Last week’s big malware outbreak caused a lot of damage, but organizations that made good decisions ahead of time weren’t affected.
Stories by Ira Winkler
Many experts say that people are more important than process in the IT security world. That is politically correct, as opposed to actually correct.
The detention of Norway’s former prime minister, when stripped of politics, was an example of proper security awareness.
Just when the world seems ready to listen to us, we give it a display of epic bickering.
The game is getting its players off the couch, which already wasn’t safe from the bad guys.
Breaches that weren’t have gotten a lot of attention — and that’s not such a bad thing.
Iranian and Chinese governments directed and funded attacks, so why are Iranian and Chinese citizens being charged instead of the governments that directed their actions?
Apple is trying to position itself as a staunch defender of citizens’ privacy. But when you extend its arguments to their logical conclusion, it comes out looking like the company is incapable of protecting its secrets.
The truth behind the hype and misunderstandings surrounding the case.
The conference organizers didn’t expect the outrage that followed the scheduling of a session on the TV series <i>CSI: Cyber</i>. They should have, though.
Sometimes I wonder whether any company will ever fall victim to an unsophisticated cyberattack. Because after every attack that comes to light, we hear that same excuse: It was a sophisticated attack.
Maybe I should be outraged by Sony's decision not to distribute the movie <em>The Interview</em>, but I am merely saddened by it. I am saddened that a hacking incident with all the hallmarks of a simple case of extortion has been distorted so it looks like a terrorist threat.
I am asked probably twice a week to help somebody get a job in the <a href="http://www.computerworld.com/category/security0">security</a> profession. Unfortunately, I can't help that many people individually, but perhaps this article will allow me to help many people all at once.
An approach that has worked for centuries in all sorts of industries is just as applicable to the security field.
The storyline that a single point of failure allowed a sophisticated attacker to steal millions of card numbers from Target just doesn't hold up.
- Technical Infrastructure SME - VMware / Storage/ Backup NSW
- Mobile Applications Developer (Brisbane) ACT
- Multiple Pega Resources Required - Developers & Architects NSW
- MessageQueue/DataPower Administrator NSW
- Java Developer NSW
- Network and Security Engineer Other
- Linux Administrator NSW
- Mid-Level Oracle SQL Developer NSW
- RPA Developer / Consultant - Contract Initially - Sydney NSW
- SCOM Specialist QLD