CSO Perspectives Roadshow Sydney : IN PHOTOS
CSO & Enex Testlab join forces to deliver a first class IT Security event in Sydney's Four Seasons Hotel.
24 Sep | View galleries
CSO & Enex Testlab join forces to deliver a first class IT Security event in Sydney's Four Seasons Hotel.
24 Sep | View galleries
Attacking car systems, Google Glass for password theft, using free cloud trials to launch botnets, more
01 Jul | View galleries
The year's only halfway done, but hackers have already filled enough headlines to last a decade.
24 Jun | View galleries
IT leaders and security chiefs gathered together at Aria Restaurant in Sydney on 3 June to discuss how they are addressing the challenge of cyber resilience and what it takes to be prepared.
23 Jun | View galleries
These 12 historically insidious backdoors will have you wondering what’s in your software -- and who can control it
13 Jun | View galleries
CSC opened the doors to its new security operations centre (SOC) in Macquarie Park, Sydney this week. The SOC is one of five that the vendor operates globally as part of a 24/7 strategy to identify cyber threats in real time.
03 Jun | View galleries
An identity-centric approach to Access Management allows IT to provide employees with seamless access to systems and information, when and where they require it while securing the mobile, cloud- connected enterprise against insider threats and external attacks. At the business level, this approach allows the organisation to improve customer acquisition and engagement by accelerating the delivery of secure new business services. In other words, organisations that evolve into an Identity- Powered Enterprise will be better positioned to both enable and protect their business.
30 May | View galleries
The Identity Theft Resource Center, which tracks data breaches, has counted 204 of them from January 1 to March 27.
09 Apr | View galleries
Many companies have felt the effects of data theft over the last several years. It's 2014 and it doesn't look like the going is getting any easier. The technology sector seems most at risk with every week bringing the world another reported data breach. Here we look at the largest breaches in the last year.
02 Apr | View galleries
Here are 20 of the most notorious known break-ins over the past decade.
19 Mar | View galleries
These four products represent different approaches to VM security
11 Mar | View galleries
Our roundup of new security products on hand at this week's show.
25 Feb | View galleries
It's not just revenues and size, influence counts and excellence matters.
19 Feb | View galleries
Apple's iBeacon is already in many iPhones, whether you realise it or not. The technology was rolled out in several Apple store locations back in December, and had many privacy advocates concerned about the implications for user tracking and security. Here's a breakdown of how it works.
12 Feb | View galleries
Kali Linux 1.0.6
12 Feb | View galleries
These scorned IT staffers had their vengeance on their former employers -- but most got their comeuppance in the end.
30 Jan | View galleries
From Java to SPARC, critical Sun technologies have lived on, been cut loose, or lost their luster in the four years since the Oracle acquisition
17 Jan | View galleries
From the attack on privacy and Cryptolocker to Eric Snowden and the NSA, it's been a challenging year
11 Dec | View galleries
CSO Perspectives Roadshow - The Final Frontier
20 Nov | View galleries
Michael Bruemmer, vice president of Experian Data Breach Resolution, outlines some the common mistakes his firm has seen as organizations deal with the aftermath of a breach during a presentation for The International Association of Privacy Professionals (IAPP) Privacy Academy.
18 Nov | View galleries