Corporate Partners

Career Training News, Features, and Interviews

News

Is fragmentation killing Android in the enterprise?

Android may rule consumer smartphone shipments, but it’s getting trounced in the enterprise. So is Google’s new enterprise mobile security plan up to the task of raising Android's measly share of the enterprise? The answer may lie in the diversity of "the enterprise".

Liam Tung | 27 Feb | Read more

Shadow IT threat lingers as ANZ businesses drag feet on cloud moves

Less than 1 in 4 Australian and New Zealand businesses is in the advanced stages of planning their cloud rollout – yet with nearly half of CEOs and board members supporting the paradigm and 60 percent of respondents reporting security issues, the other organisation are not free from problems related to the cloud, a Red Hat customer survey has found.

David Braue | 26 Feb | Read more

More Career Training news

Slideshows

More Career Training slideshows

Features

The Internet of Robotic Things: Secure, harmless helpers or vulnerable, vicious foes?

Experts say robots will be commonplace in 10 years. "Many respondents see advances in [artificial intelligence] and robotics pervading nearly every aspect of daily life by the year 2025--from distant manufacturing processes to the most mundane household activities," says Aaron Smith, senior researcher, The Pew Research Center's Internet Project, speaking of the several experts quoted in his "Predictions for the State of AI and Robotics in 2025".

David Geer | 24 Jan | Read more

More Career Training features

Opinions

Do you know the “Three Cs” of web app security?

We live in an application world. From shopping to communicating with friends, reading the news, following our favourite sports teams to listening to music – we do it through apps. With so many interactions and transactions now taking place via apps, maintaining security is becoming a big concern.

Matt Miller | 20 Feb | Read more

App Security- the great unspoken

There is no shortage of conversation around enterprise security. In light of some recent, high-profile hacking incidents, everyone’s talking about the importance of securing networks, data and devices in avoiding a worst case scenario of confidential customer or organisational information or IP being compromised. Interestingly, these conversations often neglect one vital component- the applications that operate on these systems and how their own vulnerabilities can bring down an organisations’ entire security strategy.

Mav Turner | 20 Feb | Read more

The Real Security Gap: Users

With security breaches set to become more commonplace, enterprise IT teams have to be more vigilant and find new ways of combating these attacks. Cyberattacks on Australian companies, such as the recent hacking on major travel insurance company Aussie Travel Cover, have left many organisations feeling vulnerable.

Travis Greene | 18 Feb | Read more

Integrated Threat Defence: Joining Forces to Defend Against Cyber Attacks

Today’s security landscape is constantly changing. Attackers are becoming more sophisticated and nimble, leading to new threats and attacks evolving every day. Tailor-made, stealthy threats now routinely evade traditional, point-in-time security defences by using multiple attack vectors. Further, advanced attacks use whatever unprotected paths exist - often blending paths - to compromise targets. Cyber criminals continue to go to great lengths to remain undetected, using technologies and methods that result in nearly imperceptible Indications of Compromise (IoCs). At the same time, the attack surface is increasing because modern networks are evolving, extending beyond traditional walls to include public and private data centres, endpoints, virtual machines, mobile devices, and the cloud.

Anthony Stitt | 18 Feb | Read more

More Career Training opinons

Editor's Recommendations

Solution Centres

Events

View all events Submit your own security event

Blog Posts

Media Release

More media release

Market Place