From NotPetya's global disruption to North Korea's digital plundering of financial institutions, state-sponsored cyber attacks should be top of mind for business leaders. Here's how to defend against them.
Stories by Maria Korolov
Bad data is big issue for artificial intelligence, and as businesses increasingly embrace AI, the stakes will only get higher. Here’s how not to get burned.
AI is fast becoming a go-to technology for business transformation, shaking up roles across the enterprise. Here’s how to make the most of this inevitable evolution.
Despite cultural barriers and legacy tech, AI is poised to take over ERP functions, with ERP vendors adding new machine learning features and enterprises keen to investigate.
Password crackers have access to more stolen passwords and better password hacking software and tools than ever before.
Monitoring the dark web to see if your data is being sold there is risky, but solutions and services are available to help.
When individuals and departments bypass IT to acquire cloud services and apps, IT and security teams are blind to the security vulnerabilities and compliance issues they present.
Ransomware attacks--and defenses against them--are evolving fast, but enterprises still struggle to keep up.
The emergence of the DDoS-as-a-service industry has lowered the costs for attacks to $25 or less, allowing criminals with no technical expertise to reach profit margins of up to 95 percent, according to a report released last week
Criminals are beginning to use artificial intelligence and machine learning to get around cyber defenses
There are many reasons why IT professionals can be fired, but six out of the top nine are related to security. Fireable offenses included failing to modernize a security program, data breaches with unknown causes, data breaches that do not become public, and the failure of a security product or program investment.
Machine learning technologies can help companies spot suspicious user behaviors, malicious software, and fraudulent purchases -- but even as the defensive technologies are getting better, attackers are finding ways to get around them
There will still be plenty of work to go around so job prospects should remain good, especially for those who keep up with technology, broaden their skill sets, and get a better understanding of their company's business needs.
Networked security cameras are the most likely to have vulnerabilities when it comes to securing Internet of Things devices in the enterprise, according to a new report.
Enterprises considering adopting public clouds are concerned about where their data is located and how it's protected, according to a new survey by IDG.
- CCSenior Project Manager, Sydney CBD, Data Migration, Application IntegrationNSW
- CCiOS Developer - Brisbane locationQLD
- CCSystems EngineerNSW
- CCStorage EngineerNSW
- CCApplication PackagerVIC
- FTCyber Security AnalystOther
- FTJava AWS DeveloperNSW
- FTSystems EngineerVIC
- CCNetwork Engineer (Cisco)NSW
- CCTalend Integration DeveloperOther
- CCJunior Project ManagerVIC
- CCHadoop DeveloperACT
- CCMessaging AdministratorQLD
- CCProject Manager-SCADAQLD
- FTSolution Architect - DigitalVIC
- FTBusiness AnalystSA
- CCTechnical Business AnalystNSW
- CCInfrastructure System Specialist - BrisbaneVIC
- CCImplementation EngineerWA
- CCWindows System EngineerNSW
- CCNode.js DeveloperQLD
- FTIT Systems AdministratorVIC
- FTNetwork AdministratorVIC
- FTJunior-Mid Level Release ManagerQLD
- CCSenior Application Developer - Government OrganisationVIC