This research paper intends to provide a brief summary of the cybercriminal underground and shed light on the basic types of hacker activity in Russia. It discusses fundamental concepts that Russian hackers follow and the information they share with their peers. It also examines prices charged for various types of services, along with how prevalent the given services are in advertisements. The primary features of each type of activity and examples of associated service offerings are discussed as well. Read this paper.
IT organizations and service providers are investing heavily into building open source clouds powered by OpenStack and KVM hypervisor, primarily to reduce licensing costs and to avoid vendor lock-in. Download whitepaper »
Across the globe, many companies choose a Cisco networking infrastructure to service their physical and virtual networking needs for enterprise and data center operations. When implementing a large-scale Cisco network, monitoring tools typically rely upon Cisco technologies such as NetFlow, SPAN, RSPAN, ERSPAN, and VACL for traffic visibility. Traffic is extracted and sent to the tools. However, these technologies are often difficult to scale and can modify traffic (e.g. encapsulate traffic) making it difficult to support the diverse monitoring needs of network, security, application, and server groups as they strive to maintain maximized uptime, secure the network, realize operational efficiencies, and gain greater insight into business decision making. Download whitepaper »
IT organizations today face unprecedented challenges. Internal business customers continue to demand rapid delivery of innovative services to respond to outside threats and opportunities. At the same time, it is not unusual for organizations to issue broad mandates to cut back on spending budgets. In these tough times, the adoption of disruptive technologies holds the key to improving efficiency and truly accomplishing more with less. Download whitepaper »
CSO hosts a breakfast event on cloud security for CSOs and ITS Managers featuring Raimund Genes, CTO, Trend Micro, Raimund Choo, Fulbright Scholar and Inventor, as well as industry moderated roundtables (Commissioner for Privacy and Data, Rob Livingstone Advisory, Serco, GWA Group, and RMSec).
Cyber Security interview with Richard Archdeacon, Head of Security Strategy at HP Enterprise Security Services conducted by David Braue, CSO Australia
An interview with Ron Gula, CEO and CTO of Tenable Network Security conducted by David Braue, CSO Australia.
Measuring the effectiveness of Security.
Quality of Security - Defense in Depth