Analytics, big data, automation, and machine learning are all terms we use when talking about the future of cybersecurity. As the volume of security data increases, data science will become an important weapon to disrupt adversaries....Show More Summary
The tech giant has released a set of new tools to help developers tackle common XSS vulnerabilities.
New research suggests that SMBs have a long way to go before getting up to speed with today's cyberthreats.
The ASX has completed a prototype post-trade solution using blockchain technology, and is looking to make a final decision on whether to implement it at the end of 2017.
Australia has jumped Singapore to come fourth on the Australian Strategic Policy Institute's annual cyber maturity metric, but the country needs to act on its Cyber Security Policy promises to maintain its position.
Process, culture and employee trust are critical to deterring insider threats, according to FBI CISO Arlette hart.
At Structure Security, automation, machine learning and artificial intelligence were key themes. Here's a look at the key takeaways.
For years, thousands were tricked into buying low-quality ebooks.
The lawmakers asked how it took two years to discover the "large intrusion."
A new strain of this two-year-old ransomware takes advantage of users syncing and sharing to spread infected files through their network.
Mozilla has proposed to stop trusting new digital certificates from Chinese certificate authority WoSign for one year.
The startup will use the investment to launch its debut security solutions in the US and Europe.
The US government is looking into whether Yahoo should have disclosed the attack to investors and the public earlier.
The tools may have been mistakenly left behind by the NSA following an operation.
Microsoft officials said Windows 10 has hit the 400 million 'active' device milestone, up from 300 million in early May.
New ransomware family discovered by takes aim at government targets
Data is leaking out of your organization: accidentally or intentionally, by internals or externals, physically or electronically. During the past year, we have performed extensive research to identify what data is being targeted, who is taking it, how they are getting it out, and the best practices to reduce your exposure to data loss. Show More Summary
Google's Project Shield has come to the rescue after a devastating DDoS attack prompted Akamai's pro bono support to end.
The 20-year-old hacker leaked military data belonging to 1,300 US military and government staff in support of the Islamic extremist group.
The Australian Bureau of Statistics blames everyone but itself for the failures of the 2016 Census. That's a sign of weak and out-of-touch management.