What can we learn from the Snowden case?
08 June, 2015 by Daren Glenister, Field Chief Technology Officer, Intralinks | Supplied by: IntraLinksThe security perimeter has shifted from firewalls to identity management and now to content management, with the aim of preventing another Edward Snowden from succeeding.
As malware threats loom, end users are the weak link
21 May, 2015 by Dylan Bushell-EmblingThe ACCC has warned Australian businesses of an influx of malware and ransomware threats, while research has shown that corporate devices are most vulnerable when away from the security perimeter.
Dell SonicWALL TZ series firewalls
15 May, 2015 | Supplied by: Dell TechnologiesThe Dell SonicWALL TZ Series firewalls feature a dramatic increase in network performance to support faster internet speeds, the ability to analyse encrypted SSL traffic and an integrated wireless controller.
Australian enterprises fear a 'cryptoapocalypse'
13 May, 2015 by Dylan Bushell-EmblingAustralian enterprises risk losing $48.4m over the next two years from attacks on security keys and fear a 'cryptoapocalypse' whereby security key algorithms are compromised overnight.
Lenovo exposed users to "massive security risk"
08 May, 2015 by Dylan Bushell-EmblingMere months after Lenovo's Superfish snafu, the company has been accused of having a "massive security risk" in pre-patched versions of its pre-loaded software.
Cybercrime costs Australia $1bn per year
23 April, 2015 by Dylan Bushell-Embling
The Australian Crime Commission is working to alleviate the significant threat posed by cybercrime, which is costing Australia at least $1 billion annually.
New cybersecurity policy should address skills gap: AIIA
21 April, 2015 by Dylan Bushell-EmblingThe government's revised national cybersecurity strategy should address issues including the IT security skills gap and include a mechanism to let businesses report attacks anonymously, the AIIA has urged.
Security industry losing the cyberwar: RSA
13 April, 2015 by Dylan Bushell-Embling
The information security industry is failing to keep pace with the threat posed by cybercriminals, new research suggests.
Copyright battle heats up as code submitted to ACMA
09 April, 2015 by Dylan Bushell-Embling
The Australian broadband industry's proposed copyright notice scheme has been submitted for regulatory approval, but the code has been criticised for not including safeguards against copyright trolls.
84% of Aussie firms still vulnerable to Heartbleed
08 April, 2015 by Dylan Bushell-Embling | Supplied by: Venafi
Around 84% of the Australian organisations vulnerable to the Heartbleed exploit are still not fully protected a year after its discovery, according to Venafi.
Windows Server 2003? Your time is up
08 April, 2015 by Greg Stone | Supplied by: Microsoft Pty Ltd
Support for Windows Server 2003 will cease 100 days from now, yet almost 60% of businesses are still reliant on it. Microsoft Australia's CTO, Greg Stone, talks us through what to do about upgrading.
KPMG Australia buying IAM vendor First Point Global
24 March, 2015 by Dylan Bushell-Embling | Supplied by: KPMG AustraliaKPMG Australia will purchase identity and access management vendor First Point Global as part of wider efforts by the KPMG global network to augment its global security capabilities.
Four in five companies fail PCI compliance assessment
13 March, 2015 by Dylan Bushell-EmblingCompanies handling payment card data often fail to fully comply with the 12 PCI data security standards, and current security approaches are failing to deter attackers, a report states.
Bank spoof trojan infections fell 50% in '14
10 March, 2015 by Dylan Bushell-EmblingEnforcement efforts managed to reduce the threat posed by online bank trojans in 2014, but another threat may be returning to the fore, with a new Australian scam involving the CryptoLocker ransomare emerging.
Most vulnerable OSes and applications in 2014
27 February, 2015 by Cristian Florian, GFI LanGuard Product Manager, GFI Software | Supplied by: GFI Software LimitedApple leads the way in operating system vulnerabilities, according to data from the US National Vulnerability Database.