Do we need vendor allies in the malware arms race?
The complexity of today’s SOC functions means you probably can’t hire and keep a staff with all the necessary training.
The complexity of today’s SOC functions means you probably can’t hire and keep a staff with all the necessary training.
Is the government desperate, feigning desperation or just staggeringly inept?
Apple should never stop improving its vetting process, but some things are clearly the responsibility of the developers.
January 2015 is already winding down, but it's not too late to think about the lessons of 2014. For anyone in information security, 2014 was a year marked by spectacular breaches. It ended with Sony Pictures Entertainment getting its clock cleaned by hackers, <a href="http://www.computerworld.com/article/2865330/fbi-director-again-points-to-north-korea-for-sony-attack.html">quite possibly from North Korea</a>. Wouldn't it be great if 2015 doesn't include the same sort of clock cleaning at your company?
Well that stinks, doesn't it? <a href="http://www.computerworld.com/article/2857134/hackers-demand-sony-pull-the-plug-on-the-interview.html">Sony Pictures goes and scrubs the launch of a $44 million movie</a> after being hacked, potentially by North Korea. Almost reads more like a James Bond plot than a news story, but there it is. And this time, it doesn't seem likely that Bond, James Bond, is going to show up at the eleventh hour to save the day.
Oh no, another zero day is out! No one goes home until it's fixed!
Don't look now, but we've failed to anticipate our attackers' next moves --- again.
Innovation Awards is the market-leading awards program for celebrating ecosystem innovation and excellence across the technology sector in Australia.