Australians pessimistic that cybersecurity skills gap will be closed within a decade
But training providers, looking outside the industry for “a new breed of cybersecurity talent”, are doing their part to help
David Braue | 13 Dec | Read more
But training providers, looking outside the industry for “a new breed of cybersecurity talent”, are doing their part to help
David Braue | 13 Dec | Read more
In a climate of rising fraud, most consumers are still transacting online despite poor security habits
David Braue | 11 Dec | Read more
And Microsoft is offering new tools help admins fix their own faults.
A quarter of Black Friday purchases suspected to be fraudulent – and China blamed for 57 percent of them
David Braue | 09 Dec | Read more
Labor attacks “broken promises” around encryption laws but Melbourne developers report no concerns from overseas customers
David Braue | 06 Dec | Read more
When we tested next-generation firewalls last May, at least one important security vendor wasn't there: Cisco, because they weren't ready to be tested. Now that the ASA CX next-generation firewall has had a year to mature, we put the product through its paces, using the same methodology as our last NGFW test.
Joel Snyder | 17 Jun | Read more
LANDesk’s foray into system, asset and user management is the latest version of its Total User Management suite, which we’ll affectionately call TUM.
Ashton Mills | 29 May | Read more
What is big, flexible, red and costs more than your average mid-range family sedan? Not a HSV—not quite that much—but this top of the range unified threat management (UTM) device (or in this case, XTM– the X presumably being a variable) is definitely in a high performance category. The XTM2050 from WatchGuard is one of a new breed of security devices that packs punch.
Review of the Juniper EX4500 Ethernet switch. They connect desktops to servers in the data centre via a three-tier system of access, aggregation and core Ethernet switches.
With data becoming more valuable, the need for security also gets greater. Today’s technology and working behaviours both facilitate data being easily transported. Information is far less static due to home working, multiple office sites, low cost USB storage devices and DVDs. With all these portable devices and data being moved from place to place we must be mindful of data backup.
Enex Testlab | 16 Oct | Read more
Quantum decryption means the data you encrypt today will be compromised within a decade.
CSO & Enex Testlab join forces to deliver a first class IT Security event in Sydney's Four Seasons Hotel.
Abigail Swabey | 24 Sep | Read more
Presentation by Russell Clarke and Mark Jones - Directors of RMSEC.
Russell Clarke and Mark Jones | 31 Jan | Read more
These days barely a day goes by where there isn’t some sort of network security breach or hack or malfunction of some sort. This year too we had the rise of groups such as Anonymous and Lulz that sought out attention for their activities. Here we take a look at the year in pictures of some of the key security problems that grabbed our attention.
Michael Cooney | 08 Dec | Read more
The complexity of encryption schemes has been increased dramatically in an attempt to outpace the development of computational tools designed to crack them. Now it's important to devise algorithms that can't be brute forced for trillions of years in the hopes that they will remain secure long enough to be useful before they, too, are broken. Here's a quiz about encryption to see how well you are versed in one of security's most important components. Keep track of your score and check at the end to see how well you stack up.
Tim Greene and Jim Duffy | 29 Sep | Read more
This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach.
By Steve Martino, Vice President, Chief Information Security Officer, Cisco | 23 Apr | Read more
Perhaps it was an omen of what was to come when the city of San Francisco on New Year's Eve 2010 couldn't get a backup system running in its Emergency Operations Center because no one knew the password.
Ellen Messmer | 02 Dec | Read more
No company wants to be associated with a data breach, but if your systems are compromised the fallout can sometimes be more damaging than the act itself.
Matt Rodgers | 22 Sep | Read more
Stealthy, sometime long-term cyber-espionage attacks to steal sensitive proprietary information -- what some now call "advanced persistent threats" (APT) -- have become a top worry for businesses.
Ellen Messmer | 08 Aug | Read more
This is a real issue, and not just one for the well publicised attacks on major corporations such as Sony, Lockheed, Google, and Citi. It affects every business and organisation, large and small. More worrying still, it is now widely suggested that hackers and espionage organisations are moving away from directly attacking their target company, choosing instead to route their attack through suppliers to their target. Thus, even small and seemingly innocuous “third party” businesses who would not consider themselves as potential targets are now on the front line of this cyber war.
Malcolm Higgins | 13 Jul | Read more
The spooky season is still not over for Australian companies, as the destructive Emotet threat is back, and it is affecting unpatched systems.
James Ley, Ivanti | 09 Dec | Read more
Ensuring top-level enterprise security has never been more important for the financial services (FS) industry.
Monica Hovsepian, OpenText | 09 Dec | Read more
You have a very secure environment, you have the latest firewalls which have been configured well, you have really good network segregation and you have the latest in endpoint detection and response platforms with a well-configured siem platform.
Craig Ford | 20 Dec | Read more
I don't know about the rest of you, but I seem to spend a bit of time lately in rideshares like Uber, Didi, Ola or any of the other new entrants to the market.
Craig Ford | 17 Dec | Read more
Wondering why you keep hearing about cyber-security breaches every other day and questioning whether your current protection measures are fit for purpose?
Joanne Wong | 03 Dec | Read more