Security

$6m stolen in bitcoin hack; TPG drops FTTB - for now; iiNet's shutdown in Perth heat

13 January, 2015

Bitstamp has reopened its doors following the theft of about $6m worth of bitcoins; TPG withdraws its FTTB products, citing insufficient time to handle new regulations; and iiNet forced to shut down parts of its Perth data centre on 45°C day.


Security in 2015 - should you be afraid?

12 January, 2015 by Technology Decisions staff | Supplied by: BAE Systems

BAE Systems Applied Intelligence has issued its top five predictions for the digital criminality landscape in 2015, including the trend for companies to actively search out cybercriminals before they can strike.


Seven security trends to watch in 2015

07 January, 2015 by Dr Hugh Thompson | Supplied by: Blue Coat Systems Australia Pty Ltd

From attackers hiding behind encryption, to ransomware developers targetting smaller businesses and unwanted software slowing down your smartphone, the new year will see a host of security and privacy concerns evolve.


Infocrime is putting your business at risk

18 December, 2014 by Craig Searle, Head of Cyber Security, Asia Pacific, BAE Systems Applied Intelligence | Supplied by: BAE Systems

Protecting against the myriad cyber threats is a massive undertaking that is only going to become more complex. Threat intelligence will be a key weapon in that battle.


WatchGuard Firebox M400 and M500 NGFW and UTM appliances

11 December, 2014 | Supplied by: WatchGuard Technologies Inc

The WatchGuard Firebox M400 and M500 next-generation firewall and unified threat management appliances have been specifically engineered for mid-size and distributed enterprises.


Six infosec tips I learned from Game of Thrones

09 December, 2014 by Corey Nachreiner* | Supplied by: WatchGuard Technologies Inc

In the Game of Thrones universe, the good guys lose as many battles as they win. But we can learn from their mistakes. Follow these six security tips and perhaps you’ll prevail when the digital White Walkers storm your network gates.


Security, IoT, cloud to be top tech trends in 2015

04 December, 2014 by Dylan Bushell-Embling

With 2014 drawing to a close, experts have weighed in on the expected top technology trends of 2015. Advanced cyberthreats, the IoT, cloud and big data technologies are expected to dominate.


Management and encryption - two peas in a pod

02 December, 2014 by Sven Radavics | Supplied by: Imation ANZ Pty Ltd

When it comes to management and encryption, all too often the security industry is applying old-world thinking to a new-world problem. A different approach is needed, argues Sven Radavics.


Sony Pictures systems shut down in hack attack

27 November, 2014 by Dylan Bushell-Embling

A hacker group calling itself #GOP shut down the computer systems of Sony Pictures, claimed to have stolen all the film studio's data and threatened to release it if unspecified demands aren't met.


Identity access management you can bank on

26 November, 2014 | Supplied by: First Point Global

ING DIRECT, one of Australia's largest banks, has successfully rolled out an identity access management system that has dramatically improved turnaround times and efficiency, and decreased risks.


Protect yourself from your printer

25 November, 2014 by George Kharoufeh, Product Marketing Manager, Kyocera Document Solutions | Supplied by: Kyocera Document Solutions Australia

Taking steps to secure your network and introducing printing protocols will help prevent your multifunctional printer from becoming a gateway to your confidential data.


Healthcare and privacy go together

19 November, 2014 | Supplied by: Varonis

Mercy Health and Aged Care Central Queensland needed a new system to improve data privacy and efficiency while providing a complete audit trail and satisfying compliance with information security standards.


US postal service hit with huge data theft

12 November, 2014 by Dylan Bushell-Embling

The US postal service has disclosed a major theft of customer and employee data from one of its computer systems in a hacking attack that may have originated from China.


Perimeter defence no longer adequate for security

11 November, 2014 by Dylan Bushell-Embling

Three in four security professionals agree that cybersecurity needs have changed in the last year and nearly as many expect needs to change again next year, a survey shows.


Government takes heat for metadata bill

05 November, 2014 by Dylan Bushell-Embling

The government has been criticised for sending mixed signals on whether its proposed metadata retention bill would be used for purposes that include pursuing online pirates.


  • All content Copyright © 2024 Westwick-Farrow Pty Ltd