InfoSec World 2014 features over 70 sessions, dozens of case studies, 8 tracks (including a Hands-On Track), 11 in-depth workshops,...
Showing results 1 to 20 of 106
Another annual dollop of delicious data shows that despite all the trendy new twists and exotic malware threats, we're still getting the security basics wrong.
In one of three cloud security whitepapers released by Leviathan Security Group today, the firm revealed infosec's problematic hiring arc -- where solutions appear ruinous, at best.
Infosec aficionados and other geeks may not like the Australian government's new cybersecurity awareness video, but it's just what we need to make everyone's life easier.
The global infosec mind shift must be translated into a budget shift, says Deloitte, and organisations that hold back on this change will suffer worse.
The Internet of Things may mean a bigger workload for infosec practitioners, but 2015's real challenges will be the rapidly changing political landscape and the shortage of skilled professionals.
It`s not a common knowledge that even after a full deletion of files, either skipping the recycle bin or directly from it, your files...
Hollywood's new cybersecurity film Blackhat opened this weekend and bombed hard, despite high praise from infosec elites.
Myriad new connected devices may represent an easy target, but criminals are still making plenty of money by hacking what they've always hacked. So why bother with Refrigergeddon?
Oryon C Portable is a web browser designed to assist researchers in conducting Open Source Intelligence investigations. Oryon C comes...
Security checklists like the Australian Signals Directorate's Top 4 Mitigation Strategies are valuable, but to treat them as universal compliance mechanisms is a mistake. A risk-based approach is essential.
The supposed Dropbox hack that's really a five-cent scam tells us something important: Information security shouldn't be here, and it's mostly the cloud providers' fault.
Australia’s spending on information security is hit to hit almost AU$2 billion in 2014, according to the latest research by Gartner.
Australian businesses shouldn't have to clean up after other organisations' infosec oopsies. It’s time to get tough about data breach notification.
With less than a month until Black Hat USA 2014, we've got a cheat sheet of hot talks lined up for the professional infosec industry's most contentious domestic conference.
Information security is no laughing matter. That is, unless you're one of many infosec accounts on Twitter trying to be funny.
A survey asking Australian security professionals to rank their security has found that most of them failed themselves on their ability to respond to and protect their own businesses.
Changes to the Australian Government's protective security policies has meant that all government departments must put in place the top 4 information security strategies defined by the Defence Signals Directorate.
Bug bounties are now being viewed as contributing to the CISSP information security accreditation, with an Australian startup leading the way in the new practice.
Cyberwar is overhyped. The clear and present danger is the increase in criminal activity. And while mobile devices are vulnerable, they may also represent our chance to get information security right.
Classic information security defences aren't up to the task of facing the latest fashions in attacks, according to Sourcefire founder and CTO Martin Roesch.
Western Australia's agencies are not fixing critical information system vulnerabilities that could compromise security and cause service disruptions, according to WA Auditor General Colin Murphy.
A hacker has compromised a server holding social security numbers and credit card information belonging to South Carolina residents, but the state is not going to go down without a fight.