Security > Network access control

Why zero trust is the gold standard in secure hybrid work

26 April, 2022 by Martin Creighan, Managing Director, Citrix Australia and New Zealand

Digital workspaces have created opportunity and also highlighted a new set of challenges — a tension between effective security and employee experience.

Immuta announces A/NZ expansion

20 April, 2022 by Dylan Bushell-Embling

Data security company Immuta has appointed Anthony Farr to lead the company's expansion into Australia and New Zealand.

Fastly outage highlights the need for unified IT practices

11 June, 2021

Industry experts have urged organisations to boost their cyber resilience policies, after an internet outage affected many of the world's top websites.

Communications cybersecurity to be top of agenda at CCV

23 October, 2020 by Jonathan Nally

Leading experts from the NSW Government, NIST and the private sector will spearhead the cybersecurity discussion at the Comms Connect Virtual Conference Series.

Study: Employee personal devices pose risk to corporate data

15 September, 2020

A Trend Micro survey has highlighted the risks posed by smart home devices to the corporate cybersecurity chain, as more employees shift to working remotely.

BYOPC to reach mainstream in 5 years

31 August, 2020 by Dylan Bushell-Embling

Gartner is predicting that the emerging bring your own PC technology trend will reach mainstream adoption within five years, driven by COVID-19 WFH restrictions.

ATEN secure KVM switches

07 June, 2018

The ATEN PSS PP v3.0 secure KVM switches provide isolation between computer sources and peripherals while sharing a single keyboard, mouse, monitor, speaker set and common access card (CAC) reader between connected computers of various security classifications.

Huge IoT botnet may be used for Ukraine attack

24 May, 2018 by Dylan Bushell-Embling

Cisco's Talos threat intelligence unit has discovered a major IoT botnet that may be linked to a planned state-sponsored cyber attack on Ukraine.

Overcoming the human risk factor

11 May, 2017 by Sinisha Patkovic, VP Government Solutions, BlackBerry

A better approach to deploying security solutions is to match existing employee behaviours, rather than expecting people to change.

Telstra wins legal battle over metadata

20 January, 2017 by Dylan Bushell-Embling

The OAIC has failed in its appeal to overturn an earlier verdict overruling its order for Telstra to provide metadata collected about subscribers.

Schneider Electric sets up cybersecurity practice

20 September, 2016 by Jonathan Nally

Schneider Electric has launched an Industrial Cybersecurity Practice in Australia which, it said, aims to improve protection for utility, resources and manufacturing industries from attack.

Igniting cybersecurity in the energy sector

20 September, 2016 by Simon Mouat, Vice President of Energy, Schneider Electric

For the increasingly hyper-connected energy sector, hacking one piece of industrial equipment can now be the same as attacking one million.

Network access policies must be updated for IoT

13 September, 2016 by Dylan Bushell-Embling

Gartner has urged organisations to update their network access policies and enforcement practices to address the growing number of IoT devices requiring access to the enterprise network.

Attackers scraping data from LinkedIn

15 August, 2016 by Dylan Bushell-Embling

LinkedIn has filed a lawsuit seeking to identify and obtain an injunction against unknown attackers who have been illegally scraping data from the enterprise social media platform since December.

Ceding control to attackers — without knowing it

10 August, 2016 by Vincent Goh, Regional Vice President, Asia Pacific, CyberArk

IT security strategies are not complete unless they protect access to administrator credentials and improve domain controller security.

  • All content Copyright © 2022 Westwick-Farrow Pty Ltd