Quantcast
Channel: CSO Online - Cylance RSS feed
Browsing latest articles
Browse All 42 View Live

Popular hotel Internet gateway devices vulnerable to hacking

Some Internet gateway devices commonly used by hotels and conference centers can easily be compromised by hackers, allowing them to launch a variety of attacks against guests accessing the Wi-Fi networks.

View Article



Windows vulnerability can compromise credentials

A vulnerability found in the late 1990s in Microsoft Windows can still be used to steal login credentials, according to a security advisory released Monday.

View Article

Sony hackers targeted employees with fake Apple ID emails

Hackers probably gained access to Sony's network last year after a series of phishing emails aimed at system engineers, network administrators and others who were asked to verify their Apple IDs, a...

View Article

Startup Barkly touts light, fast endpoint protection

Barkly, a startup in endpoint security, has now banked enough investment money to keep it going for two more years and plans to launch its first products sometime in late 2015.

View Article

Next-generation endpoint protection not as easy as it sounds

Rather than looking for signatures of known malware as traditional anti-virus software does, next-generation endpoint protection platforms analyze processes, changes and connections in order to spot...

View Article


​Smarter End-point protection: Stuart McClure from Cylance

A lot of security books are written. Stuart McClure, CEO of Cylance, is the author of “Hacking Exposed: Network Security Secrets and Solutions”, the best selling computer security book ever sold

View Article

As security vendors double down on ANZ, businesses must tap resources to...

The looming opening of Cisco Systems’ new ANZ headquarters is the latest in a series of investments that confirm security vendors are serious about establishing themselves within the increasingly...

View Article

Machine learning: what it is, and what it isn’t

In 1959, an IBM employee by the name of Arthur Samuel programmed a computer to play checkers against him. Over time, the program was able to collect data, strategise and win a game all by itself. And...

View Article


Forget detection: in Security 2.0, visibility is the key to long-term protection

With specific-purpose tools becoming obsolete within years, long-term vision requires better views of extending networks

View Article


AI/ML seen as important as staff as businesses evaluate their still-lagging...

Australian businesses recognise that they are under fire as rising attack rates strain their inadequate incident response plans – but 62 percent believe the main reason is a lack of investment in...

View Article

Effective security starts from the inside

The need to see eye to eye with board members and business executives about information security has been background noise during the tenure of many a CISO.

View Article

Hitting the refresh button on the cybersecurity industry

When a code red—or even a code yellow—hits an organisation, security teams are among the first to know.

View Article

Burned malware returns, according to Cylance: is Hacking Team responsible?

Burning malware is like Hercules fighting the nine-headed Hydra. For every head he cuts off, two more grow back in its place.

View Article


Cylance researchers discover powerful new nation-state threat

A new APT, dubbed White Company, is flexing its muscle on the world stage, and it has security researchers worried.

View Article

The week in review: Cybersecurity breaches named the biggest risk to...

Having caved for a second time, the government’s decision to once again push back its My Health Record (MyHR) opt-out deadline highlighted the ongoing concerns about the security and privacy of data...

View Article

Browsing latest articles
Browse All 42 View Live




Latest Images