threat landscape - News, Features, and Slideshows

News

  • The 5 most important hacks of the last five years

    ​You would get very little argument from anyone that the security threat landscape has changed significantly since the start of this decade. Mega-breaches, ransomware, nation-state threat actors, insider leaks – all of these have moved the goal posts a long way from where they were just a few short years ago.

    Anthony Caruana | 19 Oct | Read more

  • Decoding threat intelligence

    There is a scene in HBO's adaption of Game of Thrones where a character counsels the king to dismiss the rising power of one of his rivals because "curiosities on the far side of the world" are no threat. A season later, that rival has three dragons and an army under her control.

    Jason Clark | 25 Jun | Read more

  • Cisco dealing with change in the threat landscape

    We've all heard the same story recently – malware developers and distributors are becoming far smarter and commercially minded than ever before. The days of disgruntled teenagers hacking from their dimly lit bedrooms are behind us with corporatised criminal gangs now working as organized syndicates intent on stealing identities and extorting money.

    Anthony Caruana | 24 Mar | Read more

  • The important issues in Information Security today.

    When it comes to choosing careers, some people have a distinct moment when they realise that “this is what they want to do”. In my experience, this moment was when I was sitting in a lecture theatre at University, I was studying what would have been similar to an IT degree today but I wasn’t a computer hacker, I didn’t really have a lot to do with computers. It was before Internet Banking, smart phones, tablets but something about listening to cryptography made me sit up, listen and not leave the lecture before it finished. I’ve now been working in the Information Security industry in Australia and overseas over the years, in many roles and many organisations.

    CSO staff | 06 Jan | Read more

  • Five Key Challenges Facing CSOs Today

    2012 has been a tough year for IT security and the trend seems to be continuing into 2013. We have now become accustomed to groups such as Anonymous that have wreaked havoc on a number of large government and corporate organisations. A new frontier in cyber threats has opened. The driver for cyber intrusion is no longer fame, but theft of intellectual property, financial information, blueprints and other classified information for financial gain.

    Ashwin Pal | 10 Jul | Read more