Third-party breaches
01 May, 2013 by Marc Bown, Managing Consultant, Trustwave Spiderlabs, APACMany companies use partners to support their core business needs. Do those partnerships leave you and your data vulnerable to attacks?
QBE sends 100 Aussie IT jobs to India; White House Twitter hoax briefly wipes US$136.5bn off US market
30 April, 2013 by Andrew CollinsLast week, insurer QBE announced plans to cut 100 IT jobs in Australia and take them to India, while a hoax tweet about a bombing at the White House sent US stock markets plummeting.
DDoS protection keeps Betstar.com.au running
29 April, 2013Online betting website Betstar.com.au was recently taken down, when a DDoS (distributed denial of service) attack aimed at a competitor in the same co-location data centre took Betstar’s site with it. Betstar decide it was time to implement DDoS protection.
HP WebInspect 10.0 application-security solution
26 April, 2013HP WebInspect 10.0 is an application-security solution that replicates real-world attacks through a guided testing process, enabling organisations to develop and deliver secure web applications and web services.
Controlling who is accessing your data
16 April, 2013 | Supplied by: VaronisWith various information security standards to adhere to, Mercy Health and Aged Care Central Queensland needed transparency into who was accessing its data, and what they were doing with it. They found a solution with Varonis DatAdvantage and DataPrivilege.
Privacy Watch: NZ Govt leaks 83,000 citizens’ data; Microsoft hands over Aussie cloud user data to cops
02 April, 2013 by Andrew CollinsIn privacy news, the NZ government’s Earthquake Commission leaks 83,000 citizens’ personal data, while Microsoft details how it handed over information of about 2600 Australian users to authorities.
Largest cyberattack ever; Dell in three-way buyout bidding war; Telecom NZ reveals UFB plans
02 April, 2013 by Andrew CollinsIn the news this week: spam-fighter Spamhaus comes under largest cyberattack ever, two new Dell suitors enter the picture and Telecom New Zealand reveals pricing for its Ultra-Fast Broadband services.
Mobile devices: the next internet security target
22 March, 2013 by Jonathan Andresen, Blue Coat SystemsMalnets are a lucrative source of income for distributors and they are becoming more sophisticated everyday. How can your business stay ahead of the distributors to protect your business?
The threat matrix
19 March, 2013 by Anthony CaruanaSecurity is always high up on the list of issues IT decision makers need to manage. One of the most challenging aspects of security is that the types of threats are changing and the environment we’re protecting is shifting as mobility, the cloud and other trends alter the way we work. Anthony Caruana spoke with four security gurus to get their views on the changing threat matrix.
Cybersecurity challenges in 2013
08 March, 2013 by Sandeep Joshi, Country Manager for DELL SonicWALL Inc, Australia and New ZealandThe issues affecting businesses are similar around the world. The key issues and points of vulnerability are around human engagement.
Start preparing for Privacy Bill changes
05 March, 2013Australian organisations should act now and start preparing for next year’s changes to privacy law, lest they breach the new rules and cop a huge fine.
Kaspersky Endpoint Security for Business
27 February, 2013 | Supplied by: Kaspersky Lab Australia & New Zealand Pty LtdKaspersky Endpoint Security for Business (KESB) is intended to help businesses overcome challenges in managing a secure network.
Three IT problems you didn’t know you had
14 February, 2013 by Anthony CaruanaWith so much change happening in enterprise IT with the proliferation of mobile devices, the introduction of BYOD and shifts towards cloud-based systems, there can be moments where the importance of security can take a back step in the name of expedience.
Antivirus shootout cuts scan time from three hours to three minutes
05 February, 2013 by Andrew Collins | Supplied by: Webroot Software, Inc.The Royal Flying Doctor Service Western Operations (RFDSWO) has implemented a new antivirus system, cutting full system scan times from about three hours to under three minutes, and increasing the performance of endpoint machines.
Govt’s data retention plans “really bad”; Juniper routers at risk; China behind Twitter hack?
05 February, 2013 by Andrew CollinsIn news this week: web legend Sir Tim Berners-Lee calls the Australian government’s data retention plans “really, really bad”; Juniper reveals a critical flaw in its routers; and the world speculates on who was behind the recent massive attack on Twitter.