Security

Third-party breaches

01 May, 2013 by Marc Bown, Managing Consultant, Trustwave Spiderlabs, APAC

Many companies use partners to support their core business needs. Do those partnerships leave you and your data vulnerable to attacks?


QBE sends 100 Aussie IT jobs to India; White House Twitter hoax briefly wipes US$136.5bn off US market

30 April, 2013 by Andrew Collins

Last week, insurer QBE announced plans to cut 100 IT jobs in Australia and take them to India, while a hoax tweet about a bombing at the White House sent US stock markets plummeting.


DDoS protection keeps Betstar.com.au running

29 April, 2013

Online betting website Betstar.com.au was recently taken down, when a DDoS (distributed denial of service) attack aimed at a competitor in the same co-location data centre took Betstar’s site with it. Betstar decide it was time to implement DDoS protection.


HP WebInspect 10.0 application-security solution

26 April, 2013

HP WebInspect 10.0 is an application-security solution that replicates real-world attacks through a guided testing process, enabling organisations to develop and deliver secure web applications and web services.


Controlling who is accessing your data

16 April, 2013 | Supplied by: Varonis

With various information security standards to adhere to, Mercy Health and Aged Care Central Queensland needed transparency into who was accessing its data, and what they were doing with it. They found a solution with Varonis DatAdvantage and DataPrivilege.


Largest cyberattack ever; Dell in three-way buyout bidding war; Telecom NZ reveals UFB plans

02 April, 2013 by Andrew Collins

In the news this week: spam-fighter Spamhaus comes under largest cyberattack ever, two new Dell suitors enter the picture and Telecom New Zealand reveals pricing for its Ultra-Fast Broadband services.


Privacy Watch: NZ Govt leaks 83,000 citizens’ data; Microsoft hands over Aussie cloud user data to cops

02 April, 2013 by Andrew Collins

In privacy news, the NZ government’s Earthquake Commission leaks 83,000 citizens’ personal data, while Microsoft details how it handed over information of about 2600 Australian users to authorities.


Mobile devices: the next internet security target 

22 March, 2013 by Jonathan Andresen, Blue Coat Systems

Malnets are a lucrative source of income for distributors and they are becoming more sophisticated everyday. How can your business stay ahead of the distributors to protect your business?


The threat matrix

19 March, 2013 by Anthony Caruana

Security is always high up on the list of issues IT decision makers need to manage. One of the most challenging aspects of security is that the types of threats are changing and the environment we’re protecting is shifting as mobility, the cloud and other trends alter the way we work. Anthony Caruana spoke with four security gurus to get their views on the changing threat matrix.


Cybersecurity challenges in 2013

08 March, 2013 by Sandeep Joshi, Country Manager for DELL SonicWALL Inc, Australia and New Zealand

The issues affecting businesses are similar around the world. The key issues and points of vulnerability are around human engagement.


Start preparing for Privacy Bill changes

05 March, 2013

Australian organisations should act now and start preparing for next year’s changes to privacy law, lest they breach the new rules and cop a huge fine.


Kaspersky Endpoint Security for Business

27 February, 2013 | Supplied by: Kaspersky Lab Australia & New Zealand Pty Ltd

Kaspersky Endpoint Security for Business (KESB) is intended to help businesses overcome challenges in managing a secure network.


Three IT problems you didn’t know you had

14 February, 2013 by Anthony Caruana

With so much change happening in enterprise IT with the proliferation of mobile devices, the introduction of BYOD and shifts towards cloud-based systems, there can be moments where the importance of security can take a back step in the name of expedience.


Govt’s data retention plans “really bad”; Juniper routers at risk; China behind Twitter hack?

05 February, 2013 by Andrew Collins

In news this week: web legend Sir Tim Berners-Lee calls the Australian government’s data retention plans “really, really bad”; Juniper reveals a critical flaw in its routers; and the world speculates on who was behind the recent massive attack on Twitter.


Antivirus shootout cuts scan time from three hours to three minutes

05 February, 2013 by Andrew Collins | Supplied by: Webroot Software, Inc.

The Royal Flying Doctor Service Western Operations (RFDSWO) has implemented a new antivirus system, cutting full system scan times from about three hours to under three minutes, and increasing the performance of endpoint machines.


  • All content Copyright © 2022 Westwick-Farrow Pty Ltd