Synack gets $21.25 million in Series C funding from Microsoft, HPE and Singtel to hire more white-hat hackers and expand its territory.
Stories by Tim Greene
Industrial control systems (ICS) that run the valves and switches in factories may suffer from inherent weaknesses that cropped up only after they were installed and the networks they were attached to became more widely connected.
Corporate security pros can add a new task to their busy days: handling panicky employees worried about privacy who are using the onion router (Tor) browser as a way to protect their online activity.
When ransomware criminals lock up files and demand payment to decrypt them, don’t pay but be prepared with backup.
The profitability of ransomware made it the top cyber threat last year in two categories: the number of attacks and the amount of money generated for crooks, according to a Trend Micro lookback on data it collected from its customers.
As tens of thousands of the world’s top security pros gather at RSA Conference 2017 they are being called upon to watch out for a new threat: their own data.
Spam is making a surprising resurgence as a threat to corporate security and becoming a more significant carrier of attacks as varied as spear phishing, ransomware and bots, according to Cisco’s 2017 Annual Cybersecurity Report.
200,000 devices with the OpenSSL Heartbleed vulnerability may include commercial software you are running.
The life of the corporate desktop team can turn into a legal nightmare quickly if end users haven’t agreed that it’s OK for techs to search their machines, something that has come to light in a California child pornography case involving Best Buy’s Geek Squad.
Adultery dating service submits to 20 years of federal auditing of its information security.
IoT devices make good botnet material because they are poorly defended and the Mirai source code to create them has been made public.
Enterprises should expect business as usual from RSA in the wake of its being swept up by Dell this week in the largest tech deal ever, with company executives saying it will retain a good deal of autonomy to carry out its strategic plans.
One of the most popular models for analyzing cyberattacks doesn’t focus enough on what to do after adversaries break into networks successfully, which they inevitable will do, Black Hat 2016 attendees were told this week in Las Vegas.
Jie Zhang says that as a child in China she played a game picking up marbles with chopsticks and performing the delicate task of carrying them to another room without dropping them. That’s what doing business in China is like for Westerners, she told a breakfast gathering today at Gartner’s Security and Risk Management Summit.
Gartner: Colin Powell says he used insecure email during State Department tenure; Oh and we should vote out Congress
Former Secretary of State Colin Powell acknowledged using insecure email during his tenure at the State Department – but as a way to create more immediate communication among those within and outside the department.
- CCData Management OfficerNSW
- CCPHP DeveloperQLD
- CCSenior Business AnalystNSW
- CCNetwork Data EngineerVIC
- FTEngineer Control Systems SpecialistSA
- CCWeb Applications Project ManagerVIC
- CCOperations Manager - Data CentreWA
- FTService Delivery ManagerVIC
- FTSecurity Leads - $800 per dayOther
- FTCyber Security Governance SpecialistOther
- CCProject ManagerVIC
- CCSenior Project CoordinatorNSW
- CCControl Systems SpecialistACT
- CCSenior Business AnalystNSW
- CCNetwork Engineer -VoiceVIC
- CCSenior Business Analyst x2 (Digital Transformation)NSW
- CCTechnical Testers ? API testingQLD
- FTSales ManagerVIC
- CCManager - Business Intelligence - TelcoVIC
- CCProject ManagerNSW
- FTTest Analyst (SAP)SA
- CCAutomation Designer (Solutions Architect) - Robotics (RPA) - SydneyNSW
- CCDevelopment SpecialistNSW
- CCSolution Architect ? Office 365 MigrationQLD
- CCDesktop Support EngineerNSW