Auscert 2012: Day 2 Roundup - Roll your sleeves up its Gala Day
Today's sessions through the eyes of IT Security journos Richard Chirgwin and Hamish Barwick at Auscert 2012.
Today's sessions through the eyes of IT Security journos Richard Chirgwin and Hamish Barwick at Auscert 2012.
The doors are open and the crowd drives in...sessions planned and raring to go AusCERT 2012 commences
Evolve.Cloud event hosted by Trend Micro including thought leaders from , VMware, Cloud Security Alliance, Government Leaders and Cloud Independent Rob Livingstone at The Sheraton on the Park.
Offshore storage of our personal data, and our ability to retain control over it have been marked as concerns for Australians using cloud services, according to a poll commissioned by the industry coalition OzHub.
Offshore storage of our personal data and our ability to retain control over it have been marked as concerns for Australians using cloud services, according to a poll commissioned by the industry coalition OzHub.
Social engineering attacks security at its weakest link: People. Preying on employees' best intentions, social engineers gain unauthorized access to systems and information.
A report in the Daily Yomiuri suggests that the Japanese government have commissioned Fujitsu Ltd to create a “defensive virus” and that after 3 years of work and a budget of $2.3 million, the project is nearing completion.
What happens when anyone can develop and publish an application to the Android Market?
What happens when anyone can develop and publish an application to the Android Market?
Juniper Network's Tim Nagy speaks to CSO Australia.
Preparing to really push the virtualization envelope? Check! Readying an aggressive cloud strategy? Check! Gearing up to embrace mobility and consumerization of IT? Check! Having a datacenter network capable of securely supporting all this? Maybe not.
More budget? Perhaps a little. More attention from senior management? Yes, a bit. Better results? That's not so clear.
Some things are meant to go together. Coffee and laptops isn’t one of them. Spilling a drink on a keyboard is just one of many ways people lose vital business data. Other hazards include hardware and software failure, viruses, accidentally deleting a file, fire and theft. Yet more than one in three Australian businesses (36%) do not have an offsite backup strategy to protect their data, according to a survey* by backup specialist Acronis.
The rise in cyber attacks continue to increase in frequency and sophistication. Attacking the source of the cyber attacks is illegal, but in instances where the source is known and there is no collateral damage it may be occurring under the guise of active-defence.
Veteran Mincom head Greg Clark will take charge of specialist networking security and optimisation firm Blue Coat Systems.