Australia is the world's second largest host for malware and businesses in Australia and New Zealand experience 29 data loss events on an average day, according to the results of a recent survey conducted by security firm Check Point Software Technologies.
David Braue |
16 Sep |
Notification of data breaches should be one of the four key steps organisations undertake in response to any detected breach, new guidelines from the Office of the Australian Information Commissioner (OAIC) recommend.
David Braue |
09 Sep |
The un-doing of the dark-web drugs bazaar, Silk Road, was a misconfigured security feature on the site that was meant to prevent bots from signing up, according to the FBI.
Liam Tung |
08 Sep |
Francis Trentley was the CIO of the White House during the George W. Bush administration and oversaw that office's biggest ever technical transformation. Today, he is the Senior Director at Akamai Technologies. At the recent Gartner Security and Risk Management Summit, he delved into the ever-evolving cyber-threat-landscape and examined how traditional defences need to evolve.
Anthony Caruana |
03 Sep |
Spies and hackers will find it harder to unseal encrypted communications if they’ve already captured packets sent across Amazon’s content distribution network, CloudFront.
Liam Tung |
22 Aug |
More Network Security news
When we tested next-generation firewalls last May, at least one important security vendor wasn't there: Cisco, because they weren't ready to be tested. Now that the ASA CX next-generation firewall has had a year to mature, we put the product through its paces, using the same methodology as our last NGFW test.
Joel Snyder |
17 Jun |
LANDesk’s foray into system, asset and user management is the latest version of its Total User
Management suite, which we’ll affectionately call TUM.
Ashton Mills |
29 May |
What is big, flexible, red and costs more than your average mid-range family sedan? Not a HSV—not quite that much—but this top of the range unified threat management (UTM) device (or in this case, XTM– the X presumably being a variable) is definitely in a high performance category. The XTM2050 from WatchGuard is one of a new breed of security devices that packs punch.
Matt Tett |
22 May |
Review of the Juniper EX4500 Ethernet switch. They connect desktops to servers in the data centre via a three-tier system of access, aggregation and core Ethernet switches.
Matt Tett |
17 Nov |
With data becoming more valuable, the need for security also gets greater. Today’s technology and working behaviours both facilitate data being easily transported. Information is far less static due to home working, multiple office sites, low cost USB storage devices and DVDs. With all these portable devices and data being moved from place to place we must be mindful of data backup.
Enex Testlab |
16 Oct |
More Network Security reviews
Presentation by Russell Clarke and Mark Jones - Directors of RMSEC.
Russell Clarke and Mark Jones |
31 Jan |
These days barely a day goes by where there isn’t some sort of network security breach or hack or malfunction of some sort. This year too we had the rise of groups such as Anonymous and Lulz that sought out attention for their activities. Here we take a look at the year in pictures of some of the key security problems that grabbed our attention.
Michael Cooney |
08 Dec |
The complexity of encryption schemes has been increased dramatically in an attempt to outpace the development of computational tools designed to crack them. Now it's important to devise algorithms that can't be brute forced for trillions of years in the hopes that they will remain secure long enough to be useful before they, too, are broken. Here's a quiz about encryption to see how well you are versed in one of security's most important components. Keep track of your score and check at the end to see how well you stack up.
Tim Greene and Jim Duffy |
29 Sep |
Symantec Vision 2011 Sydney in pictures
Neerav Bhatt |
13 Sep |
Ponemon Institute asked 745 information-technology and security managers whether USB drives were important for business use, and if they were secure. What did the survey find?
Ellen Messmer |
24 Aug |
More Network Security slideshows