IBM preps Watson to watch enterprise smartphones and IoT devices
IBM has rolled out its Watson cognitive capabilities to do battle with rival enterprise mobile device management (MDM) platforms.
IBM has rolled out its Watson cognitive capabilities to do battle with rival enterprise mobile device management (MDM) platforms.
Cisco has reported a serious flaw in its IOS software that could give hackers complete control over 300 vulnerable enterprise and industrial switches.
Microsoft wants hackers to focus on malicious attachments and macros.
IoT security gets a moment in the spotlight at Barcelona's Mobile World Congress.
Researchers from Georgia Tech have demonstrated that it is possible to ransom a water treatment plant by hacking its control systems.
The sabre-rattling over Russia’s hacking of the US election continued, with president-elect Trump conceding that Russia was probably responsible despite a report that left many questions unanswered.
David Braue | 17 Jan | Read more
The security industry’s predictions for 2017 have been flying thick and fast in the leadup to the Christmas break, but consistency between the key themes suggests that the safe money is on a rise in damaging distributed denial of service (DDoS) attacks and increasingly sophisticated human-targeted compromises.
David Braue | 23 Dec | Read more
A new Android scam is hacking Google accounts just to help apps get discovered in Google Play’s crowded marketplace of two million apps.
Tesco Bank in the UK has restored online transactions for over a 100,000 customers after last freezing services due to a mass fraud attack on the weekend.
It’s been a very big year for the federal government when it comes to cyber security. With the establishment of the Australian Cyber Security Centre and release of the government’s cybersecurity, Prime Minister Malcolm Turnbull has also appointed Alastair McGibbon as his advisor on all matters cyber.
Anthony Caruana | 02 Nov | Read more
Even as one-time Internet giant Yahoo is swallowed in a $6.5 billion acquisition, merger and acquisitions (M&A) experts have warned that due-diligence audits of companies targeted for acquisition often reveal cybersecurity risks that compromise compliance and could threaten the merger and acquisition activities.
David Braue | 01 Aug | Read more
Hackers love health apps because their popularity has outpaced the industry's ability to safeguard them. Technology experts discussed the privacy and security risks at a House hearing July 14 with the Energy and Commerce subcommittee.
Xuanyan Ouyang | 27 Jul | Read more
Putting a framework of IT policies that should be the foundation of every company's security plan.
George Grachis | 01 Jun | Read more
As the Manager for IT Security and Identity Services at Griffith University, Ashley Deuble has to manage a complex environment with a massive number of internal and external users.
Anthony Caruana | 25 May | Read more
Internal audits of company networks have shown one incident of insider data theft per 100 employees per month, according to the head of a security provider who believes the best protection from insider threats comes from having fewer restrictions on data access, not more.
David Braue | 02 Mar | Read more
Security vendors are showing new confidence against malware attackers as they launch new classes of products designed to take the fight back to malware authors that have recently been overwhelming many companies' traditional defences.
David Braue | 03 Nov | Read more
Cloud providers' requirement to demonstrate their security capabilities to existing and potential customers is driving key cloud services to undergo certification to an emerging global standard that will help Australian businesses meet legal requirements for protection of personally identifiable information (PII).
David Braue | 19 May | Read more
Most Australians value their privacy and consider it when sharing information online, but a scathing review of privacy compliance by the Office of the Australian Information Commissioner (OAIC) has been reinforced by survey results suggesting that most Australians feel there are still inadequate privacy controls in place.
David Braue | 07 May | Read more
It may have been over a year since a major overhaul of Australia's privacy laws pressured organisations to manage sensitive information better, but professional security service providers are still helping customers come to grips with the new laws.
David Braue | 29 Apr | Read more
The emerging model of the Internet of Things (IoT) is rapidly changing the way organisations think about IT security – but IoT's unique characteristics are also likely to send ripples through conventional security architectures by forcing a fundamental rethink about how corporate data is managed and protected.
David Braue | 27 Apr | Read more