Australians pessimistic that cybersecurity skills gap will be closed within a decade
But training providers, looking outside the industry for “a new breed of cybersecurity talent”, are doing their part to help
David Braue | 13 Dec | Read more
But training providers, looking outside the industry for “a new breed of cybersecurity talent”, are doing their part to help
David Braue | 13 Dec | Read more
Using Google Search, 404 error phishing login pages, MitM to co-opt legit logos
People skills as important in driving secure software culture as development skills, says Hannah McKelvie, manager of DevOps & Code Security at Telstra
David Braue | 11 Dec | Read more
In a climate of rising fraud, most consumers are still transacting online despite poor security habits
David Braue | 11 Dec | Read more
Just investing in tools isn’t enough to keep good staff engaged
David Braue | 11 Dec | Read more
To help you narrow down your options, here's our take on some of the more popular and well-known services, as well as some you may not have heard of. Use these as a springboard—again, there are plenty of other options out there—for your own research, and if you're not currently using a cloud backup service you may find reason to once you've seen what's on offer.
Ashton Mills | 30 Apr | Read more
When we tested next-generation firewalls last May, at least one important security vendor wasn't there: Cisco, because they weren't ready to be tested. Now that the ASA CX next-generation firewall has had a year to mature, we put the product through its paces, using the same methodology as our last NGFW test.
Joel Snyder | 17 Jun | Read more
LANDesk’s foray into system, asset and user management is the latest version of its Total User Management suite, which we’ll affectionately call TUM.
Ashton Mills | 29 May | Read more
In perhaps the most comprehensive roundup on the net, we take a look at cloud storage services for personal and business use from the perspective of the CIO: what they offer, what's important and what to look for.
Ashton Mills | 20 Jun | Read more
What is big, flexible, red and costs more than your average mid-range family sedan? Not a HSV—not quite that much—but this top of the range unified threat management (UTM) device (or in this case, XTM– the X presumably being a variable) is definitely in a high performance category. The XTM2050 from WatchGuard is one of a new breed of security devices that packs punch.
Quantum decryption means the data you encrypt today will be compromised within a decade.
As users what we want is to share more and have more privacy. It is through this prisoner dilemma that over this weekend Digi.me, ID Exchange and Alibaba Cloud joined forces to bring the power of personal data and private sharing to communities in regional NSW by delivering the digi.spark hackathon hosted at UTS as part of New South Wales Spark Festival.
Abigail Swabey | 28 Oct | Read more
We used 1 million records exposed as our floor in creating this list. Starting with a number that big says a lot about the state of data security.
Ryan Francis | 27 Mar | Read more
There are ways for privacy-obsessed users to leave as little a trace as possible when venturing into cyberspace.
Bob Violino | 27 Jan | Read more
It's the centenary of the commencement of World War One. Back then, there were borders to protect. The soldiers knew who they were fighting and there were very few incursions where one side crossed a border undetected. Today's battles are different. The bad guys are stealing the good guys’ passwords and identities to get access to whatever they want. And they often wait weeks or even months before revealing their true objectives.
Abigail Swabey | 22 Oct | Read more
There is a firmly held concern in security circles that the automation associated with DevOps moves too swiftly, that security teams and their tests can't keep up, that too many of the metrics measured focus on production, availability, and compliance checkboxes, and as a result, security falls to the wayside.
George V. Hulme | 01 May | Read more
This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach.
By Steve Martino, Vice President, Chief Information Security Officer, Cisco | 23 Apr | Read more
Experts say robots will be commonplace in 10 years. "Many respondents see advances in [artificial intelligence] and robotics pervading nearly every aspect of daily life by the year 2025--from distant manufacturing processes to the most mundane household activities," says Aaron Smith, senior researcher, The Pew Research Center's Internet Project, speaking of the several experts quoted in his "Predictions for the State of AI and Robotics in 2025".
David Geer | 24 Jan | Read more
Perhaps it was an omen of what was to come when the city of San Francisco on New Year's Eve 2010 couldn't get a backup system running in its Emergency Operations Center because no one knew the password.
Ellen Messmer | 02 Dec | Read more
'Tis the season to begin ramping up online shopping activity, and for retailers that means doing all they can to ensure their websites are up, highly available and able to handle peak capacity. Looming in many IT managers' minds is the cautionary tale of Target, whose website crashed twice after it was inundated by an unprecedented number of online shoppers when the retailer began selling clothing and accessories from high-end Italian fashion company Missoni.
Esther Shein | 29 Nov | Read more
The spooky season is still not over for Australian companies, as the destructive Emotet threat is back, and it is affecting unpatched systems.
James Ley, Ivanti | 09 Dec | Read more
Ensuring top-level enterprise security has never been more important for the financial services (FS) industry.
Monica Hovsepian, OpenText | 09 Dec | Read more
Tricking cyber-criminals into revealing their presence is becoming an increasingly popular way to safeguard systems and data from attack.
Modern terrorism and cyberwar are major threats to our society’s way of life.
Craig Ford | 30 Dec | Read more
As many of you would probably already know I work in the cybersecurity industry and this time of year we get hammered literally.
Craig Ford | 13 Dec | Read more