Advertisement

alert hacking threat detected

How Superloop reduced false positives with behavioural threat detection

The security team at the Australian telco got its network detection response down from four hours down to one hour a day.


CSO  >  secure mergers + acquisitions / floating puzzles pieces / abstract security mechanisms

Top cybersecurity M&A deals for 2021

The cybersecurity market is hot, and vendors are buying competitors to solidify their position or acquiring other firms to expand their offerings.


danger lurking in mobile binary code

How APTs become long-term lurkers: Tools and techniques of a targeted attack

A new McAfee report details the tools and techniques an APT group used to go undetected on a client network for over a year.


Advertisement

Tech Spotlight   >   Cybersecurity [CSO]   >   Hands gesture in conversation

How CISOs and CIOs should share cybersecurity ownership

CISOs and CIOs weigh in on how their cybersecurity responsibilities are evolving with changes in the business environment and threat landscape.


CSO SecurIT 2021 Event

Virtual Event

CSO Australia Presents a Virtual Event: SecurIT - Australia Under Attack: How can CISOs respond? Cybersecurity experts, including top CSOs and CISOs, will open their playbooks and discuss in granular detail how they’re successfully combating a broad range of security threats.

Social media threat / danger / risk >  Text bubbles interact, one bearing skull + crossbones

Social engineering explained: How criminals exploit human behavior

Social engineering is the art of exploiting human psychology, rather than technical hacking techniques, to gain access to buildings, systems or data.


CIO | Middle East  >  UAE / United Arab Emirates  >  Flag

3 former US intel officers turned cyber mercenaries plead guilty: An insider threat case study

Three U.S. nationals, working as cyber mercenaries on behalf of the United Arab Emirates, have pleaded guilty to exploiting U.S. entities using U.S.-controlled technologies.


managed security service providers

How to find a security-savvy MSP

Not all managed service providers are strong on security. Here's how to weed out those that will put your small- to medium-sized business at risk.


Encrypted blocks of multicolored data cubes rolling out.

Steganography explained and how to protect against it

Steganography is reasonably easy to implement yet difficult to detect, which is why threat actors use it to deliver malware, evade detection, and gain persistence.


Russian hammer and sickle / binary code

Russia is fully capable of shutting down cybercrime

With internet blocks and high-profile arrests, Russia shows it can crack down on cybercrime when properly motivated. New analysis suggests the Biden administration’s sanctions may be providing some motivation.


Advertisement

Tech Spotlight   >   Cloud [CSO]   >   Conceptual image of laptop users with cloud security overlay.

8 top cloud security certifications

Cloud security skills are in high demand. These certs will help you demonstrate your cloud security know-how.


banana peel slip accident mistake fall by rapideye getty

8 pitfalls that undermine security program success

Don’t let these easy-to-overlook mistakes trip up your security strategy.


woman with hands over face mistake oops embarrassed shy by marisa9 getty

Human errors compromising Australian government data more than cybercriminals

Mistakes caused 74% of government agencies’ reported data breaches, the latest OAIC report shows, even as other industries averaged about 30%.


software development / application testing / planning / flow chart / diagram

The case for a SaaS bill of material

A SaaSBOM will provide greater visibility into the components of cloud-based software infrastructure. This proposal shows how to begin to develop one.


iot security startups hot highlights planets rocket lock security

18 cybersecurity startups to watch

Security startups are often innovation leaders that attempt to solve critical and persistent problems. These are some of the most interesting ones to watch as they tackle issues around multicloud security, identity management,...