Cloud Computing
Trend Micro Q2 2015 roundup finds malicious app downloads for mobile devices increasing in Australia
Australia sees significant reduction in malicious URLs as cybercriminals become more inventive Australia was ranked…
New Palo Alto Networks PA-7080 delivers next-generation security at unrivalled scale for service providers and large enterprises
Palo Alto Networks has announced availability of the PA-7080, the newest and most powerful addition…
Akamai Q2 2015 State of the Internet – Security Report
Number of DDoS attacks more than doubled compared to Q2 2014; mega-attacks on the rise…
Frost & Sullivan Recognises WatchGuard’s APT Blocker with the 2015 New Product Innovation Award
Award-winning Solution Brings Enterprise-grade Advanced Malware and Zero-day Threat Protection to SMBs WatchGuard® Technologies has announced…
How to spot insider trading through behavioural analytics in the age of big data
Following this week’s U.S. identification of an international crime ring involving traders acting on market…
The dawn of ransomwear: How ransomware could move to wearable devices
Symantec has released new research that reveals ransomware attackers could also have wearables and other…
LogRhythm Extends Holistic Threat Analytics Suite with Endpoint Behavioural Anomaly Detection
Provides Visibility Into Endpoints and User Accounts Compromised by Advanced Threat Actors – Enabling Faster…
HP Advances Network Security with Comprehensive Threat Protection System
Actionable threat intelligence, enhanced visibility and analytics help enterprises protect against cyberattacks HP has introduced a…
AirPay Enables Secure and Frictionless Mobile Experience for Garena Using CyberSource Solutions
AirPay partners with CyberSource to heighten payment security and enable frictionless mobile checkout experience for…
BSA| The Software Alliance Settles Seven Unlicensed Software Cases in Australia totalling $147,000
BSA| The Software Alliance (BSA) has settled seven cases of illegal software usage in Australia…
AUSTRALIAN RESEARCH: Attitudes towards breaches and data theft highlight role of law and penalties
IT security professionals weigh in on ideal punishment for serious data breaches Websense, Inc. a…
UL completely automates payment brand terminal testing
UL is proud to introduce a new revolutionary module to automate payment terminal brand certification…
Blue Coat launches Endpoint Alliance Ecosystem
Provides customers with comprehensive end-to-end security solution Blue Coat Systems, Inc., a market leader in…
Cisco’s Recommendations to the Australian Prime Minister & Cabinet’s 2015 Cyber Security Review
Australia’s transition towards a more digitally-enabled economy will drive economic progress, improve social wellbeing, and…