Cloud of the future poses security challenges now
The accelerated nature of cloud computing is presenting new security challenges, attendees at the Evolve.Cloud conference heard in Canberra recently.
The accelerated nature of cloud computing is presenting new security challenges, attendees at the Evolve.Cloud conference heard in Canberra recently.
Canberra's EVOLVE.Cloud hit the streets with topline speakers
Please take the time to nominate a person, team, project or employer that deserves recognition for improving information security. The nominees do not need to be AISA members. Nominations will close on Friday the 21st September at 5pm AEST
“Show me the money” has become the mantra for talking less and doing more. This year’s speakers include Dr Whitfield Diffie, VP for Information Security and Cryptography ICANN; Dr Alastair MacWillson, Accenture’s Global Managing Partner Security Practice; Eran Feigenbaum, Google’s Director of Security; Gene Kim, former CTO Tripwire; Mary Ann Davidson, Chief Security Officer, Oracle.
Unixpac now represents LockPath,a Kansas US based solution vendor, provider of the most innovative governance risk and compliance applications (GRC).
Distributed networks face the ongoing challenge of securing a continually evolving network perimeter. As threats have evolved to exploit the shifting lines of defense, companies have responded by adding additional layers of security. This need for multiple layers of security has placed an enormous strain on IT professionals, increasing their workload through the management of multiple consoles and security devices. Is your firewall capable of handling the growing demands of your business? Many organizations are now migrating to Next-Generation Firewall solutions to reduce complexity, consolidate functionality and increase employee productivity. In fact, analysts predict that by the year-end 2014, 60% of new purchases will be Next-Generation Firewalls. Find out what is driving this phenomenon and you can benefit by these new solutions by attending the Web seminar:
Paul C Dwyer will review the challenges facing mobile operators and those responsible for security in the era of mobile broadband. Topics Include: Growth in Mobile Data Traffic Volumes Application Layer Vulernerabilities Mobile Services Value Chain Apps New Attack Vectors and Privacy Risks Smartphone Signaling Security Attacks and Network Latency New Security from the LTE Architecture Security Exposures from Small Cells
Botnets are controlled by sophisticated cybercriminals. Grum, the world's third-largest botnet, included a network of hundreds of thousands of infected computers perpetrating cybercrime and online fraud, impacting consumers and organizations worldwide. Hear directly from a FireEye malware expert who led the effort to take down Grum, including: • Distinct strategies for botnet takedowns • Evolution of Grum • Role of the research community in finding Grum master CnC servers • A blow-by-blow account of how the criminals tried to salvage Grum and what's next Learn how botnets operate and how research and technology from FireEye played a key role in dismantling four of the world's largest botnets since 2008, including Grum, Rustock, Ozdok/Mega-D, and Srizbi.
There are three major attack vectors which must remain secure. Insider threats are related to users who interact with data. Opportunistic attacks deal with understanding the threat scape and global threat intelligence. Targeted attacks are related to internal intelligence; for example, where are my critical assets? What are they vulnerable to? Where are my counter measures? With a strong security connected framework we can begin to address all of these with one centralized security solution that is capable of looking at everything from endpoint, network, to data security. This webcast proposes best practices for: • Understanding and protect against insider, opportunistic and targeted attacks • Integrating the threatscape with one security solution that incorporates all types of attacks • Bringing together endpoint, network and data security into one unified control
When it comes to protecting enterprise data, CIOs and CSOs are at a crossroads. The complexity and prevalence of security threats continue to grow, bolstered by consumer IT and mobility. The open nature of IT has paved the way for far more sophisticated attacks—beyond conventional credit card data theft to multilevel attacks. Information security executives face perhaps the toughest challenge of their careers.
The CSO Reader Survey 2012 competition is a game of skill with the winner chosen by the CSO team at IDG Communications. All entries will be judged on their merit.
Check Point® Software Technologies Ltd. (Nasdaq: CHKP), the worldwide leader in securing the Internet, today introduced Check Point Virtual Systems that allow businesses to consolidate security gateways onto a single appliance or open server -- simplifying security, reducing costs and boosting performance for private cloud environments.
Exclusive breakfast for ICT and Information Security leaders addressing agile security and its admirable vision. What does it actually look like? How is agility achieved and how can you navigate the challenges?
In Australia, roughly 10 per cent of fixed, and 5 per cent of wireless Internet user IP addresses are compromised, says Barrie Hall, Principal Domain Expert – Broadband, with Telstra Operations.
A malware attack which secretly charged users for high cost texts each time they tried to open an app, has been uncovered in the UK.