CSOC – Cyber Security Operations Centre

The Defence Signals Directorate is the national authority on the security of information across government. DSD provides a range of information security services to ensure that sensitive government electronic information systems are not susceptible to unauthorized access, compromise or disruption. The Cyber Security Operations Centre was established in DSD as an initiative of the Australian Government’s Defence White Paper to mitigate the cyber threat to Australia’s national security. The Centre meets two needs. It provides Defence with a cyber warfare capability and provides a resource designed to serve all government agencies. In the past decade, the growing importance of operations in cyber space has become increasingly apparent. Our national security is under threat from a range of cyber actors. Our adversaries are often well resourced, highly skilled and able to defeat commercially available security solutions.

Spotlight

Cyber Security Alliance

The Cyber Security Alliance - formerly known as the Application Security Forum (Western Switzerland) - is a swiss initiative aiming at increasing awareness around Cyber Security. We organize a yearly conference and have created a community. Over the last 5 years of our existence we have met an amazing number of smart people who contribute to increasing security in Switzerland and around the world. We have decided to create a community to rally all that incredible level of expertise and energy in order to promote the community and offer a 365/365 days round flow of cool information and great events.

OTHER WHITEPAPERS
news image

File Upload Security: The Missing Category for a Comprehensive Security Posture

whitePaper | December 15, 2022

Applications are the backbone of modern business and must be protected. Yet, most organizations have an underserved attack vector — malicious files uploaded to their custom business applications. If internal, external, or third-party files contain malware, they pose a large risk as they traverse through an organization and are stored in local or cloud repositories. Public file sharing platforms are another area where malicious file uploads can cause widespread damage.

Read More
news image

Security Overview Whitepaper

whitePaper | February 6, 2023

All encryption/decryption operations are only performed by RoboForm locally on user’s devices and never on the RoboForm Server. RoboForm Data Objects and other user data is never sent to the Server in an unencrypted form. All communication between RoboForm Clients and Server are conducted over encrypted channels only.

Read More
news image

Embracing Security Operations in the Educational Sector

whitePaper | December 22, 2022

Nearly every part of the educational sector has fallen victim to a cyberattack, from elementary schools to universities. Securing education is no longer a “nice to have” but a “must do” and is a growing concern among the global educational community. Creating and maintaining effective information security and cybersecurity operations in education comes down to people, processes, and tools. It’s crucial for IT and security leaders across the entire spectrum of educational institutions to find the right balance between the three. While there are success stories of achieving that balance, there’s always more to do to identify, understand, and mitigate cybersecurity risks to these organizations. Establishing and improving existing cybersecurity operations must become a priority.

Read More
news image

Dell VxRail: Comprehensive Security by Design

whitePaper | September 29, 2022

In today’s world, business organizations and individuals have become accustomed to accessing the information they need 24 hours a day, seven days a week, often within seconds of making a request. To illustrate, an ad marketing study conducted by Google found that 53% of website sessions are terminated if pages take longer than three seconds to load.

Read More
news image

Secure by Design: Lexmark Print Devices

whitePaper | October 27, 2022

As organizations enhance the security of their infrastructure and move towards security methodologies and strategies, such as, Secure Access Service Edge (SASE), defense in depth, assume breach, and zero trust to provide tighter access controls, the print infrastructure must also adapt. It must become a strategic initiative to secure the print infrastructure and consider both internal and external threats. Data has become a cornerstone for innovation and has become a company's most valuable asset. Some of the challenges that companies face are inadequate security practices and too much data to manage. It is important to remember that security is not a solo sport, and as a community, we are stronger together.

Read More
news image

CloudVision as-a-Service: Security and Data Protection

whitePaper | January 24, 2023

Cloud-based software delivery has increasingly become the norm in today’s world, owing to the elasticity, scalability, and economy of cloud architectures. Arista has established a leadership position in the delivery of reliable and secure cloud networking and services management through the introduction of CloudVision®, a single unified AI/ML-enabled network management platform supporting every place in the cloud – and CloudVision is now available in an “as-aService” delivery model in the cloud.

Read More

Spotlight

Cyber Security Alliance

The Cyber Security Alliance - formerly known as the Application Security Forum (Western Switzerland) - is a swiss initiative aiming at increasing awareness around Cyber Security. We organize a yearly conference and have created a community. Over the last 5 years of our existence we have met an amazing number of smart people who contribute to increasing security in Switzerland and around the world. We have decided to create a community to rally all that incredible level of expertise and energy in order to promote the community and offer a 365/365 days round flow of cool information and great events.

Events