Security > Network security

Big Blue now number 3 in global security software

16 June, 2014

IBM has moved into third place in the global security software market, while security software spending in Australia in 2013 reached $408.1 million, an increase of 8% over 2012, says Gartner research.


AFP arrest two alleged Anonymous members

27 May, 2014 by Dylan Bushell-Embling

Australian Federal Police have arrested a 40-year-old from WA and an 18-year-old from NSW on suspicion of hacking web servers hosting a number of Australian and Indonesian government websites.


Imperva goes on security buying spree

10 February, 2014 by Dylan Bushell-Embling

Imperva has announced plans to acquire two cloud security vendors and a mainframe database auditing software company.


Your staff: the weakest link in cybersecurity

14 January, 2014 by Ammar Hindi*

News stories about hackers obtaining data on millions of customer accounts might grab attention, but are they that far removed from the situations of the organisations that most of us work for?


News you may have missed

13 January, 2014 by Dylan Bushell-Embling

We take a look at the biggest news from the holiday season, with more NSA allegations making the rounds, smartphone makers feeling the pinch and PC vendors evolving to avoid obsolescence.


Cloud-based mobile device security streamlines data protection

18 December, 2013

Learn why cloud-based security offers superior protection while meeting requirements for identifying and preventing access to malicious sites, as well as reducing complexity and management time of IT staff. 


Network the key security battleground in 2014

11 December, 2013 by Dylan Bushell-Embling

Palo Alto Networks expects network-layer security to take on increasing prominence in 2014 in the face of advanced mobile threats and the ongoing BYOD megatrend.


UTM appliance picks up slack when domain controller fails

18 November, 2013

ACS Aviation Solutions has deployed a unified threat management appliance in its Australian and Ireland offices, creating a sure site-to-site connection and VPN tunnel between the two.


French Google verdict an obligation to censor?

14 November, 2013 by Dylan Bushell-Embling

Orders by a French court for Google to filter salacious images of Max Mosley from search results will be an inconvenience for the company but may have worse implications for smaller web firms.


Unified threat management explained

15 October, 2013 by Pat Devlin

Unified threat management (UTM) systems combine a firewall with other security features, centralising visibility, reporting and security controls in a single device to simplify management of network security.


Backdoor discovered in D-Link routers

15 October, 2013 by Andrew Collins

Several D-Link router models contain a vulnerability that would give an interloper complete administrative access over the devices, according to one vulnerability researcher.


Taking the IT out of security

10 October, 2013 by Angela Coble*

The greatest gain we have seen in IT, and security more specifically, has been without a "product" or "technology" but with simple messages and human interaction, argues Angela Coble.


Cisco completes Sourcefire purchase

09 October, 2013 by Dylan Bushell-Embling

Cisco has completed the $2.7b acquisition of Sourcefire, to further its goal of developing a threat-centric approach to security.


Huawei blasts US for "illegal action"

17 September, 2013 by Andrew Collins

Chinese networking vendor Huawei has accused the United States of taking "illegal action", after the release of a report claiming the NSA targeted the vendor for surveillance.


Five steps to prepare for the next security threat cycle

05 September, 2013 by Chris Wood*

About every five years, attackers launch new types of threats - and a new wave is upon us. These steps can help to avoid being compromised by this new wave.


  • All content Copyright © 2024 Westwick-Farrow Pty Ltd