Latest news - Page 732

The disruptive force of blockchain and how it will shake up business as we know it
Mon, 10th Jul 2017
#
blockchain
#
rsm australia
#
digital disruption
Blockchain technology is set to disrupt every aspect of business, from tax to governance, according to RSM Australia.

The three Rs of enterprise security: Rotate, repave, and repair
Mon, 10th Jul 2017
#
gaming
#
advanced persistent threat protection
#
digital entertainment
No organisation regularly repaves their services or applications from a known, good state, leading to vulnerable servers for more than five months.

Major Dark Web Player goes offline: Could it be an exit scam?
Fri, 7th Jul 2017
#
ddos
#
dark web
#
digital shadows
One of the Dark Web's biggest marketplaces for illegal online trades was taken offline this week, with reports circulating that it was an 'exit scam'.

Four cyber security principles that withstand the test of time
Thu, 6th Jul 2017
#
endpoint protection
#
edr
#
software development
Information security can be a noisy place. As a career security guy my experiences have given me a deep understanding of attackers & the enterprise.

Mitigating identity-related risks: The complete package or a one-man show?
Wed, 5th Jul 2017
#
data analytics
#
martech
#
planning
Think of behaviour analytics as Iron Man and identity analytics as The Avengers and you have a powerful approach to identity access management.

A system wiper with no recourse: Researchers discover what NotPetya attack was really after
Wed, 5th Jul 2017
#
malware
#
ransomware
#
cybersecurity
ESET senior research fellow Nick FitzGerald says that NotPetya was most likely a state-sponsored attack through malware.

Organisations should test-drive business plans for continuity and cyber-resilience
Wed, 5th Jul 2017
#
dr
#
cloud services
#
business continuity
Testing, and particularly crisis simulations and penetration testing, help identify weaknesses and also help to refine the business continuity plan.

Sophos responds to new variant of Petya ransomware
Wed, 5th Jul 2017
#
malware
#
ransomware
#
cybersecurity
These attacks are upping the ante, as they hit services that affect people’s day-to-day activity; such as healthcare, and postal services.

Cybersecurity battleground shifting to Linux and web servers - report
Wed, 5th Jul 2017
#
firewalls
#
network infrastructure
#
datacentre infrastructure
WatchGuard found that despite an overall drop in general malware detection for the quarter, Linux malware made up more than 36% of the top threats.

emt Distribution adds Matrix42 to cyber security portfolio
Wed, 5th Jul 2017
#
cloud services
#
support
#
resellers
emt Distribution partners with Matrix42, enhancing cyber security with advanced workspace management tools in ANZ.

OceanLotus malware proves that MacOS attackers are rapidly honing their craft
Tue, 4th Jul 2017
#
malware
#
firewalls
#
network infrastructure
Despite its low profile, the OceanLotus backdoor for MacOS has become more advanced and more targeted than ever before.

Australian CISOs say cloud compliance is one of the most stressful parts of the job
Tue, 4th Jul 2017
#
cloud services
#
symantec
Australian CISOs stress over cloud compliance and feel undermined by CEOs breaking security protocols, reveals a new Symantec survey.

Data61 celebrates momentous year of security, big data and research projects
Mon, 3rd Jul 2017
#
data analytics
#
martech
#
planning
CSIRO's Data61 caps a trailblazing year with cybersecurity advances, innovative data projects, and robust industry collaborations.

Practical ways your firm can take action with security analytics
Mon, 3rd Jul 2017
#
storage
#
siem
#
soc
Security is the word on everyone’s lips but what can you really do with the analytics data behind it? LogRhythm and SANS shows how to put it to work.

Not just a buzzword: Ebook reveals how global firms put security analytics to work
Mon, 3rd Jul 2017
#
siem
#
logrhythm
#
research director
Security analytics has gone from buzzword to obligatory application in a very short time. Gartner, BT and the SANS Institute share their secrets.

Securing assets and applications in the cloud
Mon, 3rd Jul 2017
#
devops
#
cloud security
#
iaas
Hard-coding and embedding credentials in the code or a script can initially make them easy to use – but this represents a significant vulnerability.

Third-party app downloads could pose serious security issues – Securicom
Mon, 3rd Jul 2017
#
apps
#
cloud services
#
securicom
At least 27% of the apps introduced by employees into enterprise environments posed a high-security risk, research has found.

FY18 is here: ESET's guide to top cybersecurity investments for SMBs
Mon, 3rd Jul 2017
#
malware
#
partner programmes
#
cybersecurity
As Australian businesses and SMBs start to formulate their budgets for FY18, ESET is underlining the importance of security irrespective of size.

You’re invited: Security Exhibition & Conference 2017
Mon, 3rd Jul 2017
#
security exhibition & conference
#
event
#
awards
Come along to the Security Exhibition & Conference 2017, Australia's must-attend physical & electronic security event of the year.

Encryption with backdoors? Internet advocates call out Five Eyes leaders for 'shortsighted' tactics
Mon, 3rd Jul 2017
#
encryption
#
data privacy
#
spying
Even if measures to restrict strong encryption access are put in place, adversaries will switch to new tools crafted without the Five Eyes network.