- Security is everyone’s business
- US charges Dridex banking trojan operators, offers $5m bounty
- Prediction #5: Application Programming Interfaces (API) Will Be Exposed as The Weakest Link Leading to Cloud-Native Threats
- Prediction #4: DevSecOps Will Rise to Prominence as Growth in Containerized Workloads Causes Security Controls to ‘Shift Left’
- Prediction #3: Ransomware Attacks to Morph into Two-Stage Extortion Campaigns
C2
Latest Stories about C2
- Fileless Powershell malware uses DNS as covert communication channel
- The secret behind the success of Mirai IoT botnets
- IoT botnets powered by Mirai continue to grow
- Researchers dismantle decade-long Iranian cyberespionage operation
- Cuba works to join the global economy, and IT sees a golden opportunity
- Cloud Security Training and Certification
- Make a $40 Linux or Android PC with new Raspberry Pi 2 rival
- Sprint sells Apple Watch, but beware fine print in 'iPhone Forever' deal
- PoS malware also targeting ticket vending machines and electronic kiosks
- Telstra breached privacy of over 15k customers: Privacy Commissioner
CSO
Computerworld
- Mozilla in trouble? 2018 revenue fell 20%, expenses exceed income for first time
- Microsoft’s JEDI contract move: Those are not the cloud providers you’re looking for
- How this broker business cut email use by 30% after Slack rollout
- Microsoft names its next Windows 10 upgrade: '2004'
- Blockchain and IoT combo could reduce food fraud by $131B in 5 years
ARN
Techworld
CMO
- Treasury Wine Estates appoints Aussie marketer and leader to president of Americas
- WPP finalises Kantar sales to strengthen balance sheet
- 4 brand leaders building the bridge between marketing and customer service
- Price Attack’s customer transformation to build growth and loyalty
- How customer experience is making the difference for Dan Murphy's