In Pictures: 7 commonly overlooked ways to tighten cybersecurity
It's OK to be paranoid about every last detail when it comes to security.
19 Nov | View galleries
The next time you are visiting any business, private or public look around and take things in with a – let’s call it “security filter”.
Craig Ford | 08 Mar | Read more
Nearly half of Australian business leaders – and a third of IT security professionals – don’t know what to do if their business suffers a cybersecurity incident, according to a new survey that also highlighted industry’s chronic failure to notify customers when personal data was compromised in a cybersecurity attack.
David Braue | 15 Dec | Read more
CISOs are getting more clout than ever but it’s not translating into cross-business partnerships or far-reaching security strategies, according to a new survey of the CISO’s role that found just 51 percent of companies have an organisation-wide information security strategy.
David Braue | 20 Sep | Read more
Businesses that continue to prioritise perimeter security over data protection will face a day of reckoning when a perfect storm of new regulations comes into effect next year, security experts have warned as new research finds that more than half of Australian businesses admit they’ll fail to meet deadlines for compliance.
David Braue | 12 Jul | Read more
Critics say the The Common Vulnerabilities and Exposures (CVE) program, managed by MITRE, is falling far behind in its mission to catalog and identify all known vulnerabilities. Its defenders say a new model is closing that gap.
Taylor Armerding | 11 Jul | Read more
How do you know your employees retain what you teach them in company-required security awareness training? You don't -- unless you regularly test their security savvy and effectively address their mistakes during post-test follow-up sessions.
Kim Lindros and Ed Tittel | 24 Feb | Read more
I look for passion more than anything else.
A recent threat intelligence study reports widespread security vulnerabilities in healthcare organizations, many of which went unnoticed for months. In December, a developer pulled unencrypted data from a 'certified' mobile health app in less than a minute. Why is it so hard for healthcare to get security right?
Brian Eastwood | 26 Feb | Read more
As 2012 comes to a close, it's time to reflect on the security trends of the year with this look at the hottest security slideshows of 2012.
Thor Olavsrud | 24 Dec | Read more
No company is safe from the ever-changing threat landscape; businesses are frequently exposed to new software bugs and vulnerabilities. This paper covers Paraflares ability to provide round the clock protection and includes 2 case studies.