Endpoint security has been recognised by most companies as being a crucial component of corporate defence against security breaches. Find out why despite being confident in their existing protection strategy, most Australian companies have acknowledged there is still room for improvement.
As of September 2013, a new and vicious form of malware has been wreaking havoc. CryptoLocker belongs to a family of malware called “ransomware”, which is designed to extort money from victims by denying them access to their personal files. It targets all Windows Operating Systems, from Windows XP to Windows 8, and typically remains unnoticed by victims until it’s too late and the damage to their files is irreparable.
Smartphones are rapidly becoming an indispensable communication and computing tool for the world’s expanding mobile workforce. As Smartphones and other handheld wireless communication devices become an integral part of the modern business landscape, the advances in flexibility, power, and mobile access come with a risk. Find out how to stay competitive in a changing business world and leverage technology to meet future needs.
Network hacking and corporate espionage are on the rise and set to intensify. Information security risks remain commonplace, and most organisations need to increase vigilance. This paper has analyses the realistic threats to fibre optic Ethernet networks – both at the LAN and WAN level. Read now.
There are two types of data: the kind of data that someone wants to steal and everything else. Most security professionals today do not understand the motivations behind data theft. In this Forrester whitepaper, we explore how encrypting, and thereby devaluing, your sensitive data, you can make cybercriminals bypass your networks and look for less robustly protected targets. Find out how to use encryption, tokenization, and other technologies to “kill your data". Click to download!
A unified approach to information security can help modern vital infrastructure providers deal with evolving IT threats without compromising on communications or the demands of an increasingly mobile workforce. Flexible policies, combined with quality inbound threat detection, deep content inspection and encryption capabilities can help organisations to mitigate the risks – not just from outside the organisation, but also within it. Read this whitepaper.
This paper explores new developments in website security that online businesses should be implementing to build confidence in their sites, protect valuable brands and safeguard customers’ sensitive information, not to mention improving their bottom line.
- AISA 2016 | Hear from Bruce Schneier, David Lacey, Rik Ferguson and many more | 18-20th October Register Today
- As networks evolve, visibility remains key to managing IT-security risk in business terms
- Start your cloud journey. Register now and learn a wide range of AWS cloud solutions covered in the monthly AWS Webinar Series.
- Next-generation SIEM turns low-level security monitoring for high-level business goals
- CLOUDSEC2016 - Timothy Wallach, Cyber Taskforce FBI (USA) speaks on the status & evolution of global cybercrime. Save your seat
- Join Skeeve Stevens, Stanley Shanapinda, and more on how to manage metadata to maximise your ability to detect and prevent an attack. Register
- See Your Traffic for What It Really Is
- The Future is Encrypted. Manage It.
- Ransomware explosion is the latest security wakeup call for CxOs
- New Destination Gigamon Security Resources IS HERE
- Caution: That SSL Blind Spot is Growing
- Test Your Knowledge of Network Encryption
- Join special guest Jeff Lanza, Retired FBI Agent (USA), Ty Miller, Mark Gregory & Andy Solterbeck for a discussion on ransomware security