Cyber Security Cyber Security | Virtualisation | February 9, 2014 AccessData Releases Forensic Toolkit 5 AccessData announced the release of Forensic Toolkit (FTK) 5. With this major release, AccessData brings an even faster and more… Read More
Big Data Big Data | Cyber Security | Top Carousel | February 9, 2014 Big Data Transforms Security Arthur (Art) Coviello, Jr, the widely acknowledged sage of cyber security, says that while cyber criminals are forever plotting new… Read More
Data Centres Data Centres | Featured Stories | Videos | February 8, 2014 The Evolution of the Data Centre – Exclusive Interview with Intel’s Balaji Srinivasan Read More
Cloud Computing Cloud Computing | Featured Stories | Security | Top Carousel | February 8, 2014 Genetec Unveils Stratocast Genetec has launched Stratocast™, a powerful yet easy-to-use Video Surveillance as a Service (VSaaS) solution powered by Microsoft Corp.’s Windows… Read More
Cloud Computing Cloud Computing | February 8, 2014 Policy for Government use of cloud computing services The Attorney-General, Mark Dreyfus QC, and the Minister Assisting for the Digital Economy, Senator Kate Lundy, today released a policy… Read More
Cloud Computing Cloud Computing | Cyber Security | Security | February 8, 2014 Analysts to Discuss Cloud Security and Risk at the 2013 Gartner Security & Risk Management Summit in Sydney, 19-20 August Buyers of commercial cloud services, especially software as a service (SaaS), are finding security provisions inadequate. Gartner, Inc. said SaaS… Read More
Communication Communication | February 6, 2014 Fortinet launches “Connected UTM” platform, releases twelve network security products for distributed enterprises Fortinet, a world leader in high-performance network security has unveiled 12 new products designed to connect and extend Fortinet’s integrated security platforms… Read More
Security Security | Technology | Top Carousel | February 1, 2014 Smart Cities Require Smart Security As Information Communication Technology (ICT) takes a bigger and bigger place in our day-to-day lives, cyber security becomes an essential… Read More
Information Information | Secondary Featured on Home Page | Security | February 1, 2014 Big Data Transforms Security Arthur (Art) Coviello, Jr, the widely acknowledged sage of cyber security, says that while cyber criminals are forever plotting new… Read More
Information Information | Security | February 1, 2014 Cloud Security & Risk Up For Discussion Analysts to Discuss Cloud Security and Risk at the 2013 Gartner Security & Risk Management Summit in Sydney, 19-20 August… Read More