When mixing personal and professional tasks on your smartphone, it's inevitable that someone is going to accidentally stumble onto malware. The SANS Institute's Chris Crowley has some advice on how to avoid trouble.
Stories by Ryan Francis
An overzealous Web surfer brings employee training to the forefront. See how they have tightened up the network.
After leaving Exabeam at the end of the workday, Ryan Benson’s mind doesn’t shut off when it comes to thinking about designing new defenses against Black Hats. See what his day looks like.
A survey sponsored by Check Point found that 64 percent of respondents are doubtful that their organization can prevent a mobile cyberattack. What can be done to combat that?
In the matter of the Dyn situation, it was those Internet of Things devices that created the voluminous distributed denial of sevice attack. A DVR was used to attack Dyn’s network. To reduce the impact of such attacks, officials at InsuranceQuotes have noted some of the more popular smart home gadgets in your home that could be vulnerable.
The National Association for Information Destruction (NAID) found in a recent study that 40 percent of the devices that bought from secondhand markets had PII on them.
New and dynamic authentication factors can help prevent identity theft. The idea of using a fingerprint reader to log on to a smartphone is nothing new, but the latest wrinkle is the pressure with which that finger pushes on the reader.
A consortium was recently created to make sure that your car stays on the road and in your control.
Verizon releases its annual breach report that puts the reader in the driver's seat.
Remember when all you had to worry about with your car is getting an oil change every 3,000 miles. Today’s connected cars are miles ahead technologically speaking of those “dumb” vehicles, but drivers could see a bumpy ride if thieves get a hold of the data the car possesses. See how things have changed.
Experts offer differing opinions on where cloud security is headed.
As if holding your data hostage and seeking cash payment weren’t harsh enough, security experts foresee the next stage of ransomware to be even worse.
There is much uncertainty surrounding the security industry for 2017. Many of the trepidations of experts in the field are directly connected to what the nation’s next president will do. Find out what else worries them.
There are a million things to worry about but these chief security officers provide advice on how to start off on the right foot.
It’s no longer about whether or not you’ll get attacked, it’s about knowing what the repercussions are and if you have the right controls to minimize or completely eliminate the fallout. In order to be able to do this effectively, you need be attuned with your network controls and architecture. VArmour CEO Tim Eades offers a few questions decision makers should be asking to ensure they keep their organizations from being the next Yahoo.
- CCService ManagerVIC
- FTNetezza Developer - Brisbane locationNSW
- FTSenior Cisco Unified Communication Solution ArchitectQLD
- FTSecurity ManagerOther
- CCJunior ? Mid Level Test LeadQLD
- CCChange AnalystNSW
- CCField Services TechnicianWA
- CCFront End Developer, North Sydney, UI knowledge, ReactJS, Adobe ManagementNSW
- CCHealth & Safety Project OfficerNSW
- CC.Net DeveloperNSW
- FTConsulting Java DeveloperQLD
- FTField Supervisor - Pit RemediationVIC
- CCSenior Business Analyst - AMLVIC
- CCTalend Integration DeveloperNSW
- CCSenior .NET DeveloperQLD
- CCSenior Oracle Developer - Telecom domainVIC
- CCChange Manager - Australian TelcoVIC
- CCProgram DirectorNSW
- FTSystem Administrator/ Level 3 SupportQLD
- FTSalesforce Consultant - SMEVIC
- FTGun Java Developers wantedVIC
- FTSenior Security EngineerOther
- CCProject ManagerNSW
- CCIT Project ManagerNSW