CSO Webinar: The FBI knows how to catch a cybercriminal – but do you?
Ever more sophisticated cyber adversaries, many with nation-state backing, pose an imminent threat to both public and private organisations.
Ever more sophisticated cyber adversaries, many with nation-state backing, pose an imminent threat to both public and private organisations.
I lay awake in bed looking over at the alarm clock on my side table it indicates 5:59 am, I am waiting for it to click over to 6 am and the alarm to sound. Click.
Craig Ford | 26 Feb | Read more
Matt Kraus figured there might be some security surprises waiting for him when he began taking a closer look at his company’s network – but when the results came back, he was still floored by the findings
David Braue | 16 Nov | Read more
The 27-year sentence handed down to a 32-year-old Russian hacker set the high water mark for cybercriminal prosecution. Security firm Webroot was also in trouble after its endpoint security product inadvertently began tagging Windows system files as malware – rendering their systems unusable. This, as experts offered |tips for protecting older Windows Server machines.
David Braue | 02 May | Read more
Cloud-based workloads may be configured and used for different scenarios than on-premises servers, but the process of picking out cybercriminal activity is not so far removed, according to a senior security executive who notes that telltale signs of penetration are there if you know where to look.
David Braue | 27 Sep | Read more
There is so much personal information available online that size has proven to be no impediment for even small cybercriminal groups that are proving effective at launching highly effective targeted attacks, according to the head of one security specialist's global R&D labs
David Braue | 18 Apr | Read more
SYDNEY, July 22, 2015 – Gigamon Inc. (NYSE: GIMO), the leader in traffic visibility solutions, today transformed the industry by launching GigaSECURE®, the first Security Delivery Platform that provides pervasive visibility of network traffic, users, applications and suspicious activity, and delivers it to multiple security devices simultaneously without impacting network availability.
Gary Newman | 22 Jul | Read more
Law-enforcement authorities must increasingly partner with private-sector security researchers to combat increasingly flexible, malevolent and global security interests on their home turf, an INTERPOL cybersecurity specialist has warned.
David Braue | 28 May | Read more
Post-mortem analysis of the high-profileCarbanak banking heist continues to suggest that the $1 billion-plus series of attacks not only represent a high-water mark in the panoply of major crimes, but has been executed by cybercriminals exploiting the same sort of human weaknesses that security experts have been warning about for decades.
David Braue | 20 Feb | Read more
A hacker, said to be an Australian, may be one of the key members behind the Ukrainian separatist hacking group that claimed responsibility for attacks on German government websites earlier this month.