AFP arrest two alleged Anonymous members
27 May, 2014 by Dylan Bushell-EmblingAustralian Federal Police have arrested a 40-year-old from WA and an 18-year-old from NSW on suspicion of hacking web servers hosting a number of Australian and Indonesian government websites.
Imperva goes on security buying spree
10 February, 2014 by Dylan Bushell-EmblingImperva has announced plans to acquire two cloud security vendors and a mainframe database auditing software company.
Your staff: the weakest link in cybersecurity
14 January, 2014 by Ammar Hindi*News stories about hackers obtaining data on millions of customer accounts might grab attention, but are they that far removed from the situations of the organisations that most of us work for?
News you may have missed
13 January, 2014 by Dylan Bushell-EmblingWe take a look at the biggest news from the holiday season, with more NSA allegations making the rounds, smartphone makers feeling the pinch and PC vendors evolving to avoid obsolescence.
Cloud-based mobile device security streamlines data protection
18 December, 2013Learn why cloud-based security offers superior protection while meeting requirements for identifying and preventing access to malicious sites, as well as reducing complexity and management time of IT staff.
Network the key security battleground in 2014
11 December, 2013 by Dylan Bushell-EmblingPalo Alto Networks expects network-layer security to take on increasing prominence in 2014 in the face of advanced mobile threats and the ongoing BYOD megatrend.
UTM appliance picks up slack when domain controller fails
18 November, 2013ACS Aviation Solutions has deployed a unified threat management appliance in its Australian and Ireland offices, creating a sure site-to-site connection and VPN tunnel between the two.
French Google verdict an obligation to censor?
14 November, 2013 by Dylan Bushell-EmblingOrders by a French court for Google to filter salacious images of Max Mosley from search results will be an inconvenience for the company but may have worse implications for smaller web firms.
Backdoor discovered in D-Link routers
15 October, 2013 by Andrew CollinsSeveral D-Link router models contain a vulnerability that would give an interloper complete administrative access over the devices, according to one vulnerability researcher.
Unified threat management explained
15 October, 2013 by Pat DevlinUnified threat management (UTM) systems combine a firewall with other security features, centralising visibility, reporting and security controls in a single device to simplify management of network security.
Taking the IT out of security
10 October, 2013 by Angela Coble*The greatest gain we have seen in IT, and security more specifically, has been without a "product" or "technology" but with simple messages and human interaction, argues Angela Coble.
Cisco completes Sourcefire purchase
09 October, 2013 by Dylan Bushell-EmblingCisco has completed the $2.7b acquisition of Sourcefire, to further its goal of developing a threat-centric approach to security.
Huawei blasts US for "illegal action"
17 September, 2013 by Andrew CollinsChinese networking vendor Huawei has accused the United States of taking "illegal action", after the release of a report claiming the NSA targeted the vendor for surveillance.
Five steps to prepare for the next security threat cycle
05 September, 2013 by Chris Wood*About every five years, attackers launch new types of threats - and a new wave is upon us. These steps can help to avoid being compromised by this new wave.
Microsoft and Google to sue US government
03 September, 2013 by Andrew CollinsMicrosoft and Google will move ahead with litigation against the US government, in order to gain permission to disclose greater detail about the customer information they are compelled to reveal to US agencies under the US's Foreign Intelligence Surveillance Act (FISA).