Security

Bring-your-own IT spreads in Australian enterprises

27 July, 2011

Increasing numbers of employees in Australian enterprises are bringing their own smartphones and laptops into the workplace, prompting some companies to introduce ‘bring-your-own IT’ policies in order to handle the challenges these devices create.


Facebook scam cashes in on Google+ hype

13 July, 2011

A Facebook scam that exploits the buzz surrounding new social networking tool Google+ is making the rounds and may be the precursor to a widespread phishing scam.


Brennan IT SecureView real-time network security

11 July, 2011

Arbor Networks and Brennan IT have partnered to deliver the SecureView service that can be used to enhance security on private IP networks.


Netregistry acquires Distribute.IT following devastating hack

24 June, 2011

Domain registrar and web host Netregistry has acquired web host Distribute.IT, following a hacking attack earlier this month which irrevocably destroyed the online assets of some Distribute.IT customers.


Understanding and preventing data breaches

17 June, 2011 by Merri Mack

With reports coming out virtually every second day on serious data breaches around the world and in Australia, it’s time to add up the cost and take serious prevention measures. Merri Mack reports on the state of data breaches, and chats to the experts on ways to mitigate the damage.


Wireless security considerations

07 June, 2011

With the continuing proliferation of WLANs, network administrators have some tough choices to make when it comes to securing these wireless networks. Hemant Chaskar*, Director of Technology at AirTight Networks, takes a closer look at these decisions.


Lockheed Martin breach linked to RSA SecureID attack

30 May, 2011

Late last week, Lockheed Martin revealed that on 21 May it became aware of a significant attack on its information systems network. According to NSS Labs, a security advisory organisation, this attack follows directly from a breach at RSA Security in March, in which attackers may have acquired the means to crack RSA’s SecureID two-factor authentication systems.


McAfee Cloud Security Platform

28 May, 2011

The McAfee Cloud Security Platform can help users safely and efficiently use cloud computing by securing all content and data traffic moving between an organisation and the cloud. Integrated, modular solutions include web, mobile, email and web services security and cloud access control.


Eighty per cent of Aussie businesses experience IT security attacks

17 May, 2011

Most Australian businesses experienced an IT security attack in 2010, in the form of viruses, worms, phishing attacks or hacks, according to new research from Webroot.


F5 Networks BIG-IP Global Traffic Manager (GTM)

16 May, 2011

The F5 Networks BIG-IP Global Traffic Manager (GTM) helps users deploy domain name system security extensions (DNSSEC) protection for newly signed .com and other internet domain types.


M86 Security Web Filtering And Reporting Suite (WFR) version 4.1 with M86 VuSafe

11 May, 2011

The M86 Web Filtering And Reporting Suite (WFR) version 4.1 integrates the M86 VuSafe service for schools. M86 VuSafe is an easy-to-use, secure video library enabling educators to find, tag, organise and share online videos from YouTube without showing inappropriate videos, advertisements, viewer comments or outside links. VuSafe is free to WFR users.


ProSecure UTM150 unified threat management appliance

27 April, 2011

The ProSecure UTM150 unified threat management appliance can be used for data security for users adopting the cloud. With Stream Scanning technology, the appliance uses virus and malware threat databases from ProSecure and Sophos that are up to a claimed 400 times more comprehensive than legacy all-in-one platforms, at a speed that is up to a claimed five times faster than conventional methods.


SecureSphere 8.5 security platform

13 April, 2011

The SecureSphere 8.5 security platform extends protection from insider threat with its enhanced agent technology for file and database activity throughout the IT infrastructure. It adds agent-based monitoring and auditing for DB2 z/OS mainframe databases, as well as open systems databases.


RSA Token one-to-one swap offer for CA ArcotID Secure Software Credential

07 April, 2011

Following a hacking attack on RSA Security, which may have compromised the integrity of RSA’s SecureID two-factor authentication tokens, CA Technologies is offering all RSA SecurID token customers an opportunity to trade their RSA tokens for CA ArcotID secure software credentials in a one-for-one swap.


Planes crashing into planes: the reality of cybercrime?

04 April, 2011 by Andrew Collins

Security vendors like to throw around various apocalyptic scenarios in order to convince IT and security chiefs to buy the latest security doodads. But how realistic are these scenarios? Andrew Collins spoke to one penetration tester about the likelihood of one particular scenario: hackers compromising an airline’s IT security in order to blow up an aeroplane.


  • All content Copyright © 2024 Westwick-Farrow Pty Ltd