Network-security tools have long focused on identifying compromises that they recognise from past encounters, but what do you do about the attacks that you’ve never seen before – or even thought to look for?
David Braue |
02 Jun |
Read more
No matter how much an organisation spends on technical defences against threats to information security, it can be undone by one employee making a careless decision. So why aren’t organisations focussing more effort on securing humans?
Liam Tung |
01 Jun |
Read more
Microsoft is suing the US Department of Justice, claiming it is unconstitutional to use secrecy orders that prevent it from telling customers when the government accesses their data.
Liam Tung |
15 Apr |
Read more
Australian online-classified site Gumtree was hacked and used to spread malware via online display ads, while a large US healthcare provider was shut down after a malware infection and only partially recovered days later.
David Braue |
04 Apr |
Read more
Many companies looking to secure their endpoints are struggling with “very confusing” messaging that complicates the process of extending policy-based security to those endpoints, a security strategist has warned on the eve of the release of an endpoint-security tool designed to better integrate endpoint controls with privileged-account management policies.
David Braue |
03 Feb |
Read more
Security practitioners can now demonstrate their security breach remediation skills in a hands-on, online test laboratory established by security peak body ISACA as it expands its security training and certification programs to help deal with what board member and past international president Rob Stroud calls a “huge shortfall” in security skills.
David Braue |
17 Aug |
Read more
Australians are much more likely than their regional counterparts to accept the monitoring of social media for terrorist activity but Malaysians are far more likely to accept social-media monitoring for targeted advertising, a survey of attitudes has found.
David Braue |
14 Jul |
Read more
A focus on securing Wi-Fi networks and the Internet of Things (IoT) will join a growing rogue's gallery of targeted threats as security vendor Avast Security exploits online and mobile channels to boost its penetration in the Australian market, the company's CEO has said.
David Braue |
09 Jun |
Read more
Data retention laws and governments that are seemingly fixated on the idea that all communications need to be controlled have made the job of journalists more challenging than ever before.
Anthony Caruana |
09 Jun |
Read more
Recent equipment refreshes have not prevented Australia’s network infrastructure from being vulnerable to failure and security breaches, a new study has warned.
Andrew Colley |
03 Jun |
Read more
Call it CSO's regret: four out of five companies that have suffered an IT security breach wish they had done more to prevent it and just 1 in 3 believe they have a strong enough security defence, according to new research.
David Braue |
18 May |
Read more
Rapid escalation in the sophistication of CryptoLocker and other ransomware – particularly in Australia – will rapidly clear out a field of contenders as security tools vendors push hard to find new ways of protecting against the malicious software, a security executive of one endpoint security vendor has predicted.
David Braue |
14 May |
Read more
Australian government departments have until September to outline how they will comply with all 36 of the security controls outlined in the Protective Security Policy Framework (PSPF) and Information Security Manual (ISM) under the prescriptive first deliverable from the fledgling Digital Transformation Office (DTO).
David Braue |
09 Apr |
Read more
Google and others have called for all websites encrypt traffic to and from browsers, but the task for publishers is a tricky one, largely because of online advertising.
Liam Tung |
26 Mar |
Read more
Co-founder of the now-defunct Distribute.IT, Carl Woerndle, gives a warts and all account of the cyber attack so damaging it destroyed his once prospering technology business.
Byron Connolly and Bonnie Gardiner |
03 Mar |
Read more
Systems developers need to stop blaming users for security shortcomings and focus on improving security by rebuilding their systems in a more secure and user-friendly manner, a security expert has argued.
David Braue |
06 Mar |
Read more
Proactive efforts to stop the rate of financially-targeted Trojans saw a 53 percent decline in infection rates during 2014 but ever-smarter malware is learning to evade new security measures, Symantec has warned after an analysis that found Australia suffered over 114,000 financial phishing attacks last year.
David Braue |
05 Mar |
Read more
Johnson & Johnson champion the people and culture element of its security strategy, believing a more rigorous focus on people and culture acknowledges that having the latest technology and processes is not a foolproof solution to information security.
Bonnie Gardiner |
26 Feb |
Read more
Australia has the lowest rate of mobile malware infection in the world but 5 percent of Australian mobiles are still falling prey to mobile nasties, a McAfee Labs analysis has revealed.
David Braue |
26 Feb |
Read more
Microsoft has gained third-party verification that its core cloud services adhere to a new international standard for handling private information in public clouds.
Liam Tung |
17 Feb |
Read more