Corporate Partners

Retail News, Features, and Interviews

News

Is fragmentation killing Android in the enterprise?

Android may rule consumer smartphone shipments, but it’s getting trounced in the enterprise. So is Google’s new enterprise mobile security plan up to the task of raising Android's measly share of the enterprise? The answer may lie in the diversity of "the enterprise".

Liam Tung | 27 Feb | Read more

Shadow IT threat lingers as ANZ businesses drag feet on cloud moves

Less than 1 in 4 Australian and New Zealand businesses is in the advanced stages of planning their cloud rollout – yet with nearly half of CEOs and board members supporting the paradigm and 60 percent of respondents reporting security issues, the other organisation are not free from problems related to the cloud, a Red Hat customer survey has found.

David Braue | 26 Feb | Read more

More Retail news

Slideshows

AISA National Conference: In pictures

- Amazon, Apple and Google know more about you than your doctor or lawyer - and Commbank is jealous as hell. - Don’t trust an organisation that doesn’t have a face - because then you can’t punch it in when they screw up, said Marcus Ranum. - 78 percent of the world’s population doesn’t have access to a computer or the internet and therefore avoid all IT security problems.

Zennith Geisler | 11 Nov | Read more

More Retail slideshows

Opinions

App Security- the great unspoken

There is no shortage of conversation around enterprise security. In light of some recent, high-profile hacking incidents, everyone’s talking about the importance of securing networks, data and devices in avoiding a worst case scenario of confidential customer or organisational information or IP being compromised. Interestingly, these conversations often neglect one vital component- the applications that operate on these systems and how their own vulnerabilities can bring down an organisations’ entire security strategy.

Mav Turner | 20 Feb | Read more

Integrated Threat Defence: Joining Forces to Defend Against Cyber Attacks

Today’s security landscape is constantly changing. Attackers are becoming more sophisticated and nimble, leading to new threats and attacks evolving every day. Tailor-made, stealthy threats now routinely evade traditional, point-in-time security defences by using multiple attack vectors. Further, advanced attacks use whatever unprotected paths exist - often blending paths - to compromise targets. Cyber criminals continue to go to great lengths to remain undetected, using technologies and methods that result in nearly imperceptible Indications of Compromise (IoCs). At the same time, the attack surface is increasing because modern networks are evolving, extending beyond traditional walls to include public and private data centres, endpoints, virtual machines, mobile devices, and the cloud.

Anthony Stitt | 18 Feb | Read more

Password Protection: How Far Can Hackers Get?

For years, passwords have been the dominant means by which organisations authenticate customer access to online services. Password-based authentication is easy and familiar for customers, and is initially inexpensive for organizations to deploy at scale. But, while password-based authentication may be appropriate in some instances, it is no longer suitable for the wide range of services where it is currently being used.

Steve Durbin | 13 Jan | Read more

More Retail opinons

Editor's Recommendations

Solution Centres

Events

View all events Submit your own security event

Blog Posts

Media Release

More media release

Market Place