Advertisement

Toy soldiers + binary code / wargames / cyberwarfare

Following PM’s warning, Australian industry weighs the real threat from China

Conflict with China escalates on all fronts, online and off, as Australia fast-tracks cyber security investment.


binary target

5 tips to protect legacy applications on Windows networks

You're probably running legacy applications somewhere, and attackers see them as vulnerable targets. This advice will harden legacy apps against threats.


Binary code data flows through the cracked seal of a vault.

John the Ripper explained: An essential password cracker for your hacker toolkit

One of the oldest password cracking and testing tools, John the Ripper is still an essential pen testing tool.


Advertisement

australian money piles of cash currency colorful denominations by enjoynz gettyimages 477047608

How Australia will spend $1.4 billion for its new cyber security effort

The new CESAR programme funds a 500-strong cyber army to protect and response, as Australia faces escalating nation-state threats — but some question the government-first approach.


Glowing blue montage of hand keying in password at ATM

Vulnerable drivers can enable crippling attacks against ATMs and POS systems

Newly discovered vulnerabilities could allow more persistent and destructive attacks on popular models of ATM and POS devices.


A hand moves a pawn through a conceptual maze of circuits. [navigating/negotiating/strategy/tactics]

10 essential negotiation tactics CISOs should know

Lose that winner takes all mentality and build your negotiation muscle with advice from security leaders and negotiation experts.


A macro shot at the pixel level of a browser displays 'https' and a glowing lock in the address bar.

6 ways HTTP/3 benefits security (and 7 serious concerns)

HTTP/3 brings improved performance and reliability, along with various security and privacy benefits, but there are some noteworthy challenges.


cloud security shield with checkmark / cloud / digital connections / cloud security expert / CASB

How do you secure the cloud? New data points a way

New reports show big differences in risk among public, private and hybrid cloud deployments. Here’s advice on the tools, information and organizational structure needed to execute a successful cloud security strategy.


CSO slideshow - Insider Security Breaches - Flag of China, binary code

Data security risks threaten approval of Chinese undersea cable plan

The US government's "Team Telecom" wants to partially deny a proposed undersea cable connection between the US and Hong Kong over surveillance, data theft concerns.


A woman works from home with an abstract binary overlay in the surrounding environment.

Free security resources for work-from-home employees during the COVID-19 crisis

Some security vendors are stepping up to help organizations better protect their networks as employees must suddenly work from home.


Advertisement

cyber security key lock keyboard

NSW to launch new cyber vulnerability response centre

Bathhurst facility to open in July, part of $240 million state effort.


Tools + binary code
InfoSec at Your Service

10 (more) free security tools worth a look

Security pros have a lot to juggle, but look in the right places and you can find invaluable assistance for free.


CIO | Middle East  >  A woman uses a mobile phone amidst abstract binary data and processing arrows.

Want better mobile security or privacy? Try these Android and iOS alternatives

GrapheneOS offers hardened security over Android, while /e/OS locks down your private information. The main trade-off for both is fewer apps.


A digital bomb with lit fuse in an environment of abstract binary code.

Brute-force attacks explained, and why they are on the rise

The surge in remote work has rekindled interest in brute-force attacks, but a few simple steps can make your organization less of a target for them.


A laptop user works securely behind a firewall.

How to optimize Windows Firewall security

If you're ignoring or have disabled Windows Firewall, you might be missing out on some good, basic protections that are easy to set up and maintain.