CSOs may be more visible at the top, but that doesn’t make the job easy
In a time of continuous change, CSOs must fight to stay ahead of the threats
David Braue | 25 Jul | Read more
In a time of continuous change, CSOs must fight to stay ahead of the threats
David Braue | 25 Jul | Read more
Trained continually by ever-expanding masses of security data, AI promises to finally help CSOs keep up with the flood
David Braue | 24 Jul | Read more
Hacking for fun and profit? Not so much; these days it’s mostly just about profit.
David Braue | 24 Jul | Read more
Is there more 'talk' than 'walk' in your company's cyber security strategy?
Dwayne Melancon | 21 Jul | Read more
Security staff recognise the importance of rapid response to security incidents but are still struggling to implement actionable response policies and spend most of their time in ‘firefighting mode’, according to a user survey that also found businesses are dealing with an average of 346 security incidents every week.
David Braue | 21 Jul | Read more
Trump Hotels admitted that hackers stole credit card and other sensitive data about guests who stayed at 14 Trump properties; the third-party reservation booking system was breached.
Tesla is working to make sure a fleet-wide attack can't occur, Musk told attendees at the National Governors Association
While there is a general consensus that the Knightscope security robot in Washington, D.C., committed suicide on Monday, the same everyone-agrees-opinion is not true for the $7.4 million heist of the cryptocurrency Ether that happened on the same day.
Google puts developers who abuse Android permissions on notice.
Businesses that continue to prioritise perimeter security over data protection will face a day of reckoning when a perfect storm of new regulations comes into effect next year, security experts have warned as new research finds that more than half of Australian businesses admit they’ll fail to meet deadlines for compliance.
David Braue | 12 Jul | Read more
The Common Vulnerabilities and Exposures (CVE) Program has been cataloging software and firmware vulnerabilities for 18 years. Here’s how it can help you secure your company’s network.
Taylor Armerding | 11 Jul | Read more
Comparisons of an old version of Petya and the this week's Petya suggest money was not the motivation.
Microsoft has released a host of new and old patches for unsupported versions of Windows, citing a heightened risk of attacks by nation-state actors.
The story of how Samy Kamkar made his reputation in information security is the stuff of legend. After getting his first computer as a ten year old, he started exploring the Internet through message boards, IRC, gaming and creating hacks and cheats for the games, before moving on to other forms of online activity.
Anthony Caruana | 01 Jun | Read more
At this year's CSO Perspectives Roadshow Leon Fouche, BDO's national leader for cyber security walked the audience through a number of different security reports to paint a picture of the threats today's world is facing.
Anthony Caruana | 22 Mar | Read more