Hacking Team, a firm best known for helping governments spy on their citizens, has been hacked. Here's a curated look at the documents, contracts, and code discovered by researchers sorting the data online.
Stories by Steve Ragan
Common Phishing techniques were less effective last year, so criminals changed their game in order to adapt
While having instant access to your information via the Cloud is a major bonus to productivity and convenience, there's a risk that the security trade-off will be too high.
Black Duck Software presents 5 tips for a secure enterprise relationship with open source.
Signal-to-noise ratios are hard to manage. As a security professional, you want the threat data, you want the attack notifications and alerts, and you need intelligence. But, when there's too much coming in, those alerts and notifications fall to the wayside. They're easily dismissed and ignored.
Yahoo has offered a public status update for their various encryption projects, including an announcement that a new, encrypted, version of Yahoo Messenger will be released in the coming months.
IT professionals, security experts, and researchers have traveled to Sin City this week, in order to attend the annual Black Hat security conference. While many of the presentations and demos at Black Hat will focus on trends and the latest technological advances for those who attack the network and those who defend it, there isn't much on the topic of incident response.
According to a recent study, security-related pressures in IT have climbed steadily year-over-year, as security professionals face the constant strain that comes with defending their organization's network and data from assortment of threats from all sides.
Just before the Christmas holiday, CSO offered five strategies the help mitigate post-holiday BYOD problems. Now that employees are returning to work, shiny new devices in hand, here's some additional insight.
We recap the biggest security news from this past year
Christmas is fast approaching. Now, and after the office is back to normal after the first of the year, employees are going to return with several shiny new gadgets, along with the expectation that they'll "just work" in the corporate environment. Security will be a distant afterthought, because it's still viewed as a process that hinders productivity.
A paper released earlier this month by a group of security researchers has outlined the technical details behind a potential Computer Network Exploitation (CNE) program likely used by the U.K. Government Communications Headquarters (GCHQ) and their American counterpart, the NSA.
Symantec has downsized their Managed Security Services portfolio, ending support for the managed firewall and managed endpoint offerings. S
Microsoft isn't happy, and their top lawyer had plenty to say about protecting customer information this week in a blog post that announced the company's efforts to implement wide-reaching encryption.
JPMorgan Chase & Co. has said they plan to issue breach notifications to nearly 500,000 customers, or two percent of the bank's 25 million UCard users, after hackers breached their network in July. However, because there's no evidence that funds were stolen, the bank will not issue replacement cards.
- Technical Analyst, Cybercrime Operations VIC
- Voice Engineer ACT
- Technical Analyst, Cybercrime Operations ACT
- CRM Support Developer WA
- SQL Server Developer QLD
- Senior Environment or Platform level Environment Managers VIC
- RF Engineer - Melbourne Based, Start ASAP VIC
- iMIS Administrator NSW
- SAP HR / Payroll Analyst SA
- Junior / Mid level Hogan Technical Consultant - Brisbane VIC
- Free Whitepaper! Learn how to create an analytics environment that is governed, scalable and self-serve.
- Free Whitepaper! Learn how IT is evolving from producer to enabler, and fostering collaboration around analytics.
- Free Whitepaper! The 5 criteria to help you select the right analytics platform for your organization.