CFOtech Australia - Technology news for CFOs & financial decision-makers

Opinion stories - Page 265

Thinkstockphotos 612237188 1

What we can learn from the Google Docs hack

Fri, 12th May 2017
#
malware
#
phishing
#
email security
Remember, don't be embarrassed about falling victim. The more we talk about how these things happen the better we will be.
Thinkstockphotos 513704129

The do's and don'ts of responding to ransomware

Thu, 11th May 2017
#
malware
#
ransomware
#
cybersecurity
Ransomware set to increase in volume and variety in 2017, but a smart incident response strategy can help prevent losses.
Thinkstockphotos 594060406

The importance of integration in enterprise applications

Tue, 9th May 2017
#
uc
#
digital transformation
#
martech
Tech's evolution ushers in the era where seamless integration is vital for enterprise success; firms race to adapt.
Thinkstockphotos 674565164

DDoS: How Big Data can help combat a real and prevalent threat

Mon, 8th May 2017
#
ddos
#
data analytics
#
martech
DDoS attacks are becoming more and more prevalent. More than 2000 attacks observed every day force thousands of websites into shutdown.
Thinkstockphotos 616890412

Fingerprint security & biometrics: Three major myths busted

Mon, 8th May 2017
#
malware
#
biometrics
#
cybersecurity
Contrary to what many people assume biometric readers aren't foolproof. They have their own set of unique vulnerabilities. Fingerprints can be stolen.
Thinkstockphotos 580096052

Mandatory Data Breach Reporting – what you need to start doing right now

Mon, 8th May 2017
#
breach prevention
#
cybersecurity
#
law
Take heed or be caught out - Cyber-Risk puts together some tips to help you prepare for the breach reporting laws.
Thinkstockphotos 676380064

No favourites here: What makes up the art of cybersecurity warfare

Mon, 8th May 2017
#
malware
#
ddos
#
ransomware
90% of major Australian businesses and government agencies have been targeted by cyber attacks in the past year.
Thinkstockphotos 497906538

Firebox Cloud: Public cloud security for small and midsize businesses

Mon, 8th May 2017
#
malware
#
firewalls
#
network infrastructure
Small and midsize firms bolster cyber defences with Firebox Cloud, bringing enterprise-level security to the public cloud.
Trail blazer

EXCLUSIVE: Trends in the UC industry and how resellers can capitalise on them

Mon, 8th May 2017
#
uc
#
martech
#
ai
Recently we spoke with tech stalwart Randy McGraw on trends in the unified communications industry and just how the channel can capitalise on them.
Thinkstockphotos 672446342

Arbor Networks: Beware of headline risk with DDoS attacks

Fri, 5th May 2017
#
ddos
#
stock exchange
#
arbor networks
DDoS myths debunked: Arbor Networks stresses the danger of headline-induced misconceptions and the necessity for robust defence strategies.
Thinkstockphotos 479631160

Fake Chrome extensions inject code into web pages

Tue, 2nd May 2017
#
malware
#
digital entertainment
#
cybersecurity
Recently, here at our research lab, we have seen an increase in the number of JS/Chromex.Submelius threats detected.
Thinkstockphotos 674757016

Carbon Black: How to set up a threat hunting program

Mon, 1st May 2017
#
endpoint protection
#
edr
#
threat intelligence
UK firms urged to proactively hunt cyber threats by mastering OS intricacies and tailoring threat hunting teams to bolster digital defences.
Thinkstockphotos 545662400

When innocent mistakes turn into costly problems

Mon, 1st May 2017
#
endpoint protection
#
edr
#
hackers
70% of firms faced pricey security breaches due to compromised accounts, careless misuse, or malicious insiders—only 1% were unscathed.
Roi abutbul   from raw data to actionable intelligence the art and science of endpoint security

From raw data to actionable intelligence: The art and science of endpoint security

Fri, 28th Apr 2017
#
ai security
#
ai
#
microsoft
The endpoint is vulnerable. That's where many enterprise cyber breaches begin: An employee clicks on a phishing link and installs malware.
Thinkstockphotos 491324833

Young cybercriminals 'more motivated by peer respect than financial gain'

Thu, 27th Apr 2017
#
malware
#
ddos
#
cybersecurity
An increasing number of young cybercriminals are motivated by a sense of notoriety and popularity with their peers rather than financial gain.
Thinkstockphotos 670632126

Unlocking the future of IoT: Five key areas to watch

Thu, 27th Apr 2017
#
ddos
#
data analytics
#
martech
Here are a few trends that make me hopeful that we're now entering a time when IoT deployments will be increasingly effective - and widespread.
Thinkstockphotos 512691636

Carbon Black asks: So what exactly is threat hunting?

Wed, 26th Apr 2017
#
malware
#
semiconductors
#
cybersecurity
​Information security professionals used to put all of their chips towards incident prevention. This didn't work out very well.
Thinkstockphotos 655400970

Talend: The reality of the artificial intelligence revolution

Wed, 26th Apr 2017
#
robots
#
uc
#
martech
Talend's Jason Bissell demystifies AI, citing its growth in Asia and promising advancements in both daily life and scientific discovery.
Brainstorming

Why businesses need innovation to stay relevant, and how they can start

Mon, 24th Apr 2017
#
opinion
#
iofabric
In a world where innovation is key, businesses must ditch complacency and challenge the status quo to stay afloat.
Thinkstockphotos 642442154

Women in cybersecurity: Slowly but surely, change is coming

Mon, 24th Apr 2017
#
malware
#
cybersecurity
#
opinion
Strides in diversity: Women are breaking barriers in cybersecurity, shifting the industry's gender dynamic for the better.