Security
Legacy data protection technologies: how to avoid being vulnerable
Data centres are meant to make businesses more efficient and their users more productive. It…
CenturyLink’s four security predictions for 2016
According to CenturyLink’s Australian Hybrid IT Adoption Index, more IT decision-makers are adopting the hybrid…
Palo Alto Networks’ 6 cybersecurity predictions for Asia Pacific in 2016
1. Ransomware Ransomware will continue to evolve its methods of propagation, evasion techniques and continue…
MIF Regulation: have you paid attention to article 10?
Requirement for Visual and electronic identification of the card type Commonly known as the “MIF…
New PCI DSS Guidance From ISACA Helps Organisations Navigate Compliance Challenges
Implementing the demanding security requirements of the Payment Card Industry Data Security Standard (PCI DSS)…
Innovation agenda backs startup ecosystem
The Government’s National Innovation and Science Agenda represents an important step on the path to…
Why suppliers could be the weakest link in your cyber security strategy
Cyber attackers are increasingly using their target organisation’s supply chain as a route to attack…
Ashley Madison App Rebounding to Pre-Hack Highs – AVG Q3 App Report
Latest AVG Android App Performance & Trends Report finds surge in dating apps usage and…
Akamai Releases Q3 2015 State of the Internet – Security Report
Akamai mitigated a record 1,510 DDoS attacks, a 180% increase over Q3 a year ago;…
F5 Networks announces availability of Web Fraud Protection solutions to meet growing security needs of customers in Asia Pacific
WebSafe and MobileSafe secure financial and e-commerce apps and mobile apps against sophisticated fraudulent threats…
HOLIDAY HAZARD: Shopping Apps Highlight the Risk of Mixing Personal Apps and Business Data
With the holiday season fast approaching, people are seeking refuge in online shopping and mobile…
North American Underground: The Glass Tank
Compared to other underground communities in other regions, the cybercriminal underground in North America isn’t…
Seven security trends to watch in 2016
1. Jewels in the Cloud; Thieves in the Cloud The keys to the kingdom are…
Australian Consumers Embrace Digital Engagement But Say Security and Data Privacy Are Critical
Australians are enthusiastic supporters of digital engagement, with seven out of ten consumers acknowledging digital…