News you may have missed
13 January, 2014 by Dylan Bushell-EmblingWe take a look at the biggest news from the holiday season, with more NSA allegations making the rounds, smartphone makers feeling the pinch and PC vendors evolving to avoid obsolescence.
Cloud-based mobile device security streamlines data protection
18 December, 2013Learn why cloud-based security offers superior protection while meeting requirements for identifying and preventing access to malicious sites, as well as reducing complexity and management time of IT staff.
Network the key security battleground in 2014
11 December, 2013 by Dylan Bushell-EmblingPalo Alto Networks expects network-layer security to take on increasing prominence in 2014 in the face of advanced mobile threats and the ongoing BYOD megatrend.
UTM appliance picks up slack when domain controller fails
18 November, 2013ACS Aviation Solutions has deployed a unified threat management appliance in its Australian and Ireland offices, creating a sure site-to-site connection and VPN tunnel between the two.
French Google verdict an obligation to censor?
14 November, 2013 by Dylan Bushell-EmblingOrders by a French court for Google to filter salacious images of Max Mosley from search results will be an inconvenience for the company but may have worse implications for smaller web firms.
Unified threat management explained
15 October, 2013 by Pat DevlinUnified threat management (UTM) systems combine a firewall with other security features, centralising visibility, reporting and security controls in a single device to simplify management of network security.
Backdoor discovered in D-Link routers
15 October, 2013 by Andrew CollinsSeveral D-Link router models contain a vulnerability that would give an interloper complete administrative access over the devices, according to one vulnerability researcher.
Taking the IT out of security
10 October, 2013 by Angela Coble*The greatest gain we have seen in IT, and security more specifically, has been without a "product" or "technology" but with simple messages and human interaction, argues Angela Coble.
Cisco completes Sourcefire purchase
09 October, 2013 by Dylan Bushell-EmblingCisco has completed the $2.7b acquisition of Sourcefire, to further its goal of developing a threat-centric approach to security.
Huawei blasts US for "illegal action"
17 September, 2013 by Andrew CollinsChinese networking vendor Huawei has accused the United States of taking "illegal action", after the release of a report claiming the NSA targeted the vendor for surveillance.
Five steps to prepare for the next security threat cycle
05 September, 2013 by Chris Wood*About every five years, attackers launch new types of threats - and a new wave is upon us. These steps can help to avoid being compromised by this new wave.
Microsoft and Google to sue US government
03 September, 2013 by Andrew CollinsMicrosoft and Google will move ahead with litigation against the US government, in order to gain permission to disclose greater detail about the customer information they are compelled to reveal to US agencies under the US's Foreign Intelligence Surveillance Act (FISA).
Security - the antithesis of innovation?
29 August, 2013 by Dr Hugh Thompson*It's commonly said in IT that security is the antithesis of innovation. Innovation creates disruption, and disruption introduces vulnerability. But is that really the case?
APAC DDoS protection market booming
21 August, 2013 by Dylan Bushell-EmblingDemand for DDoS protection technology is booming in APAC, but doubts about the value of such solutions still linger in Australia and other markets.
NZ spy law could rock nation’s ICT sector
08 August, 2013 by Dylan Bushell-EmblingICT groups opposed to NZ’s proposed new interception amendments fear the rules could reduce the competitiveness of domestic companies and force international players out of the market.