Stories by CSO staff

CSO staff's image

AISA Information Security Awards

Please take the time to nominate a person, team, project or employer that deserves recognition for improving information security. The nominees do not need to be AISA members. Nominations will close on Friday the 21st September at 5pm AEST

CSO staff | 14 Sep | Read more

AISA National Conference 2012 set to repeat last year’s success

“Show me the money” has become the mantra for talking less and doing more. This year’s speakers include Dr Whitfield Diffie, VP for Information Security and Cryptography ICANN; Dr Alastair MacWillson, Accenture’s Global Managing Partner Security Practice; Eran Feigenbaum, Google’s Director of Security; Gene Kim, former CTO Tripwire; Mary Ann Davidson, Chief Security Officer, Oracle.

CSO staff | 14 Sep | Read more

Why its time to upgrade to a next generation firewall

Distributed networks face the ongoing challenge of securing a continually evolving network perimeter. As threats have evolved to exploit the shifting lines of defense, companies have responded by adding additional layers of security. This need for multiple layers of security has placed an enormous strain on IT professionals, increasing their workload through the management of multiple consoles and security devices. Is your firewall capable of handling the growing demands of your business? Many organizations are now migrating to Next-Generation Firewall solutions to reduce complexity, consolidate functionality and increase employee productivity. In fact, analysts predict that by the year-end 2014, 60% of new purchases will be Next-Generation Firewalls. Find out what is driving this phenomenon and you can benefit by these new solutions by attending the Web seminar:

CSO staff | 31 Aug | Read more

New security threats in the broadband era

Paul C Dwyer will review the challenges facing mobile operators and those responsible for security in the era of mobile broadband. Topics Include: Growth in Mobile Data Traffic Volumes Application Layer Vulernerabilities Mobile Services Value Chain Apps New Attack Vectors and Privacy Risks Smartphone Signaling Security Attacks and Network Latency New Security from the LTE Architecture Security Exposures from Small Cells

CSO staff | 30 Aug | Read more

Taking down the worlds largest botnets

Botnets are controlled by sophisticated cybercriminals. Grum, the world's third-largest botnet, included a network of hundreds of thousands of infected computers perpetrating cybercrime and online fraud, impacting consumers and organizations worldwide. Hear directly from a FireEye malware expert who led the effort to take down Grum, including: • Distinct strategies for botnet takedowns • Evolution of Grum • Role of the research community in finding Grum master CnC servers • A blow-by-blow account of how the criminals tried to salvage Grum and what's next Learn how botnets operate and how research and technology from FireEye played a key role in dismantling four of the world's largest botnets since 2008, including Grum, Rustock, Ozdok/Mega-D, and Srizbi.

CSO staff | 30 Aug | Read more

Winning in the modern threat landscape

There are three major attack vectors which must remain secure. Insider threats are related to users who interact with data. Opportunistic attacks deal with understanding the threat scape and global threat intelligence. Targeted attacks are related to internal intelligence; for example, where are my critical assets? What are they vulnerable to? Where are my counter measures? With a strong security connected framework we can begin to address all of these with one centralized security solution that is capable of looking at everything from endpoint, network, to data security. This webcast proposes best practices for: • Understanding and protect against insider, opportunistic and targeted attacks • Integrating the threatscape with one security solution that incorporates all types of attacks • Bringing together endpoint, network and data security into one unified control

CSO staff | 30 Aug | Read more

How CIO's meet growing security threats

When it comes to protecting enterprise data, CIOs and CSOs are at a crossroads. The complexity and prevalence of security threats continue to grow, bolstered by consumer IT and mobility. The open nature of IT has paved the way for far more sophisticated attacks—beyond conventional credit card data theft to multilevel attacks. Information security executives face perhaps the toughest challenge of their careers.

CSO staff | 20 Aug | Read more