Big Data
IPSec Guard service brings 24/7 information security monitoring to businesses of all sizes
Around the clock Security Operations Centre powered by LogRhythm Australian organisations of all sizes can…
Arbor Networks 11th Finds Relentless Threat Environment Driving Demand for Managed Security Services and Incident Response Support
Arbor Networks Inc., the security division of NETSCOUT, has released its 11th Annual Worldwide Infrastructure Security…
Securing Singapore’s Smart Nation
Ron Totton, MD of SEA, BT Global Services looks at how governments should anchor security…
WatchGuard Announces New Secure Wireless Access Points so Customers Stay Safer Online
AP300 combines modern wireless features with award-winning security to better protect against network attacks WatchGuard…
Macrogen Deploys Multiple DRAGEN Processors from Edico Genome to Speed its Large-Scale Genome Analysis and Clinical Sequencing Service
Macrogen and Edico Genome have announced Macrogen has chosen multiple DRAGEN Bio-IT Processors to reinforce its…
Seagate Launches World’s Thinnest 2TB Mobile Hard Drive with Backup Plus Ultra Slim
New Compact External Drive Provides High-Capacity Storage for Users to Manage their Digital Lives Seagate…
Legacy data protection technologies: how to avoid being vulnerable
Data centres are meant to make businesses more efficient and their users more productive. It…
F5 Networks announces availability of Web Fraud Protection solutions to meet growing security needs of customers in Asia Pacific
WebSafe and MobileSafe secure financial and e-commerce apps and mobile apps against sophisticated fraudulent threats…
Top 10 Technology Challenges for IT Audit Professionals – New Study from ISACA and Protiviti
Complexity of rapidly changing technology takes #1 spot in international IT audit survey The top…
Macquarie Telecom Deploys MapR to Secure Australian Government Communications
Cloud-based big data platform analyses massive amounts of data and strengthens proactive and predictive security…
Securing operational technology: big data’s big role
Convergence between operational technology (OT), the hardware and software that monitors and controls devices or…
29% of us take our phones into the bathroom, despite the risk of being hacked or spied on
The relationship between users and their digital devices is often closer than that of best…
Centrify partners with leading Cloud Access Security Brokers to enhance cloud security for SaaS applications
Centrify has formed technology integration partnerships with five leading cloud access security brokers (CASBs): CloudLock,…
Hardware Encryption Market is Expected to Reach $296.4 Billion, Worldwide, By 2020
A new report by Allied Market Research titled, “World Hardware Encryption—Market Opportunities and Forecasts, 2014–2020”…