Tortoise-defense formation of the Spartans  >  warfare / war games / red team binary target / attack

Unsigned firmware exposes millions of Lenovo, Dell and HP PCs to attacks

Security researchers have found multiple PC and laptop components that don’t require cryptographically signed updates are putting millions of Linux and Windows machines to attacks.   

AustCyber release

New AustCyber-funded projects target key cybersecurity industry pain points

Second round Projects Fund allocations will split $8.5m among 17 industry projects


Lack of firmware validation for computer peripherals enables highly persistent attacks

Vulnerabilities in unvalidated peripheral firmware such as WiFi adapters, cameras, and network interface controllers give attackers control over systems.


hot / new / abstract technology / laptop / flames

12 hottest new cybersecurity startups at RSA 2020

Cybersecurity startup companies use the RSA Conference to make their public debut and showcase their products. These are some of the more interesting startups coming out of stealth.

CSO  >  security threats / laptop bombarded by attacks

Malware detections dropped more last year in Australia than anywhere else

Australia and New Zealand users bucked global trends in 2019 as the volume of cybersecurity threats dropped 14 percent last year, according to new analysis that also found Mac threats outpacing Windows threats for the first time...

intel cybersecurity bg 1920

The week in security: Lifting the bushel on cybersecurity’s light

Cybersecurity is of the shadows, surfacing quiet discussions that used to be held in out-of-the-way meetings.

Insider Pro | Computerworld  >  Salary Survey [2020]

IT Salary Survey 2020: The results are in

Insider Pro reveals the current salaries for dozens of tech titles, details about IT workers' top concerns, the state of the tech hiring and the tech specialties raking in the biggest compensation.

CSO > A man holds a magnifying glass over the terms of a document / contract / insurance / invoice

5 things you should know about cybersecurity insurance

Understanding what it can and can't do for your business is critical to getting the most out of a cyber insurance policy.

Conceptual image of executives; silhouettes in motion with a virtual global network overlay.

The CSO's playbook for forging board relationships

Security is a board-level concern, but many aren’t confident they have the information and processes to provide effective governance. This nine-point plan will help you cement your role as a trusted advisor.

audience listens to speaker lecture at a conference presentation

The CSO guide to top security conferences, 2020

CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you.


computer crime scene / hacked / infected / cybercrime / cyberattack

Australia FBI’s fifth largest source of cybercrime reports in 2019

Cybercrime victims in Australia were behind the fifth largest number of complaints to the US Federal Bureau of Investigations (FBI) in 2019.

A hook is cast at laptop email with fishing lures amid abstract data.

What is phishing? How this cyber attack works and how to prevent it

Phishing is a method of trying to gather personal information using deceptive e-mails and websites. Here's what you need to know about this venerable, but increasingly sophisticated, form of cyber attack.

CSO > Password elimination [conceptual password security lock in a trash bin]

The 25 worst passwords of 2019, and 8 tips for improving password security

Blacklist these 25 passwords now and use these tips to improve enterprise password security.

DDOS attack

DDoS explained: How distributed denial of service attacks are evolving

A distributed denial of service (DDoS) attack is when attackers attempt to make it impossible for a service to be delivered, typically by drowning a system with requests for data. They have been part of the criminal toolbox for twenty...

cyber security lock padlock firewall code breach password

The OPM hack explained: Bad security practices meet China's Captain America

How the OPM hack happened, the technical details, and a timeline of the infiltration and response.