss each table's challenges, considerations and key takeaways in a panel format including Q&A with the audience.
Computerworld Exchange talks to David Siroky, Director Dell Enterprise Solution & Alliances Team about the next generation Data Centre
Cyber Security interview with Richard Archdeacon, Head of Security Strategy at HP Enterprise Security Services conducted by David Braue, CSO Australia
CSO interviews CSO moderators on key takeaways from the CSO CXO Series event sponsored by Trend Micro in Melbourne 31st July 2015. Interview conducted by David Braue, CSO Moderator.
CSO hosts a breakfast event on cloud security for CSOs and ITS Managers featuring Raimund Genes, CTO, Trend Micro, Raimund Choo, Fulbright Scholar and Inventor, as well as industry moderated roundtables (Commissioner for Privacy and Data, Rob Livingstone Advisory, Serco, GWA Group, and RMSec).