CSO Trend Micro Workshop
30 Aug | View galleries
Distributed denial of service (DDoS) specialists can shut down an attack in 90 seconds once it’s detected – but if you take more than 3 hours to respond you’re likely to be compromised by a related attack in the meantime, warns a security expert who is seeing easy-to-source DDoS attacks becoming smokescreens for brazen data theft.
Ransomware that targets specific businesses and spreads itself using worm-like techniques were game changers this year as ransomware authors shifted focus to the business community in attacks that now cost an average ransom of $US544 ($A684) per endpoint, new research has warned.
In a new type of DDoS attack, skilled bad actors use pulse wave DDoS assaults to exploit weaknesses in appliance-first hybrid mitigation solutions and pin down multiple targets.
A disgruntled former employee, used off-the-shelf tools to destroy files and cause mayhem for Navarro Security
Hackers once again use legit Apple Developer ID to sign malware for Mac computers.
This paper looks at the basics of DNS services, how they can be compromised, how to secure them more effectively and how an organization can actually use them as an asset to improve its security posture.
Increasing use of encryption has created new challenges for enterprise security managers. Ever more-sophisticated encryption such as Perfect Forward Secrecy (PFS) protects data and may even boost your Google ranking – but it also provides a haven for malicious code that may use encryption to bypass enterprise security controls.
Why nation-state attacks are everyone’s problem
With so much change all the time, how can executives best prepare their businesses to meet the security challenges of the coming years? CSO Australia, in conjunction with Mimecast, explored this question in an interactive Webinar that looks at how the threat landscape has evolved – and what we can expect in 2019 and beyond.
An interview with CSO's David Braue and Ian Yip, Chief Technology Officer, McAffee.
According to new research conducted by the Ponemon Institute, Australia and New Zealand have the highest levels of data breaches out of the nine countries investigated. This was linked to heavy investment in security detection and an under-investment in security and vulnerability response capabilities