Cloud Computing

Symantec Secures More Than 1 Billion Internet of Things (IoT) Devices
Symantec expands security portfolio with new Embedded Critical Systems Protection, designed to defend IoT devices…

F5 Survey Indicates Growing Hybrid Deployments Across Asia Pacific
Releases F5 BIG-IP 12.0 to improve on-premises and off-premises deployments F5 Networks has released findings from…

Three steps to guarding your business against emerging digital attack vectors
Online crime is harder to protect against due to the global explosion of connected devices;…

Trend Micro Q2 2015 roundup finds malicious app downloads for mobile devices increasing in Australia
Australia sees significant reduction in malicious URLs as cybercriminals become more inventive Australia was ranked…

New Palo Alto Networks PA-7080 delivers next-generation security at unrivalled scale for service providers and large enterprises
Palo Alto Networks has announced availability of the PA-7080, the newest and most powerful addition…

Akamai Q2 2015 State of the Internet – Security Report
Number of DDoS attacks more than doubled compared to Q2 2014; mega-attacks on the rise…

Frost & Sullivan Recognises WatchGuard’s APT Blocker with the 2015 New Product Innovation Award
Award-winning Solution Brings Enterprise-grade Advanced Malware and Zero-day Threat Protection to SMBs WatchGuard® Technologies has announced…

How to spot insider trading through behavioural analytics in the age of big data
Following this week’s U.S. identification of an international crime ring involving traders acting on market…

The dawn of ransomwear: How ransomware could move to wearable devices
Symantec has released new research that reveals ransomware attackers could also have wearables and other…

LogRhythm Extends Holistic Threat Analytics Suite with Endpoint Behavioural Anomaly Detection
Provides Visibility Into Endpoints and User Accounts Compromised by Advanced Threat Actors – Enabling Faster…

HP Advances Network Security with Comprehensive Threat Protection System
Actionable threat intelligence, enhanced visibility and analytics help enterprises protect against cyberattacks HP has introduced a…

AirPay Enables Secure and Frictionless Mobile Experience for Garena Using CyberSource Solutions
AirPay partners with CyberSource to heighten payment security and enable frictionless mobile checkout experience for…
BSA| The Software Alliance Settles Seven Unlicensed Software Cases in Australia totalling $147,000
BSA| The Software Alliance (BSA) has settled seven cases of illegal software usage in Australia…

AUSTRALIAN RESEARCH: Attitudes towards breaches and data theft highlight role of law and penalties
IT security professionals weigh in on ideal punishment for serious data breaches Websense, Inc. a…