In Pictures: 7 commonly overlooked ways to tighten cybersecurity
It's OK to be paranoid about every last detail when it comes to security.
It's OK to be paranoid about every last detail when it comes to security.
Security planners are racing to close gaps across networks and ICT infrastructure. But they have overlooked a Trojan horse already inside the gate, Attorney-General, George Brandis has warned.
Although a mining pool last month managed to briefly control the majority of the computing power used to generate the Bitcoin crypto-currency, a so-called '51 per cent attack' remains unlikely.
Startup NetCitadel today launched with a product called OneControl intended to automate what might otherwise be manual research and changes related to configuring firewalls, switches or other gear when virtual-machine (VM) workloads are spun up or down in enterprise data centers or cloud environments.
There's a need to rely and trust forces outside our direct control for security -- and that awareness spurred the United Kingdom's national infrastructure protection authority to push for a standard way to model the implications of relying on technology, services, people and more.
It's sad but true that some of the world's best minds in computing have dedicated themselves to creating new ways to attack information technology infrastructures. The assaults have resulted in a significant cost factor in enterprise computing, influencing the purchasing decisions both for general-purpose processing, storage and networking products and for specialized security hardware, software and services.
Earlier this week Richard Stiennon published an article that questions the value of risk management in IT, and I would argue that, although risk management presents challenges to IT, best practice-driven approaches leveraging aspects of risk management are essential to good security.
At a time when the cyberthreat level is at its peak, many federal agencies continue to struggle with IT security.
New South Wales government departments have been given a clean bill of IT security health by the Auditor-General, but several recommendations for future preventative care have been issued.