Feature Stories

Security in the holiday season
For many employees, the approaching holiday season means Christmas parties, social gatherings, and spending more…

Securing operational technology: big data’s big role
Convergence between operational technology (OT), the hardware and software that monitors and controls devices or…

BAE Systems supporting Australia’s next generation of cyber security professionals
With cyber security becoming a core concern for businesses and playing an increasingly important role…

McAfee Labs Report Reveals Prices of Stolen Data on Dark Web
Intel Security has released The Hidden Data Economy Report which provides an interesting insight into the…
Palo Alto Networks revolutionises security in Asia Pacific with the introduction of Advanced Endpoint Protection offering
Offers preventative approach to stop cyberthreats at the endpoint Palo Alto Networks has announced the availability of…

Intel Security names Nicole Kidman, Jessica Mauboy and Dr Chris Brown as Most Dangerous Celebrities 2015
Intel Security has announced the results of its ninth annual Most Dangerous Celebrities list, revealing that…

BAE Systems Applied Intelligence launches Cloud-based Cyber Security in ANZ
BAE Systems Applied Intelligence has announced it is bringing its cloud-based cyber security solutions to organisations…

How to spot insider trading through behavioural analytics in the age of big data
Following this week’s U.S. identification of an international crime ring involving traders acting on market…

Cisco releases first Smart Region Report focused on digital opportunities for South East Queensland
Identifies the potential of $10 billion to the region’s economy and more than 30,000 jobs…

Seven ways security can cost your business
Most organisations have a pretty good sense of the potential fallout from security breaches. However,…
Cisco’s Recommendations to the Australian Prime Minister & Cabinet’s 2015 Cyber Security Review
Australia’s transition towards a more digitally-enabled economy will drive economic progress, improve social wellbeing, and…

Cisco Midyear Security Report Reveals Sophisticated Cyberattacks Are Defining the Innovation Race between Adversaries and Defenders
Findings underscore the need for retrospective analysis to reduce Time to Detection The Cisco 2015…

BAE Systems Applied Intelligence: Know your cyber enemy – why cyber threat intelligence is emerging as a vital security approach
Managing cyber security on an internet that was never designed to be secure poses a…
Next-generation security products steal the show at 30th annual Security Exhibition & Conference
Leading security product and service suppliers including Avigilon, Ness Corporation and Inner Range used last…