Advertisement

CSO  >  Android antivirus conceptual image

Best Android antivirus? The top 8 tools

There are plenty of antivirus tools for Android. Here's how the top 8 measure up in protection, usability and features.


Selecting the right people.

Security Recruiter Directory

To find the right security job or hire the right candidate, you first need to find the right recruiter. CSO's security recruiter directory is your one-stop shop.


Ransomware  >  A masked criminal ransoms data for payment.

Ransomware: Toll deliveries recover but wool industry gets snagged

The latest ransomware attack delays wool trading in Australia and New Zealand, while logistics provider Toll partially recovers from a January attack


Advertisement

virus specimen / world map / binary code

A security guide for pandemic planning: 7 key steps

Every security operation should be asking whether they are prepared for a pandemic in the wake of the coronavirus (COVID-19) outbreak. Start by focusing on these areas.


Cybersecurity  >  Attack warning / danger / security threat

What is a cyber attack? Recent examples show disturbing trends

A cyber attack is an attack launched from one or more computers against another computer, multiple computers or networks. Here are some of the major recent cyber attacks and what we can learn from them.


CSO Exectutive Sessions
CSO Executive Sessions

Episode 4: Reducing risk vs. enabling the business: finding the balance

Podcast Episode 4: Listen now as Lionbridge CSO & CPO Doug Graham talks about the most concerning part about the CSO role -- correctly presenting risk options to the rest of the leadership team.


Scripting code displays on a laptop in a dark room.

How to prevent scripting attacks in Microsoft Office

The rise in phishing attempts requires another look at your Microsoft Office settings to minimize the risk of a user executing a malicious script.


Ransomware

ASD warning: DDoS extortion attacks threaten Aussie banks

The attack claims so far seem empty, but the threats mirror actual attacks that have been carried out elsewhere


RSA 2020's hottest products

Hottest new cybersecurity products at RSA Conference 2020

The annual RSA Conference is a key venue for companies to showcase their new cybersecurity products. Here are some of the more interesting tools to check out.


Chain links secure multiple data stream segments.

Review: Achieving enlightened segmentation with Illumio

While segmentation is a powerful defensive tool, it’s also difficult to manage and can easily break applications that need to communicate with other services or the outside world. The Illumio platform solves many of these headaches.


Advertisement

mobile security

8 mobile security threats you should take seriously in 2020

Mobile malware? Some mobile security threats are more pressing. Every enterprise should have its eye on these eight issues.


data blocks / code encryption

ASIO head: Oz anti-encryption law swiftly used, didn’t break internet

Mike Burgess, chief of the Australian Security Intelligence Organisation (ASIO), has once again defended Australia’s new encryption laws as lawmakers seek new rules for judicial oversight.     In his first threat assessment...


cia triad security triangle glowing binary process by nolimit46 getty 2400x1600

The week in security: Time to reconsider your security architecture?

Security experts have warned about credential stuffing attacks for some time – but new research suggests that the APIs used by cloud-based services are becoming facilitators for those attacks, particularly in the increasingly-open...


Kali Linux logo / gears / binary data

Kali Linux explained: A pentester’s toolkit

Kali Linux is the most popular penetration testing Linux distro, and jam packed with almost every offensive security tool you can think of.


digital twins ai robots mirror image duo pair toy robots

How Kasada fights back against bots

Australian-based company Kasada seeks to undermine the economics of malicious automation