COMPANY NEWS: Gigamon, the leading deep observability company, announced a series of breakthrough cybersecurity innovations to the Gigamon Deep Observability Pipeline in its latest GigaVUE 6.4 software release.
Cybersecurity education company Infosec has announced its integration with the recently launched Microsoft Viva Learning platform, aimed at bringing cybersecurity training to Microsoft’s millions of learners worldwide.
GUEST OPINION by George Tsoukas, Gigamon ANZ: While the financial services industry is no stranger to unexpected events and their repercussions, the current global upheaval is creating unprecedented uncertainty. Faced with this, how should financial services organisations respond?
The two most serious cybersecurity events of the decade (thus far), the SolarWinds and Microsoft Exchange Server hacks were recently viewed by local cyber advisors through the lens of global geopolitics. In “Precursors to cyberwar, or are we already there?” watch as three expert members of the Cybersecurity Advisors Network (CyAN) share their perspectives.
Whenever one picks up a book with an eye to writing about it, one necessarily needs to know the subject matter therein. The recent book This Is How They Tell Me The World Ends — an ungrammatical title if anything — claims to be a book about the zero-day "industry" as per the author, Nicole Perlroth, a staff reporter for the New York Times, who covers cyber security. (I dislike that word "cyber" and will use infosec right through this piece.)
Globally, technology leaders had their 2020 plans interrupted with the year’s massive economic disruption. Those embarking on transformation journeys either had to accelerate with tightened resources while adapting to the changes, or stall their efforts to take stock of how the business might change and adapt.
In the wake of cyber warfare threats, Australian IT staff say they're "frustrated with perceived lack of security awareness and preparedness from their employers", but business leads are still seeing cybersecurity as an ‘IT problem’.
Russian security firm Kaspersky has published a blog post about the alleged threat to Linux from targeted attacks and so-called advanced persistent threats — code for state-based actors — that falls squarely into the category known as FUD.
With humans still one of the weakest links in the cyber security chain, the right cybersecurity awareness training can be the difference between attackers winning, or your multi-layered defences coming to the rescue.
Cyber security entrepreneur and CISO adviser Jane Frankland wants to establish a code of conduct for conferences, saying advancing issues that promote women in IT will benefit the industry as a whole, irrespective of gender.
The head of American security firm Immunity, Dave Aitel, appears to be backtracking on his claims, made in August, that British security researcher Marcus Hutchins had "something to do" with the WannaCry ransomware which hit Windows computers globally in May.
Protecting Data on Mobile Storage Devices, Conseal Server 2.0
Most cybersecurity is making up for weak platforms. We need to address the fundamentals, design platforms that prevent out-of-bounds access[…]
For most developers the security/performance trade off is still the hardest one to tackle, even as the cost of processing[…]
RISC has been overhyped. While it is an interesting low-level processor architecture, what the world needs is high-level system architectures,[…]
There are two flaws that are widespread in the industry here. The first is that any platform or language should[…]
Ajai Chowdhry, one of the founders and CEO of HCL is married to a cousin of a cousin of mine.[…]