Security Watch: WatchGuard appoints new Northern Region sales manager
Firewall maker WatchGuard Technologies has appointed Gurkirat Singh as Australia’s Northern Region Territory Sales Manager.
Anthony Caruana | 22 Jun | Read more
Firewall maker WatchGuard Technologies has appointed Gurkirat Singh as Australia’s Northern Region Territory Sales Manager.
Anthony Caruana | 22 Jun | Read more
The federal government last night passed controversial new laws aimed at combating online piracy after winning bi-partisan support for the measures in the lower house.
Andrew Colley | 17 Jun | Read more
The high profile of Australia's large banks and telcos, as well as the sophistication of its information-security profile, convinced upstart US-based endpoint-security provider Tanium to fast-track its overseas expansion with a significant regional presence based in Sydney, according to the company's regional vice president.
David Braue | 12 Jun | Read more
Microsoft has added a security feature to Internet Explorer 11 to prevent so-called SSL-stripping attacks but it’s taking a lighter touch approach to enforcement than in Edge for Windows 10.
Adobe has agreed to allow an independent auditor to ensure it has taken sufficient to harden its systems following a cyber attack that left 38 million of its customers exposed to fraud in 2013.
Andrew Colley | 10 Jun | Read more
Peter Cooper of the GWA Group has an extensive history as a senior information security professional. One morning a few years ago some strange things were being noticed at a warehouse at the company worked for. Nothing that looked too severe but the sort of thing that looked like an innocuous anomaly.
Anthony Caruana | 09 Jun | Read more
The risk of insider security threats is increasingly recognised to be growing but the budgets to stop them are not, a new survey of IT security professionals has revealed.
David Braue | 05 Jun | Read more
Along with death and taxes, security compliance programs are becoming one of the unavoidable facts of life for many of us. That means someone has to create a compliance program so you can monitor and put appropriate controls in place around information security.
Anthony Caruana | 05 Jun | Read more
ISO/IEC 27001:2013 specifies the requirements for establishing, implementing, maintaining and continually improving an information security management system within the context of the organisation. It was recently updated and Dr. Angelika Plate formerly of the German Information Security Agency and now an independent consultant, walked through the changes at AusCERT 20
Anthony Caruana | 04 Jun | Read more
Justin Clacherty is on the leadership team of Future Wise Australia, a “fiercely non-partisan organisation focused on policy advocacy and research in technology, health, and education.
Anthony Caruana | 04 Jun | Read more
Visa and FireEye, have announced their intention to co-develop tools and services to help merchants and issuers protect against advanced cyber attacks targeting payment data.
Anthony Caruana | 04 Jun | Read more
There is increased scrutiny by the Board and Management of business risks and potential impact of Cyber Security on operations. As the person who is responsible for hiring the new CISO, what are the key criteria that you ‘must’ have for the candidate?
Recent equipment refreshes have not prevented Australia’s network infrastructure from being vulnerable to failure and security breaches, a new study has warned.
Andrew Colley | 03 Jun | Read more
AusCERT announced the expansion of their partner program with iDcare coming online. Care provides services for people who have been impacted by identity theft. This adds to the recent partnership with aarnet.
Anthony Caruana | 03 Jun | Read more
The global market for antivirus solutions is already full of competitors, but the founder of Adelaide company PC Range is confident that a white-branding strategy and the addition of cloud-security capabilities later this year will help his SecuraLive security suite carve out a good portion of the market.
David Braue | 28 May | Read more
A bug in the OS X client for Synology’s Cloud Station for syncing files across devices could allow an attacker to take over the machine.
CrowdStrike researchers announced this morning that they have discovered a buffer overflow vulnerability in many of today's most popular virtual machine platforms that could potentially allow hackers access to the host.
Maria Korolov | 13 May | Read more
Employees and contractors of Vodafone Australia will benefit from increased security as part of an ongoing global overhaul of privileged-account management that will strengthen the company's ability to control access to its networks.
David Braue | 18 May | Read more
Security providers are rapidly adapting their protections to encompass evolving Internet of Things (IoT) models, but the impending collapse of an Australian IoT startup and greater attention from hackers suggest that the battle to secure the IoT is still well and truly in its early days.
David Braue | 15 May | Read more
Google is splitting its Gmail login process across two pages in preparation to introduce “new authentication solutions”.