Security > Network access control

Overcoming the human risk factor

11 May, 2017 by Sinisha Patkovic, VP Government Solutions, BlackBerry

A better approach to deploying security solutions is to match existing employee behaviours, rather than expecting people to change.


Telstra wins legal battle over metadata

20 January, 2017 by Dylan Bushell-Embling

The OAIC has failed in its appeal to overturn an earlier verdict overruling its order for Telstra to provide metadata collected about subscribers.


Igniting cybersecurity in the energy sector

20 September, 2016 by Simon Mouat, Vice President of Energy, Schneider Electric

For the increasingly hyper-connected energy sector, hacking one piece of industrial equipment can now be the same as attacking one million.


Schneider Electric sets up cybersecurity practice

20 September, 2016 by Jonathan Nally

Schneider Electric has launched an Industrial Cybersecurity Practice in Australia which, it said, aims to improve protection for utility, resources and manufacturing industries from attack.


Network access policies must be updated for IoT

13 September, 2016 by Dylan Bushell-Embling

Gartner has urged organisations to update their network access policies and enforcement practices to address the growing number of IoT devices requiring access to the enterprise network.


Attackers scraping data from LinkedIn

15 August, 2016 by Dylan Bushell-Embling

LinkedIn has filed a lawsuit seeking to identify and obtain an injunction against unknown attackers who have been illegally scraping data from the enterprise social media platform since December.


Ceding control to attackers — without knowing it

10 August, 2016 by Vincent Goh, Regional Vice President, Asia Pacific, CyberArk

IT security strategies are not complete unless they protect access to administrator credentials and improve domain controller security.


Privileged credentials — keys to the IT kingdom

24 March, 2016 by Sam Ghebranious, ANZ Regional Director, CyberArk

In the battle to protect sensitive data, organisations often overlook protection of their privileged SSH keys, thus leaving a gaping hole in their defences.


App stores open the door to security vulnerabilities

21 January, 2016 by Chris Williams*

The current app store situation is a vector for malware to be accidentally loaded onto a user's device and then gain access to the corporate network.


Advance your SSO strategy to meet changing business needs

06 October, 2015

Single sign-on (SSO) has long been the go-to technology to ensure convenient password synchronisation, replay and security. The move towards more web-based access methods, however, makes it difficult for yesterday's SSO solution to meet today's evolving application requirements.


ACSC publishes secure administration guide

01 October, 2015 by Dylan Bushell-Embling

The Australian Cyber Security Centre has produced a guide designed to help organisations protect against the compromise and abuse of privileged accounts.


Fortinet FortiAP-S WLAN AP solutions

25 August, 2015

The Fortinet FortiAP-S series access points (APs) provide organisations with a cost-effective, easy-to-manage and secure option for deploying secure Wi-Fi without compromising security when opting to manage their enterprise WLAN from the cloud.


What can we learn from the Snowden case?

08 June, 2015 by Daren Glenister, Field Chief Technology Officer, Intralinks

The security perimeter has shifted from firewalls to identity management and now to content management, with the aim of preventing another Edward Snowden from succeeding.


Tech Insights: Interview with Charles Clarke, Veeam Software

27 February, 2015

In our new Tech Insights series, we quiz industry leaders to get their views of what the year ahead holds for the IT world. Today we speak with Charles Clarke, Technical Director, APAC, Veeam Software.


Healthcare and privacy go together

19 November, 2014

Mercy Health and Aged Care Central Queensland needed a new system to improve data privacy and efficiency while providing a complete audit trail and satisfying compliance with information security standards.


  • All content Copyright © 2024 Westwick-Farrow Pty Ltd