Corporate Partners

Retail News, Features, and Interviews

News

Is this Unix's Code Red Moment?

Back in July 2001 two security researchers, Marc Maiffret and Ryan Permeh from eEye Digital Security, discovered the Code Red worm - a piece of malware that targeted Microsoft's IIS software and propagated wildly until it was stopped. It was followed by more vulnerabilities and threats until Microsoft was forced to launch its Trustworthy Computing initiative in 2002.

Anthony Caruana | 24 Oct | Read more

The week in security: Snapchat, Dropbox deny culpability for photo, account leaks

Some 100,000 photos taken from Snapchat users weren't the service's fault, although some observers were seizing on the leak to argue for an improvement in security by Snapchat and other online services. Ditto Dropbox, which was also denying it was to blame after hackers published what they claimed were excerpts from 7 million Dropbox credentials; the cloud-storage giant blamed a third-party service for the leak, but security experts were still using the event to push their case for users to adopt two-factor authentication – particularly given that cloud security and ubiquitous identity for cloud services is still over a year away.

David Braue | 21 Oct | Read more

More Retail news

Slideshows

AISA National Conference: In pictures

- Amazon, Apple and Google know more about you than your doctor or lawyer - and Commbank is jealous as hell. - Don’t trust an organisation that doesn’t have a face - because then you can’t punch it in when they screw up, said Marcus Ranum. - 78 percent of the world’s population doesn’t have access to a computer or the internet and therefore avoid all IT security problems.

Zennith Geisler | 11 Nov | Read more

More Retail slideshows

Opinions

Incident Response Plan

Do you take a fatalistic approach to cyber attack? ‘Whatever will be, will be’ is an attitude in life (and movies) that is well suited to events that evoke a spontaneous response—like who will you marry? These are the questions posed in Doris Day’s song from the Hitchcock movie ‘The Man Who Knew Too Much’. They’re not appropriate for incidents which inspire fear, which Doris learns when her son is kidnapped.

Dr Claudia Johnson | 23 Oct | Read more

The cost of a security breach; it’s not just about the purse strings

Security breaches are rarely out of the news and with these reports come the significant costs resulting from each attack. However, the immediate thought is often associated with a dollar amount; for example how much money are we forfeiting through lost sales? Consequently, many think that private enterprises are the only ones that are prone to be at risk of attacks on their networks. The fact is public sector, educational institutions and non-profit organisations are just as much at risk and the potential costs are both great and varied.

Brett Moorgas | 08 Oct | Read more

Dispelling Common Myths Surrounding UTM

Unified Threat Management (UTM) has become popular among organisations since its emergence over five years ago. The security solution gained traction with its all-in-one approach, combining several security tools into a single device. Running UTM also saved companies, especially the smaller ones time, money and manpower. Most UTM today include a firewall, intrusion detection system (IDS), virtual private network (VPN), anti-malware, anti-spam, content and web filtering, while some vendors include other features such as advanced routing.

Wana Tun | 03 Oct | Read more

More Retail opinons

Editor's Recommendations

Solution Centres

Events

View all events Submit your own security event

Blog Posts

Media Release

More media release

Market Place