The inaugural Women in Security Conference & Awards provided a much-needed opportunity to “honour the women and young women who are kicking goals in what has traditionally been a really male-dominated industry,” Victorian member of the Victorian Legislative Council for the Eastern Victoria Region Jane Garrett said in opening the award proceedings this week.
David Braue |
06 Sep |
Read more
A series of dynamic technical talks at the inaugural CSO Australia-AWSN Women in Security conference highlighted the innovative perspectives and problem-solving nous that women bring to cybersecurity roles.
David Braue |
04 Sep |
Read more
Co-sponsored by CSO Australia and the Australian Women in Security Network (AWSN), the conference brought together more than 150 women and men for a day of sharing, learning, networking, and empowerment.
David Brake |
04 Sep |
Read more
FBI warns consumers over the Chinese embassy scam.
Liam Tung |
29 Mar |
Read more
Organisations are leaving themselves exposed by failing to demand adequate security protections when buying new technology, according to a senior Cisco executive who warned that security and networking specialists must work together better to close persistent gaps.
David Braue |
05 Mar |
Read more
While spending on cybersecurity expertise would seem to be a no-brainer, the large number of companies without formal inhouse expertise suggests another ongoing, underlying challenge in finding and securing those skills within the current competitive market.
By CSO staff |
22 Feb |
Read more
Email fraudsters cost a woman her job and her employer a ton of money.
Liam Tung |
13 Feb |
Read more
A buried government review found that users are deeply unsatisfied with the outcomes of complaints lodged with the Australian Cybercrime Online Reporting Network (ACORN), as an academic shared with the audience at the recent AISA Australian Cyber Conference.
David Braue |
22 Oct |
Read more
More than a third of reported Australian data breaches are due to human error, the Office of the Australian Information Commissioner (OAIC) has revealed as it released its first full-quarter statistical report about the functioning of the new Notifiable Data Breaches (NDB) scheme.
David Braue |
31 Jul |
Read more
Looking for new cybersecurity staff? They don’t’ necessarily need to have university degrees to be the best at what they do.
David Braue |
04 Sep |
Read more
Mobile malware accounted for nearly 1 in 10 malware strains detected during the first quarter, Fortinet has warned on the back of research findings that also suggested that a similar proportion of companies had been hit by ransomware during the quarter.
David Braue |
14 Jun |
Read more
Mimecast’s Garrett O’Hara spoke at this year’s AusCERT conference on the issue of cyber resilience and how companies, large and small, are being impacted and defrauded through email-born attacks.
Anthony Caruana |
14 Jun |
Read more
Anyone who has had a leadership role in IT knows that when discussions about disaster recovery and business continuity start, your work life is about to become either a lot more interesting or a lot more complex. The trouble is, when other business functions think about incidents that could impact business operations, they invariably draw their attention towards the technology they rely on.
Anthony Caruana |
13 Jun |
Read more
Working alongside the Prime Minister’s special adviser for all things cyber gives Jacob Boyle a unique perspective on the government’s role in securing the country – not just with all the services offered by government but also in working with businesses and the security industry.
Anthony Caruana |
13 Jun |
Read more
Malware writers have come up with a novel way to install malware from Office that doesn't rely on tricking users to enable macros.
Liam Tung |
09 Jun |
Read more
Users tend to receive the most emails with malicious attachments on Thursdays and they’re most likely to click on messages in the morning purporting to be from the local postal service, according to an analysis of email attacks that has reinforced the importance of time and human factors for cybersecurity protection.
David Braue |
08 Jun |
Read more
Any company operating a multi-storey office building would develop painstaking fire escape plans, and any hospital would develop backup plans detailing how it could operate in the event of a power failure. So, if responsible businesses are actively addressing these risks, why are so many companies still failing to lay down detailed plans for dealing with a cybersecurity incident?
David Braue |
08 Jun |
Read more
With so many security projects and initiatives taking place across Australia and New Zealand, being chosen as the best security initiative of the last year is a great recognition of strong work over the last year. Kasada (https://www.kasada.io) was rewarded for their work on thwarting bot attacks at the 2017 AusCERT conference.
Anthony Caruana |
05 Jun |
Read more
Todd Peterson, from One Identity, delivered the second part of the AusCERT 2017 opening keynote. One Identity may sound like a new business but it’s an offshoot from Dell EMC and Quest Software.
Anthony Caruana |
30 May |
Read more
One of the last places you’d expect to find a corporate lawyer is a cybersecurity conference. But as the regulatory and legal landscape for businesses change the intersection between policy and technology is widening.
Anthony Caruana |
29 May |
Read more