Management and encryption - two peas in a pod
02 December, 2014 by Sven Radavics | Supplied by: Imation ANZ Pty LtdWhen it comes to management and encryption, all too often the security industry is applying old-world thinking to a new-world problem. A different approach is needed, argues Sven Radavics.
Sony Pictures systems shut down in hack attack
27 November, 2014 by Dylan Bushell-EmblingA hacker group calling itself #GOP shut down the computer systems of Sony Pictures, claimed to have stolen all the film studio's data and threatened to release it if unspecified demands aren't met.
Identity access management you can bank on
26 November, 2014 | Supplied by: First Point GlobalING DIRECT, one of Australia's largest banks, has successfully rolled out an identity access management system that has dramatically improved turnaround times and efficiency, and decreased risks.
Protect yourself from your printer
25 November, 2014 by George Kharoufeh, Product Marketing Manager, Kyocera Document Solutions | Supplied by: Kyocera Document Solutions AustraliaTaking steps to secure your network and introducing printing protocols will help prevent your multifunctional printer from becoming a gateway to your confidential data.
Healthcare and privacy go together
19 November, 2014 | Supplied by: VaronisMercy Health and Aged Care Central Queensland needed a new system to improve data privacy and efficiency while providing a complete audit trail and satisfying compliance with information security standards.
US postal service hit with huge data theft
12 November, 2014 by Dylan Bushell-EmblingThe US postal service has disclosed a major theft of customer and employee data from one of its computer systems in a hacking attack that may have originated from China.
Perimeter defence no longer adequate for security
11 November, 2014 by Dylan Bushell-EmblingThree in four security professionals agree that cybersecurity needs have changed in the last year and nearly as many expect needs to change again next year, a survey shows.
Government takes heat for metadata bill
05 November, 2014 by Dylan Bushell-EmblingThe government has been criticised for sending mixed signals on whether its proposed metadata retention bill would be used for purposes that include pursuing online pirates.
Government tables telco data retention Bill
30 October, 2014 by Dylan Bushell-EmblingThe government has introduced legislation that would compel local telcos to retain customer metadata for up to two years.
NSW departments must improve privacy governance
28 October, 2014 by Dylan Bushell-EmblingNSW's privacy commissioner has expressed concern over delays implementing privacy process reforms for NSW Government departments.
Google augments authentication with USB key
23 October, 2014 by Dylan Bushell-EmblingGoogle had added the option to use a physical USB - instead of a code - as a two-factor authentication method when logging into Google and other sites.
Dell augments cloud, security portfolios
16 October, 2014 by Dylan Bushell-EmblingAt Dell's User Forum in Sydney the company announced new cloud collaborations, as well as an NFV platform and next-generation firewall.
Optus teams with FireEye to tackle APTs
09 October, 2014 by Dylan Bushell-Embling | Supplied by: Optus Pty LtdOptus Business and FireEye have partnered to offer joint-managed security services, open two advanced security operation centres and research APTs targeting APAC firms.
Finding the middle ground for zero-day vulnerabilities
07 October, 2014 by Scott Crane, Director of Product Management, Arbor Networks Australia | Supplied by: Arbor NetworksThreats that target zero-day vulnerabilities are a key issue, as security solutions often fail to detect them because they don't know what they should be looking for. A new, 'middle way' is needed to tackle them.
Nude photo leak shows that passwords are passé
29 September, 2014 by Dylan Bushell-EmblingPasswords are a flawed method of maintaining online security and should be replaced with identity management systems, Centrify Regional Manager Derek Morwood has argued.