Perimeter defence no longer adequate for security
11 November, 2014 by Dylan Bushell-EmblingThree in four security professionals agree that cybersecurity needs have changed in the last year and nearly as many expect needs to change again next year, a survey shows.
Government takes heat for metadata bill
05 November, 2014 by Dylan Bushell-EmblingThe government has been criticised for sending mixed signals on whether its proposed metadata retention bill would be used for purposes that include pursuing online pirates.
Government tables telco data retention Bill
30 October, 2014 by Dylan Bushell-EmblingThe government has introduced legislation that would compel local telcos to retain customer metadata for up to two years.
NSW departments must improve privacy governance
28 October, 2014 by Dylan Bushell-EmblingNSW's privacy commissioner has expressed concern over delays implementing privacy process reforms for NSW Government departments.
Google augments authentication with USB key
23 October, 2014 by Dylan Bushell-EmblingGoogle had added the option to use a physical USB - instead of a code - as a two-factor authentication method when logging into Google and other sites.
Dell augments cloud, security portfolios
16 October, 2014 by Dylan Bushell-EmblingAt Dell's User Forum in Sydney the company announced new cloud collaborations, as well as an NFV platform and next-generation firewall.
Optus teams with FireEye to tackle APTs
09 October, 2014 by Dylan Bushell-Embling | Supplied by: Optus Pty LtdOptus Business and FireEye have partnered to offer joint-managed security services, open two advanced security operation centres and research APTs targeting APAC firms.
Finding the middle ground for zero-day vulnerabilities
07 October, 2014 by Scott Crane, Director of Product Management, Arbor Networks Australia | Supplied by: Arbor NetworksThreats that target zero-day vulnerabilities are a key issue, as security solutions often fail to detect them because they don't know what they should be looking for. A new, 'middle way' is needed to tackle them.
Nude photo leak shows that passwords are passé
29 September, 2014 by Dylan Bushell-EmblingPasswords are a flawed method of maintaining online security and should be replaced with identity management systems, Centrify Regional Manager Derek Morwood has argued.
Shell Shock exploit "worse than Heartbleed"
26 September, 2014 by Dylan Bushell-EmblingA vulnerability found in the ubiquitous Bash Unix shell has been described as more severe than Heartbleed and affecting the "largest ever attack vector surface" of any bug.
Australian small businesses unaware of APTs
24 September, 2014 by Dylan Bushell-Embling | Supplied by: Trend Micro Australia Pty LtdFour in five Australian businesses are unaware of advanced persistent threats and only 82% know of the existence of antivirus security technology, a survey shows.
Boeing to open cyber analytics centre in Singapore
23 September, 2014 | Supplied by: Boeing Defense and SpaceBoeing will boost its ability to deal with cybersecurity challenges in the Asia-Pacific region with the establishment of a cyber analytics centre in Singapore, the first of its kind for the company outside of the US.
Connected cars have 1980s-level security
18 September, 2014 by Dylan Bushell-EmblingSmart connected vehicles have the potential to improve road safety, but primitive network security systems could make them more of a danger, QUT professor Andry Rakotonirainy warns.
Australian corporates support data retention
16 September, 2014 by Dylan Bushell-EmblingAustralian business leaders support the government's proposed telecom data retention scheme but are calling for strong safeguards to limit the impact on legitimate consumers and businesses, a survey indicates.
Single sign-on: solving the password proliferation problem
08 September, 2014 by Stephen WithersHaving multiple passwords combined with numerous redundant sign-on processes poses both a security risk and a productivity loss for business. A single sign-on system is the answer.