Over 104,000 systems vulnerable to ‘WannaCry for Linux’ bug.
Over 104,000 systems vulnerable to ‘WannaCry for Linux’ bug.
Fraudsters quickly jump on the WannaCry hype to spread adware and scare victims into paying.
Exuberance over Internet of Things (IoT) technologies has led many businesses to ignore security in rollouts that are overly complex and poorly planned, an IoT specialist has warned as newly released figures hint at the true scope of the burgeoning IoT security threat.
Qualcomm-owned NXP and fellow European chipmakers support new regulations to enforce IoT cybersecurity standards.
Companies that have been hit by WannaCry may be cursing their bad luck – but the attack could have been much worse had hackers bundled the exploit with malicious malware or other attacks, an ex-military cybersecurity responder has warned amidst industry warnings that the threat from the exploit is far from over.
To help you narrow down your options, here's our take on some of the more popular and well-known services, as well as some you may not have heard of. Use these as a springboard—again, there are plenty of other options out there—for your own research, and if you're not currently using a cloud backup service you may find reason to once you've seen what's on offer.
When we tested next-generation firewalls last May, at least one important security vendor wasn't there: Cisco, because they weren't ready to be tested. Now that the ASA CX next-generation firewall has had a year to mature, we put the product through its paces, using the same methodology as our last NGFW test.
LANDesk’s foray into system, asset and user management is the latest version of its Total User Management suite, which we’ll affectionately call TUM.
In perhaps the most comprehensive roundup on the net, we take a look at cloud storage services for personal and business use from the perspective of the CIO: what they offer, what's important and what to look for.
What is big, flexible, red and costs more than your average mid-range family sedan? Not a HSV—not quite that much—but this top of the range unified threat management (UTM) device (or in this case, XTM– the X presumably being a variable) is definitely in a high performance category. The XTM2050 from WatchGuard is one of a new breed of security devices that packs punch.
We used 1 million records exposed as our floor in creating this list. Starting with a number that big says a lot about the state of data security.
There are ways for privacy-obsessed users to leave as little a trace as possible when venturing into cyberspace.
It's the centenary of the commencement of World War One. Back then, there were borders to protect. The soldiers knew who they were fighting and there were very few incursions where one side crossed a border undetected. Today's battles are different. The bad guys are stealing the good guys’ passwords and identities to get access to whatever they want. And they often wait weeks or even months before revealing their true objectives.
CSO & Enex Testlab join forces to deliver a first class IT Security event in Sydney's Four Seasons Hotel.
CSC opened the doors to its new security operations centre (SOC) in Macquarie Park, Sydney this week. The SOC is one of five that the vendor operates globally as part of a 24/7 strategy to identify cyber threats in real time.
There is a firmly held concern in security circles that the automation associated with DevOps moves too swiftly, that security teams and their tests can't keep up, that too many of the metrics measured focus on production, availability, and compliance checkboxes, and as a result, security falls to the wayside.
<em>This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach.</em>
Experts say robots will be commonplace in 10 years. "Many respondents see advances in [artificial intelligence] and robotics pervading nearly every aspect of daily life by the year 2025--from distant manufacturing processes to the most mundane household activities," says Aaron Smith, senior researcher, The Pew Research Center's Internet Project, speaking of the several experts quoted in his "Predictions for the State of AI and Robotics in 2025".
Perhaps it was an omen of what was to come when the city of San Francisco on New Year's Eve 2010 couldn't get a backup system running in its Emergency Operations Center because no one knew the password.
'Tis the season to begin ramping up online shopping activity, and for retailers that means doing all they can to ensure their websites are up, highly available and able to handle peak capacity. Looming in many IT managers' minds is the cautionary tale of Target, whose website crashed twice after it was inundated by an unprecedented number of online shoppers when the retailer began selling clothing and accessories from high-end Italian fashion company Missoni.
Having a security system at home isn’t a complete guarantee that your property will stay safe. Aside from burglars, there are also hackers that can compromise your home’s safety. Although these hackers may not be able to do serious physical harm, they can compromise your finances, personal data and even your identity.
Those who run IT departments have what I like to call ‘the burden of knowledge’. They know what can go wrong and how wrong it can go, so they also know how important it is to put the right safeguards in place to prevent that from happening.
Businesses with compliance regulations, data privacy laws and security mandates often admit that these responsibilities can add considerable cycles to their business-as-usual functions
Those working within the tech, financial services and telecommunications industries (among others) know all too well the reality of cyber security threats.
Virtual private networks are a ubiquitous tool in the business world, yet most organisations have no clear idea of their associated costs
CSO Perspectives Roadshow Interview - Silas Barnes, Group Chief Information Security Officer, Virgin Australia Group
CSO Perspectives Roadshow 2017 Showreel
CSO Perspectives Roadshow Interview - Jeff Lanza, Retired FBI Agent (USA)
CSO Perspectives Roadshow Interview - Mark Loveless "Simple Nomad" Senior Security Researcher at Duo Security
Panel Session sponsored by VMware, Application Security: Does moving your applications to the Cloud mean reduced risk or just relocated risk?