The ease with which cloud-based architectures facilitate third-party communications will make them a key security risk in coming years, security experts have warned as Australian firms rush headlong into the cloud without fully considering its implications.
By David Braue |
02 Dec |
Read more
The Australian Cyber Security Centre (ACSC) as it sought to raise awareness and protection around the surging Emotet malware, which was fingered in the recent malware attacks on Victorian hospitals and nearly two dozen other Australian victims.
David Braue |
07 Nov |
Read more
The overall risk posed by cybersecurity threats has increased over the past 12 months and adoption of cloud technologies is by far the biggest reason, according to new research that found just 31 percent of organisations can mitigate a new risk within a month.
David Braue |
07 Nov |
Read more
If you use Trend Micro consumer anti-virus and you've been getting scam tech support calls, now you know why.
Liam Tung |
07 Nov |
Read more
Facebook and the UK's privacy watchdog settle a claim over Cambridge Analytica and the threat of voter profiling.
Liam Tung |
31 Oct |
Read more
Google brings site isolation to Chrome on Android and improves the defense for Chrome on the desktop.
Liam Tung |
18 Oct |
Read more
A series of dynamic technical talks at the inaugural CSO Australia-AWSN Women in Security conference highlighted the innovative perspectives and problem-solving nous that women bring to cybersecurity roles.
David Braue |
04 Sep |
Read more
The realities of supply and demand apparently triggered a rise in the price of Android exploits, so much so that they're now more expensive than iOS exploits.
Liam Tung |
04 Sep |
Read more
Google study shows why credential stuffing attacks work.
Liam Tung |
16 Aug |
Read more
After Apple blocks Titan keys on iOS devices. Bluetooth might not have been such a good idea after all.
Liam Tung |
12 Jun |
Read more
Huawei isn't completely banned from the UK's 5G network rollout.
Liam Tung |
25 Apr |
Read more
Admins managing Cisco's RV320 and RV325 routers should definitely install new firmware available today.
Liam Tung |
05 Apr |
Read more
FBI warns consumers over the Chinese embassy scam.
Liam Tung |
29 Mar |
Read more
Threat intelligence has become a nice-to-have for many vendors seeking to improve their security offerings, but for the executives leading Cisco’s Security Business Group it’s just the framework for a product-development process that is focused on maintaining a consistent, end-to-end network security architecture while supporting all manner of front-facing customer innovation.
David Braue |
06 Mar |
Read more
Organisations are leaving themselves exposed by failing to demand adequate security protections when buying new technology, according to a senior Cisco executive who warned that security and networking specialists must work together better to close persistent gaps.
David Braue |
05 Mar |
Read more
Businesses wanting to improve their security practice need to reconsider the way they position cybersecurity within their business philosophy, a security analyst has told an audience of security practitioners while warning that the persistence of “terrifying” images of cybersecurity practitioners had challenged the progression of cybersecurity into becoming a mainstream business concern.
David Braue |
05 Mar |
Read more
Asia-Pacific companies are struggling more than their global peers to get their heads around cyber fatigue, John Maynard, vice president for global security sales with Cisco, has warned in kicking off the Cybersecurity Innovation Day at this week’s Cisco Live! conference.
David Braue |
05 Mar |
Read more
While spending on cybersecurity expertise would seem to be a no-brainer, the large number of companies without formal inhouse expertise suggests another ongoing, underlying challenge in finding and securing those skills within the current competitive market.
By CSO staff |
22 Feb |
Read more
Conventional views of credential compromise may focus on external activities such as mass credential-stuffing attacks and password-stealing malware, but new breach-compromise statistics suggest that the fast-paced adoption of cloud and associated DevOps techniques has created other vulnerabilities that CISOs still don’t fully appreciate.
David Braue |
08 Feb |
Read more
Whether due to blind faith, convenience or just plan ignorance, many businesses are labouring on with the same firewalls they have been using for a decade or longer.
David Braue |
14 Jan |
Read more