This research paper intends to provide a brief summary of the cybercriminal underground and shed light on the basic types of hacker activity in Russia. It discusses fundamental concepts that Russian hackers follow and the information they share with their peers. It also examines prices charged for various types of services, along with how prevalent the given services are in advertisements. The primary features of each type of activity and examples of associated service offerings are discussed as well. Read this paper.
Internal and external disruptions can impede business continuity and result in negative repercussions for enterprise productivity and data resources. This whitepaper looks at how improved mobility access can shield companies from unprecedented risks, resulting in greater cost savings and enhanced workforce continuity. It also highlights the benefits of having a mobile workspace technology which enables the workforce to have access to apps, desktops and files in difficult situations. Included are also four case studies where organisations are able to demonstrate a high level of business continuity with sound disaster recovery strategies in place. Download whitepaper »
Enterprise mobility has provided people the flexibility to work remotely at any time resulting in increased business productivity. However it has also brought about IT complications such as inconstant user experience across multiple platforms and potential breach of data security. With BYOD a common practice in organisations today, this whitepaper looks at the crucial components required for a complete mobile workspace solution that present secure access to apps, data and functions from any device. Download whitepaper »
Remote, external users accessing your network from third-party organisations introduce a risk that can be mitigated. This whitepaper looks at how organisations can minimise the risk of unauthorised users exploiting accounts by implementing a control strategy that still enables businesses to partner effectively with outside parties while maintaining the same security standards across the entire organisation. Download whitepaper »
An interview with Ron Gula, CEO and CTO of Tenable Network Security conducted by David Braue, CSO Australia.
Computerworld Exchange talks to David Siroky, Director Dell Enterprise Solution & Alliances Team about the next generation Data Centre
CSO interviews CSO moderators on key takeaways from the CSO CXO Series event sponsored by Trend Micro in Melbourne 31st July 2015. Interview conducted by David Braue, CSO Moderator
CSO hosts a lunch event on measuring the effectiveness of security for CSOs and ITS Managers featuring Ron Gula, CEO and CTO of Tenable Network Security, as well as industry moderated roundtables (Officeworks, Ernst & Young, David Kennedy, NBN and United Energy & MultiNet Gas).
Effective collaboration and mobility to help employees tap into entirely new ways of working.