It’s a good time to be a hacker. Maybe.
It’s a good time to be a hacker. Maybe.
'A fool pulls the leaves. A brute chops the trunk. A sage digs the roots' - Author Pierce Brown
During a DDoS attack, time can be your biggest enemy. Lost seconds can have a huge impact on whether you are successful in mitigating an attack in time, or failure could mean costly network downtime. Anything that accelerates your Mean Time to Detect (MTTD) and Mean Time to Respond (MTTR) to an attack provides you with a clear advantage.
Historically, there’s little love lost between NetOps (network operations) personnel and those in SecOps (security operations).
As technology continues to advance, so does the threat of cybersecurity attacks. This will require a drastic shift in perception for Australian businesses: to prioritise prevention, rather than reaction, in order to combat the various complexities of cyber-attacks.
Last year saw a new wave of high-profile data breaches that reminded us that no industry is safe.
Today’s factories – be they relatively simple production facilities, or highly complex automation environments – face a dilemma that was unimaginable in earlier times.
In the year ahead, businesses of all sizes must prepare for the unknown so they have the flexibility to withstand unexpected and high impact security events.
Australian businesses have been tested massively this year in terms of cyber security, with an increasing number of high profile businesses in the spotlight for all the wrong reasons.
Today’s schools are technology-rich environments. They have long used internal systems to store personal data records of students and faculty but, today, that technology infrastructure must be optimised to accommodate the shift to a new digital education model.
While traditional archives systems no longer consist of numerous dusty boxes of paper records (hopefully), most have fallen woefully out of date.
Whenever you browse the internet, chances of any cyberattack or theft are likely. When a virus attacks you through your browser, your information, such as your passwords or your information could get stolen.
For many years, IT departments and their infrastructures were managed under a strict command-and-control structure. This situation is now rapidly changing, and CIOs need to change with it.
Cybersecurity – and consequently cyber insurance – is something that not many SMEs (small to medium-sized enterprises) spend time thinking about.
One of the major aspects of ITAM (IT Asset Management) is SAM (Software Asset Management). SAM has seen a huge increase in interest and demand in its services recently.
With business becoming increasingly digital, the deployment of solid IT security has never been more important. Breaches can cause anything from mild inconvenience to widespread disruption and financial lo
The frequency of financial crime and the diversity of attack techniques are increasing, forcing enterprises into difficult investment decisions to contain risks and comply with regulations.
Is Australia becoming its own worst enemy when it comes to addressing cybersecurity?
Australian companies more prone to long business interruptions due to ransomware
Companies spend a lot of time and energy ensuring their IT systems are secured against external cyber attacks. Unfortunately, many don’t realise they also need to consider threats that originate from within.
Why nation-state attacks are everyone’s problem
Hear from Invictus Games Sydney 2019 CEO, Patrick Kidd OBE and Head of Technology, @James-d-smith -share their insights on how they partnered with Unisys to protect critical data over an open, public WiFi solution.
With so much change all the time, how can executives best prepare their businesses to meet the security challenges of the coming years? CSO Australia, in conjunction with Mimecast, explored this question in an interactive Webinar that looks at how the threat landscape has evolved – and what we can expect in 2019 and beyond.
An interview with CSO's David Braue and Ian Yip, Chief Technology Officer, McAffee.
According to new research conducted by the Ponemon Institute, Australia and New Zealand have the highest levels of data breaches out of the nine countries investigated. This was linked to heavy investment in security detection and an under-investment in security and vulnerability response capabilities