Security

Infocrime is putting your business at risk

18 December, 2014 by Craig Searle, Head of Cyber Security, Asia Pacific, BAE Systems Applied Intelligence | Supplied by: BAE Systems

Protecting against the myriad cyber threats is a massive undertaking that is only going to become more complex. Threat intelligence will be a key weapon in that battle.


WatchGuard Firebox M400 and M500 NGFW and UTM appliances

11 December, 2014 | Supplied by: WatchGuard Technologies Inc

The WatchGuard Firebox M400 and M500 next-generation firewall and unified threat management appliances have been specifically engineered for mid-size and distributed enterprises.


Six infosec tips I learned from Game of Thrones

09 December, 2014 by Corey Nachreiner* | Supplied by: WatchGuard Technologies Inc

In the Game of Thrones universe, the good guys lose as many battles as they win. But we can learn from their mistakes. Follow these six security tips and perhaps you’ll prevail when the digital White Walkers storm your network gates.


Security, IoT, cloud to be top tech trends in 2015

04 December, 2014 by Dylan Bushell-Embling

With 2014 drawing to a close, experts have weighed in on the expected top technology trends of 2015. Advanced cyberthreats, the IoT, cloud and big data technologies are expected to dominate.


Management and encryption - two peas in a pod

02 December, 2014 by Sven Radavics | Supplied by: Imation ANZ Pty Ltd

When it comes to management and encryption, all too often the security industry is applying old-world thinking to a new-world problem. A different approach is needed, argues Sven Radavics.


Sony Pictures systems shut down in hack attack

27 November, 2014 by Dylan Bushell-Embling

A hacker group calling itself #GOP shut down the computer systems of Sony Pictures, claimed to have stolen all the film studio's data and threatened to release it if unspecified demands aren't met.


Identity access management you can bank on

26 November, 2014 | Supplied by: First Point Global

ING DIRECT, one of Australia's largest banks, has successfully rolled out an identity access management system that has dramatically improved turnaround times and efficiency, and decreased risks.


Protect yourself from your printer

25 November, 2014 by George Kharoufeh, Product Marketing Manager, Kyocera Document Solutions | Supplied by: Kyocera Document Solutions Australia

Taking steps to secure your network and introducing printing protocols will help prevent your multifunctional printer from becoming a gateway to your confidential data.


Healthcare and privacy go together

19 November, 2014 | Supplied by: Varonis

Mercy Health and Aged Care Central Queensland needed a new system to improve data privacy and efficiency while providing a complete audit trail and satisfying compliance with information security standards.


US postal service hit with huge data theft

12 November, 2014 by Dylan Bushell-Embling

The US postal service has disclosed a major theft of customer and employee data from one of its computer systems in a hacking attack that may have originated from China.


Perimeter defence no longer adequate for security

11 November, 2014 by Dylan Bushell-Embling

Three in four security professionals agree that cybersecurity needs have changed in the last year and nearly as many expect needs to change again next year, a survey shows.


Government takes heat for metadata bill

05 November, 2014 by Dylan Bushell-Embling

The government has been criticised for sending mixed signals on whether its proposed metadata retention bill would be used for purposes that include pursuing online pirates.


Government tables telco data retention Bill

30 October, 2014 by Dylan Bushell-Embling

The government has introduced legislation that would compel local telcos to retain customer metadata for up to two years.


NSW departments must improve privacy governance

28 October, 2014 by Dylan Bushell-Embling

NSW's privacy commissioner has expressed concern over delays implementing privacy process reforms for NSW Government departments.


Google augments authentication with USB key

23 October, 2014 by Dylan Bushell-Embling

Google had added the option to use a physical USB - instead of a code - as a two-factor authentication method when logging into Google and other sites.


  • All content Copyright © 2024 Westwick-Farrow Pty Ltd