Government said to shelve data retention issue
14 July, 2014 by Dylan Bushell-EmblingMandatory retention of telecom records will reportedly not be among the national security reforms the Attorney-General's office plans to propose this week.
Academia and industry partner to boost network security
14 July, 2014A US Department of Homeland Security-funded research institute is working with the Secure Decisions company to use visualisation tools to produce better security data analysis.
Govt agencies miss ICT security deadline
01 July, 2014 by Andrew CollinsAt least seven federal government department agencies are expected to fail to meet a federally mandated July 2014 deadline for improving their ICT security, according to a report from the nation's Auditor-General, Ian McPhee.
Big Blue now number 3 in global security software
16 June, 2014IBM has moved into third place in the global security software market, while security software spending in Australia in 2013 reached $408.1 million, an increase of 8% over 2012, says Gartner research.
AFP arrest two alleged Anonymous members
27 May, 2014 by Dylan Bushell-EmblingAustralian Federal Police have arrested a 40-year-old from WA and an 18-year-old from NSW on suspicion of hacking web servers hosting a number of Australian and Indonesian government websites.
Imperva goes on security buying spree
10 February, 2014 by Dylan Bushell-EmblingImperva has announced plans to acquire two cloud security vendors and a mainframe database auditing software company.
Your staff: the weakest link in cybersecurity
14 January, 2014 by Ammar Hindi*News stories about hackers obtaining data on millions of customer accounts might grab attention, but are they that far removed from the situations of the organisations that most of us work for?
News you may have missed
13 January, 2014 by Dylan Bushell-EmblingWe take a look at the biggest news from the holiday season, with more NSA allegations making the rounds, smartphone makers feeling the pinch and PC vendors evolving to avoid obsolescence.
Cloud-based mobile device security streamlines data protection
18 December, 2013Learn why cloud-based security offers superior protection while meeting requirements for identifying and preventing access to malicious sites, as well as reducing complexity and management time of IT staff.
Network the key security battleground in 2014
11 December, 2013 by Dylan Bushell-EmblingPalo Alto Networks expects network-layer security to take on increasing prominence in 2014 in the face of advanced mobile threats and the ongoing BYOD megatrend.
UTM appliance picks up slack when domain controller fails
18 November, 2013ACS Aviation Solutions has deployed a unified threat management appliance in its Australian and Ireland offices, creating a sure site-to-site connection and VPN tunnel between the two.
French Google verdict an obligation to censor?
14 November, 2013 by Dylan Bushell-EmblingOrders by a French court for Google to filter salacious images of Max Mosley from search results will be an inconvenience for the company but may have worse implications for smaller web firms.
Unified threat management explained
15 October, 2013 by Pat DevlinUnified threat management (UTM) systems combine a firewall with other security features, centralising visibility, reporting and security controls in a single device to simplify management of network security.
Backdoor discovered in D-Link routers
15 October, 2013 by Andrew CollinsSeveral D-Link router models contain a vulnerability that would give an interloper complete administrative access over the devices, according to one vulnerability researcher.
Taking the IT out of security
10 October, 2013 by Angela Coble*The greatest gain we have seen in IT, and security more specifically, has been without a "product" or "technology" but with simple messages and human interaction, argues Angela Coble.