Accenture buys Australian security firm Redcore
24 August, 2016 by Dylan Bushell-EmblingAccenture has agreed to buy Melbourne-based Redcore to expand Accenture Security's capabilities in IAM and security-as-a-service.
Three keys to securing our cybersecurity future
22 August, 2016 by Garry Barnes, Practice Lead, Governance Advisory, Vital Interacts (Australia), and ISACA spokesperson | Supplied by: Information Systems Audit and Control AssociationNow that the election is over, it's time for the federal government to get back to business and implement its Cybersecurity Strategy.
Passwords are broken: Centrify executive
22 August, 2016 by Dylan Bushell-EmblingVisiting Centrify executive David McNeely believes it is time to address the fact that passwords are the weak link in security, responsible for the majority of data breaches.
40% of Aussie orgs not prepared for insider threats
19 August, 2016 by Dylan Bushell-EmblingThe disproportionate focus on perimeter defence in IT security has left many Australian organisations unprepared to deal with malicious insider threats.
OAIC examines Census attack; Oracle MICROS breach; Linux TCP weakness
18 August, 2016 by Andrew CollinsPrivacy Commissioner satisfied no Census data was stolen, Russian criminals breach hundreds of Oracle systems, and dangerous Linux security weakness found.
Ixia iBypass VHD bypass switch
17 August, 2016 | Supplied by: Keysight Network SolutionsIxia has released iBypass VHD, a modular, high-density, inline bypass switch.
Attackers scraping data from LinkedIn
15 August, 2016 by Dylan Bushell-EmblingLinkedIn has filed a lawsuit seeking to identify and obtain an injunction against unknown attackers who have been illegally scraping data from the enterprise social media platform since December.
Security summit for Sydney in September
15 August, 2016 by Dylan Bushell-EmblingPalo Alto Networks' first Australian cybersecurity summit will bring together a number of local and international experts to discuss how organisations should shape their security strategies.
Checkpoint SandBlast Agent malware protection for web browsers
11 August, 2016 | Supplied by: Check Point Software Technologies LtdCheck Point has released SandBlast Agent for browsers, with zero-phishing technology.
AUSTRAC team to target online terrorism
11 August, 2016Australia's primary financial intelligence agency, AUSTRAC, has established a new cyber team dedicated to identifying online terrorism financing activities, money laundering and financial fraud.
'Strider' targets Europe, Asia; Telstra's 5G tests; ACCC to study comms market
11 August, 2016 by Andrew CollinsSymantec says many targets have been attacked with 'Strider' malware, ACCC to scrutinise competition in the comms market, and Telstra to test Ericsson's 5G technology.
Ceding control to attackers — without knowing it
10 August, 2016 by Vincent Goh, Regional Vice President, Asia Pacific, CyberArk | Supplied by: CYBERARK SOFTWARE (AUSTRALIA) PTYIT security strategies are not complete unless they protect access to administrator credentials and improve domain controller security.
ABS blames DDoS attacks for census outage
10 August, 2016 by Dylan Bushell-EmblingThe government is sending mixed signals as to the cause of last night's eCensus system outage, with the ABS blaming DDoS attacks and the Prime Minister attributing the cause to hardware failures.
Critical infrastructure vulnerabilities surging
08 August, 2016 by Dylan Bushell-EmblingThere has been a steep rise in disclosed vulnerabilities in the industrial control systems that manage critical infrastructure including electric grids and water supplies, and a full third of these have no patches available.
LogRhythm Freemium network monitor
08 August, 2016 | Supplied by: LogRhythm IncLogRhythm has released the Freemium network monitor. It is a commercial-grade network monitoring, forensics and analytics product suitable for advanced threat detection and incident response.