- Java-based Trojan was used to attack over 400,000 systems
- US government wants to sharply increase spending on cybersecurity
- The great Australian IT security spend: More brawn than brains?
- Jobs growth confirms security analysts are the most in-demand IT role: CompTIA
- Flaws in Trane thermostats underscore IoT security risks, Cisco says
Almost 50% of Australian security executives are concerned about the current state of their company’s security in dealing with advanced attacks. Find out in this infographic the survey results of how respondents feel about dealing with security breaches effectively.
Cyberattacks have evolved to become much more complex, however the core techniques employed by malware are usually recycled and largely unchanged.
Find out how these targeted attacks affect companies in real world cases and why legacy solutions that focus on detection are insufficient to protect secure enterprise data. Included are also 10 preventative measures you can take to prevent a corporate security breach.
Cyber criminals today are deploying sophisticated attacks on enterprises making the role of security professionals much more complex than ever before. Find out the 10 requirements your cybersecurity solution must meet to ensure secure application enablement at every location and how you should widen your RFP selection criteria when choosing a security provider.
With globalisation growing, an inefficient DNS system that fails to support the influx of online visitors can be detrimental to business operations, revenue and online reputation. Find out what you must know to design a scalable and secure DNS architecture that not only satisfies your current business needs but also takes into account future expansion plans.
When markets are global, employees work around the clock and business is effectively always on, any interruption to application availability can quickly lead to lost revenue, lost productivity, lost brand value, and regulatory problems. Read on to learn how to deal with this type of existential threat.
Cybercrime is now a leading menace of 21st century businesses. Perhaps even more unsettling, many cybercrime victims have been breached despite sizeable security investments and best-of-breed product deployments. For this reason, the sophistication of recent attacks has created a widespread sense of fear and distrust among consumers.
Threat intelligence transforms the technical analysis required to identify the symptoms of a cyber attack - such as malware and security events - into an understanding of who the attackers are and what their motives and capabilities may be.
This quarterly report from the IBM X-Force research and development team provides a closer look at today’s security risks – from new threats arising from within the Internet of Things, to the sources of malware and botnet infections.
This edition of the recurring Threat Landscape Review examines data from WildFire™, a key component of the Palo Alto Networks threat intelligence cloud, to identify how organizations in different industries are targeted and affected by malware.
Download the latest research from Unit 42 to see current trends and malware distribution patterns across 10 industries, and find out what you need to know about the Kuluoz malware family, and how to defend against it.
What can malware do in 60 seconds? One minute can change everything for a business. The speed of business is all about being responsive to customers and stakeholders. So what happens when the speed of business is overtaken by the speed of malware? Given the unprecedented growth in the number of security threats that focus on stealing data, sabotaging business continuity and damaging a company’s reputation, what should organizations do to ensure the speed of malware doesn’t disrupt the speed of business? T
- Why big data is the capital driving the digital age
- 8 ways to avoid fads, gimmicks and shiny martech toys
- What the hell is the difference between ad tech and marketing tech?
- CMO interview: The importance of being digitally agile with your CIO
- ADMA launches new marketing training program to address data skill gaps