This research report explores the importance of security strategy and Cyber Threat Intelligence. The purpose of the study is to understand how companies are using, gathering and analyzing threat intelligence as part of their IT security strategy.
Some of the topics covered are:
Whether timely, accurate and actionable cyber threat intelligence make a difference in blocking or preventing external attacks.
Are companies using cyber threat intelligence effectively to make informed decisions about how to respond to a menace or hazard
According to research from the F5 Labs threat intelligence team, 80% of page loads on millions of sites sampled are encrypted. Transport Layer Security (TLS) adoption has become the norm for organizations of all sizes and in all industries due to several driving factors: the EU General Data Protection Regulation (GDPR), Google search results ranking preferences, browser warnings for HTTP (cleartext) sites, and the growing importance of privacy, to name just a few. While this evolution improves security for web traffic, it comes at a price—increased workload demand and the potential hazards of malware cloaked in encrypted traffic. Find out how to defend against what you cant see. Download whitepaper »
According to research by F5 Labs, more than 81% of all web page loads are now encrypted with SSL/TLS, which means that we are moving very quickly toward an Internet where nearly every piece of data in transit will be encrypted. However, the rise of SSL/TLS isn’t all good news. Attackers are increasingly hiding insidious attacks within encrypted traffic—which means that the security protocol itself has become a threat vector. Regaining visibility into that encrypted traffic is one of the most important steps you can take to protect your apps, your data, and your business Find out how today. Download whitepaper »
This fact sheet delivers you a succinct set of pointers into how the business nbn Operations centre will improve the nbn experience for your business Download whitepaper »
Why nation-state attacks are everyone’s problem
Hear from Invictus Games Sydney 2019 CEO, Patrick Kidd OBE and Head of Technology, @James-d-smith -share their insights on how they partnered with Unisys to protect critical data over an open, public WiFi solution.
With so much change all the time, how can executives best prepare their businesses to meet the security challenges of the coming years? CSO Australia, in conjunction with Mimecast, explored this question in an interactive Webinar that looks at how the threat landscape has evolved – and what we can expect in 2019 and beyond.
An interview with CSO's David Braue and Ian Yip, Chief Technology Officer, McAffee.
According to new research conducted by the Ponemon Institute, Australia and New Zealand have the highest levels of data breaches out of the nine countries investigated. This was linked to heavy investment in security detection and an under-investment in security and vulnerability response capabilities