FBI warns consumers over the Chinese embassy scam.
FBI warns consumers over the Chinese embassy scam.
Organisations are leaving themselves exposed by failing to demand adequate security protections when buying new technology, according to a senior Cisco executive who warned that security and networking specialists must work together better to close persistent gaps.
Businesses wanting to improve their security practice need to reconsider the way they position cybersecurity within their business philosophy, a security analyst has told an audience of security practitioners while warning that the persistence of “terrifying” images of cybersecurity practitioners had challenged the progression of cybersecurity into becoming a mainstream business concern.
While spending on cybersecurity expertise would seem to be a no-brainer, the large number of companies without formal inhouse expertise suggests another ongoing, underlying challenge in finding and securing those skills within the current competitive market.
Email fraudsters cost a woman her job and her employer a ton of money.
In order to improve productivity and minimise risk, most organisations need a reliable method of protecting their employees from unwanted email (spam) and malicious software (malware). In addition, it is also necessary to protect the corporate network by restricting access to inappropriate content.
And, because of the magic of time differences and the international date line Australia was the first IDG Security Day event running. As it's the sumer solstice in the Northern hemisphere, it's also the longest day so it makes sense to fill it with as much infosec goodness as we possibly can.
It's the centenary of the commencement of World War One. Back then, there were borders to protect. The soldiers knew who they were fighting and there were very few incursions where one side crossed a border undetected. Today's battles are different. The bad guys are stealing the good guys’ passwords and identities to get access to whatever they want. And they often wait weeks or even months before revealing their true objectives.
CSO & Enex Testlab join forces to deliver a first class IT Security event in Sydney's Four Seasons Hotel.
What are the essential ingredients for making a security awareness program successful? Check out these 9 tips from CSO contributors on how to make awareness work in your organization.
After jumping through countless hoops to get the required set of security clearances and approval by the US Embassy to photograph the President’s visit CSO can see why these steps were justified. Our photojournalist Neerav Bhatt was less than 5 metres away from the world’s most heavily secured individual - the President of the United States of America, Barack Obama.
AGL is transitioning its business, focusing on how it can deliver reliable, affordable energy to its customers and decarbonise its generation portfolio over time, and the digital agenda.
I look for passion more than anything else.
Michael Sutton is the CISO of ZScaler. He has forged a long career working in information security and has seen many changes over the years. We spoke to him at AusCERT 2016 about his career, the changing role of the CISO and what he’s seeing in the world of infosec.
One of the great things about working for an organisation like Ramsay Health Care, is our brand promise; ‘people caring about people’ is something we live and breathe. Caring about our patients and staff means doing the right thing and protecting their privacy, be it in the clinical context or that of the digital world.
"There is little or no consideration of the underlying motivations and failures of the reported threat, which would enable them to make a more informed decision regarding their organisational risk and the value of mitigating the threats."
Cybersecurity and ICT security talent is a highly sought-after commodity in today’s market, in Australia this seems to be driving up the cost for companies to actually obtain security talent.
While traditional archives systems no longer consist of numerous dusty boxes of paper records (hopefully), most have fallen woefully out of date.
Even the most sophisticated information security programs can prove vulnerable to online and digital threats if employees aren’t engaged.
Amazon Web Services (AWS), once used as a ‘testing playground’ for proof of concept has evolved in the last five years to a complex arena of possibilities. The conversation has changed from ‘how can I put my website on Amazon in a secure way?’ to ‘how can I move multiple things to the cloud but still make sure it’s secure?’.
Most high-profile attacks on corporate data centres and institutional networks have originated outside of the victimised organisations – in many cases from halfway around the world.
If your last access-control update was even a few years ago, you’re probably more exposed to fraud and exploitation than you’d like to be.
It’s not hard to understand why bot management is critical to maintaining business availability and customer satisfaction – but do you know how to properly deal with bots?
Increasing use of encryption has created new challenges for enterprise security managers. Ever more-sophisticated encryption such as Perfect Forward Secrecy (PFS) protects data and may even boost your Google ranking – but it also provides a haven for malicious code that may use encryption to bypass enterprise security controls.
Why nation-state attacks are everyone’s problem
With so much change all the time, how can executives best prepare their businesses to meet the security challenges of the coming years? CSO Australia, in conjunction with Mimecast, explored this question in an interactive Webinar that looks at how the threat landscape has evolved – and what we can expect in 2019 and beyond.