The Context of Security: The difference between the dangerous and benign
Trend Micro’s outspoken VP of Security Research Rik Ferguson talks to CSO Australia.
Trend Micro’s outspoken VP of Security Research Rik Ferguson talks to CSO Australia.
The headlines may be filled with cyber-attacks and government-level efforts to boost IT security, but for the average CIO, 2013’s security challenges revolve around the myriad threats posed by ever more powerful business agendas. The explosion in demand for bring-your-own-device (BYOD) policies and the maturation of cloud computing, in particular, are escalating IT security to the highest levels of the executive.
CSO Trend Micro Workshop
Miami Children’s Hospital uses information technology to streamline operations, give real-time access to critical patient data and save more children’s lives.
Medellín, Colombia, uses virtualization software to bring education to the farthest reaches of its community, streamline costs and reduce energy consumption.
Headlines may tend to highlight the climate of fear around the ever-present threat from hackers – but are you aware that the biggest threat to your company’s information security might actually come from your own employees?
The rise of bring your own device (BYOD) policies has forced CSOs and IT executives to reconsider long-held notions about control over user devices and their access to information resources based on their identities. CSO spoke with Alan Abraham, Australia and New Zealand country manager at LANDesk, who believes an integrated user management environment offers the best way to manage the explosion of devices in today’s enterprise – and tomorrow’s.
Although web application attacks have existed for over the last 10 years, simple coding errors, failed input validation and output sanitization continue to exist in web applications that have led to disclosures for many well-known companies. The most prevalent web application attacks are SQL Injection, Cross Site Scripting and OS Command Injection. With an increased number of companies conducting buisness over the Internet, many attackers are taking advantage of lax security and poor coding techniques to exploit web applications for fame, notoriety and financial gain.
41 percent of small businesses have been the victim of cybercrime, costing each small businesses £3942 ($AU6064), says the UK Federation of Small Businesses (FSB) in a survey released yesterday.
Although web application attacks have existed for over the last 10 years, simple coding errors, failed input validation and output sanitization continue to exist in web applications that have led to disclosures for many well-known companies. The most prevalent web application attacks are SQL Injection, Cross Site Scripting and OS Command Injection. With an increased number of companies conducting buisness over the Internet, many attackers are taking advantage of lax security and poor coding techniques to exploit web applications for fame, notoriety and financial gain.
Australian Information Security Association (AISA) has today, on the first day of National Cyber Security Awareness Week, taken the opportunity to flag research from its members, releasing an advisory note to the community at large.
What a time to be in the IT industry - right now technology is changing almost every aspect of our lives, and as IT professional we have front row tickets! The decisions we make today will be felt for years to come by the organisations we work for, their owners, their customers, and their partners. (Sanjay Mehta)
An online survey of IT managers polled more than 2000 companies, each with 500 or more employees, in several countries—Australia, Canada, the United States, Germany, UK, France, Brazil, and India. 225 firms were surveyed in Australia.
New threat research released by Trend Micro gives empirical evidence that an aggressive breed of phishing attacks is well underway.
Aside from the hard lesson learned that failure to plan and prepare will most certainly lead to disaster, there are some important lessons on governing and best practice implementation security professionals need to take from the Click Frenzy event, according to cloud computing and security experts.