How to set up a threat hunting program
Instead of sitting back passively and waiting for cyber attackers to set off alarms, organisations should be pursuing them like a cheetah hunting for its next meal.
Carbon Black | 02 May | Read more
Instead of sitting back passively and waiting for cyber attackers to set off alarms, organisations should be pursuing them like a cheetah hunting for its next meal.
Carbon Black | 02 May | Read more
Information security professionals used to put all of their chips towards incident prevention.
Carbon Black | 27 Apr | Read more
Without consultation or warning, the Australian Government has decided to abolish the speciality skilled migration 457 visa system.
Andrew van der Stock | 27 Apr | Read more
Recent high-profile data breaches of internal IT systems at major international firms are causing clients to increase the scrutiny of their outside counsels’ cybersecurity efforts.
Alvin Tedjamulia | 26 Apr | Read more
In 2017, machine learning (or full AI) is in, and signature-based AV solutions are on their way out – at least in part.
David Higgins | 20 Apr | Read more
Former CIA operative Eric O’Neill is a thought leader on a wide range of issues, including counter terrorism and national security matters.
David Frost | 04 Apr | Read more
Today, the benefits of cloud computing are very well established: it is less costly and provides increased flexibility and agility, including the ability to support on-demand computing at scale.
Chris Smith | 28 Mar | Read more
The increasing digitisation of business coupled with recent high-profile cyber attacks has propelled IT security professionals from the back room to the boardroom.
Matt Brigham | 27 Mar | Read more
In 2017, cyberattackers will continue to exploit and severely damage Australian businesses by targeting their people, brands, and customers.
Tim Bentley | 27 Mar | Read more
Globally, more and more jurisdictions are releasing mandates that will have a substantial impact on companies regarding breach notification and the protection of sensitive data.
Christopher Strand | 13 Mar | Read more
2016 was a year that will inevitably represent a defining moment in cyber security, particularly in relation to distributed denial of service (DDoS) attacks.
Robin Schmitt | 21 Feb | Read more
As enterprise IT infrastructures become increasingly complex, reducing mean-time-to-detect and mean-time-to-respond metrics have become top priorities for every security team.
Simon Howe | 21 Feb | Read more
As Artificial Intelligence (AI) becomes increasingly commoditised, cyber attackers will take advantage of AI in a similar way as businesses.
Jeffrey Kok | 21 Feb | Read more
It’s safe to say that 2016 was the year of ransomware. More specifically, the year of crypto-ransomware, that nefarious variant that encrypts files and holds them captive until a ransom is paid.
Corey Nachreiner | 31 Jan | Read more
The jury has not yet been assembled to assess the fallout from the 2016 US Presidential email hacking scandal but the implications have certainly sent shock waves rippling throughout the world. Certainly the notion that anything is possible rings true.
Tim Fisher | 26 Jan | Read more
Latest statistics show that more than 28 billion people will be connected to the Internet of Things in 2017, rising to 34 billion-plus next year.
Kane Lightowler | 25 Jan | Read more
Have you already seen the latest Oracle’s Critical Patch Update and are you overwhelmed with the numerous fixes? This is hardly surprising.
Alexander Polyakov | 25 Jan | Read more
It's a security problem that's existed for more than 10 years, yet ransomware is continuing to grow exponentially and cause disruption and losses for businesses around the world.
Shane Muller | 24 Jan | Read more
What will 2017 bring for your organisation? Unfortunately, there’s a strong likelihood that it will bring a costly cyberattack.
Nathan Shuchami | 24 Jan | Read more
Reflecting on the recent media talk about hacking and Russia, my family had lots of questions. It struck me that attribution in the real world is easy for most people to understand, but in the cyber world it becomes much harder.
Rick McElroy | 10 Jan | Read more