Yubico: A CSO Subscriber Christmas Giveaway
Follow @CSO_Australia on LinkedIn, Comment on our pinned post what you want to hear about in 2020 using #yubikeycso
By CSO staff | 11 Dec | Read more
Follow @CSO_Australia on LinkedIn, Comment on our pinned post what you want to hear about in 2020 using #yubikeycso
By CSO staff | 11 Dec | Read more
UK's guidance for smart car makers encourages defence-in-depth, encryption, and software updates.
Ashton Kutcher is best known as an actor and producer, but he is also a successful tech investor having taken stakes in companies such as Airbnb, Foursquare, Meerkat, Spotify and Uber.
Stephen Withers | 08 Nov | Read more
Data breaches are inevitable and waiting for a breach to occur before designing an incident response plan is a recipe for failure. It’s a question of when the breach will occur and how you will respond, not if you will be breached. 100% prevention simply doesn’t exist, so having a plan to deal with a security breach is now more important than ever. You probably already have an incident response plan from a technical perspective. Phrases such as preparation, identification, containment, eradication and lessons learned.
Wayne Tufek | 15 Sep | Read more
Big-name security tools aren't catching anywhere near all of the malware they are presented with, according to the latest lab testing results from Enex Labs, which found during testing in the second half of 2014 that as many as 100 percent of tested malware was making it through the defences of eight popular security tools. The results were corroborated by a FireEye study that found traditional security defences simply are not stopping security breaches.
David Braue | 19 Jan | Read more
A study of Android mobile applications found that many popular apps fail to take even basic precautions to protect users' data. Despite this, some were arguing that it's not as dangerous as it seems to provide payment card information to many online services.
David Braue | 16 Sep | Read more
Australia may be a global non-contender as a source of malware callbacks, but analysis of malware from countries with more active malware-broadcasting profiles shows a strong correlation with political events such as the conflict between Russia and the Ukraine, a FireEye researcher has concluded.
David Braue | 01 Jun | Read more
Over 100,000 new individual malware routines for mobile devices were detected in 2013 by the cloud-based Kaspersky Security Network (KSN) alone, according to recently released statistics from the security vendor that highlight the magnitude of the current online threat and its future potential growth.
David Braue | 20 Dec | Read more