Australia may be relatively small by population but it has the most information-security breaches in the Asia-Pacific region, according to new research that has applied a standard metric as a way to compare the relative frequency and severity of security breaches.
David Braue |
22 Sep |
Symantec’s problems fixing bugs in its archive parser discovered by Google’s antivirus bug-hunter Tavis Ormandy aren’t quite over yet.
Liam Tung |
21 Sep |
Businesses in Australia and New Zealand are reporting fewer data loss incidents per day overall than comparable businesses in other countries but email monitoring and blocking is generating incidents at twice the global average, according to new Intel Security research that also found a threat landscape exploding with new ransomware and mobile malware.
David Braue |
16 Sep |
The next phase of information warfare may involve a blend of Soviet-style fake documents and more current document dumps that expose private information.
Liam Tung |
15 Sep |
Data breaches are inevitable and waiting for a breach to occur before designing an incident response plan is a recipe for failure. It’s a question of when the breach will occur and how you will respond, not if you will be breached. 100% prevention simply doesn’t exist, so having a plan to deal with a security breach is now more important than ever. You probably already have an incident response plan from a technical perspective. Phrases such as preparation, identification, containment, eradication and lessons learned.
Wayne Tufek |
15 Sep |
More Network Security news
When we tested next-generation firewalls last May, at least one important security vendor wasn't there: Cisco, because they weren't ready to be tested. Now that the ASA CX next-generation firewall has had a year to mature, we put the product through its paces, using the same methodology as our last NGFW test.
Joel Snyder |
17 Jun |
LANDesk’s foray into system, asset and user management is the latest version of its Total User
Management suite, which we’ll affectionately call TUM.
Ashton Mills |
29 May |
What is big, flexible, red and costs more than your average mid-range family sedan? Not a HSV—not quite that much—but this top of the range unified threat management (UTM) device (or in this case, XTM– the X presumably being a variable) is definitely in a high performance category. The XTM2050 from WatchGuard is one of a new breed of security devices that packs punch.
Matt Tett |
22 May |
Review of the Juniper EX4500 Ethernet switch. They connect desktops to servers in the data centre via a three-tier system of access, aggregation and core Ethernet switches.
Matt Tett |
17 Nov |
With data becoming more valuable, the need for security also gets greater. Today’s technology and working behaviours both facilitate data being easily transported. Information is far less static due to home working, multiple office sites, low cost USB storage devices and DVDs. With all these portable devices and data being moved from place to place we must be mindful of data backup.
Enex Testlab |
16 Oct |
More Network Security reviews
CSO & Enex Testlab join forces to deliver a first class IT Security event in Sydney's Four Seasons Hotel.
Abigail Swabey |
24 Sep |
Presentation by Russell Clarke and Mark Jones - Directors of RMSEC.
Russell Clarke and Mark Jones |
31 Jan |
These days barely a day goes by where there isn’t some sort of network security breach or hack or malfunction of some sort. This year too we had the rise of groups such as Anonymous and Lulz that sought out attention for their activities. Here we take a look at the year in pictures of some of the key security problems that grabbed our attention.
Michael Cooney |
08 Dec |
The complexity of encryption schemes has been increased dramatically in an attempt to outpace the development of computational tools designed to crack them. Now it's important to devise algorithms that can't be brute forced for trillions of years in the hopes that they will remain secure long enough to be useful before they, too, are broken. Here's a quiz about encryption to see how well you are versed in one of security's most important components. Keep track of your score and check at the end to see how well you stack up.
Tim Greene and Jim Duffy |
29 Sep |
Symantec Vision 2011 Sydney in pictures
Neerav Bhatt |
13 Sep |
More Network Security slideshows