Security

D-Link DFL-260E NetDefend UTM firewall

19 September, 2011

The DFL-260E NetDefend unified threat management (UTM) Firewall provides small- to mid-sized businesses with defence against several network threats.


Keeping staff productive with content filtering

19 September, 2011

Perth company Wrays Intellectual Property found itself with a dilemma. The company wanted to keep its employees focused and productive by controlling their use of the internet, but didn’t want to stop them from using websites they needed to use to do their jobs.


WatchGuard XTM 8 Series security appliance

26 August, 2011

WatchGuard has released the XTM 8 Series multifunction security appliance.


Insecure software will cost you

05 August, 2011 by Rob McAdam*

Looking to save a few dollars, organisations are putting less and less consideration into security when developing software. While it may pay off in the very short term, it’s almost certain to cost businesses much, much more in the long term, with the cost of dealing with security breaches vastly outstripping the cost of developing secure software in the first place. So opines Rob McAdam, CEO of security consultancy Pure Hacking.


Inside the Platform Networks hacking attack

01 August, 2011 by Andrew Collins

Platform Networks, Australian telco wholesaler and NBN affiliate, last week revealed it had been on the receiving end of a six-month-long hacking attack. Andrew Collins talks to Platform’s managing director, David Hooton, about the disclosure of information on the incident to the Australian Federal Police, and a forthcoming case study on the attack and the company’s defence against it.


NBN "not hacked" in Platform Networks attack, says NBN Co

28 July, 2011

NBN Co has denied that its systems were compromised during the attack on its partner Platform Networks that was revealed earlier this week.


Bring-your-own IT spreads in Australian enterprises

27 July, 2011

Increasing numbers of employees in Australian enterprises are bringing their own smartphones and laptops into the workplace, prompting some companies to introduce ‘bring-your-own IT’ policies in order to handle the challenges these devices create.


Facebook scam cashes in on Google+ hype

13 July, 2011

A Facebook scam that exploits the buzz surrounding new social networking tool Google+ is making the rounds and may be the precursor to a widespread phishing scam.


Brennan IT SecureView real-time network security

11 July, 2011

Arbor Networks and Brennan IT have partnered to deliver the SecureView service that can be used to enhance security on private IP networks.


Netregistry acquires Distribute.IT following devastating hack

24 June, 2011

Domain registrar and web host Netregistry has acquired web host Distribute.IT, following a hacking attack earlier this month which irrevocably destroyed the online assets of some Distribute.IT customers.


Understanding and preventing data breaches

17 June, 2011 by Merri Mack

With reports coming out virtually every second day on serious data breaches around the world and in Australia, it’s time to add up the cost and take serious prevention measures. Merri Mack reports on the state of data breaches, and chats to the experts on ways to mitigate the damage.


Wireless security considerations

07 June, 2011

With the continuing proliferation of WLANs, network administrators have some tough choices to make when it comes to securing these wireless networks. Hemant Chaskar*, Director of Technology at AirTight Networks, takes a closer look at these decisions.


Lockheed Martin breach linked to RSA SecureID attack

30 May, 2011

Late last week, Lockheed Martin revealed that on 21 May it became aware of a significant attack on its information systems network. According to NSS Labs, a security advisory organisation, this attack follows directly from a breach at RSA Security in March, in which attackers may have acquired the means to crack RSA’s SecureID two-factor authentication systems.


McAfee Cloud Security Platform

28 May, 2011

The McAfee Cloud Security Platform can help users safely and efficiently use cloud computing by securing all content and data traffic moving between an organisation and the cloud. Integrated, modular solutions include web, mobile, email and web services security and cloud access control.


Eighty per cent of Aussie businesses experience IT security attacks

17 May, 2011

Most Australian businesses experienced an IT security attack in 2010, in the form of viruses, worms, phishing attacks or hacks, according to new research from Webroot.


  • All content Copyright © 2024 Westwick-Farrow Pty Ltd