Security

Nearly half of millennials use the same password for all accounts
ESET’s second cyber-savviness report compares the cybersecurity risks, behaviours and concerns for millennials and baby-boomers…

WatchGuard Technologies To Accelerate Channel Momentum with New APAC Marketing Manager Appointment
WatchGuard Technologies has announced the appointment of Paul Sadler as APAC Marketing Manager. Based in…

IBM Census 2016 Statement
IBM statement attributed to an IBM spokesperson: We genuinely regret the inconvenience that has occurred.…

Ixia redefines network bypass switch market
New iBypass VHD improves security resilience with non-stop visibility/monitoring Ixia has announced iBypass VHD, a modular,…

Instagram accounts hacked, altered to promote adult dating spam
Norton by Symantec has found that scammers are hacking Instagram accounts and altering profiles with…

How can cyber risk management facilitate a more resilient organisation?
Greg Bolton is the Manager Governance & Risk at Powerlink Queensland, with over 20 years’ professional management…

Four hidden issues for digital transformation
The world is being transformed, and the way people interact with work, technology and society…

Deploying and troubleshooting wireless networks for mobile unified communications
While mobile working is now a given for many employees, a key challenge has been…

Check Point Appoints Director of Channel Sales – Australia To Support The Delivery of Leading Protection Against Cyber Threats
Check Point Software Technologies has announced the appointment of Craig McGregor as Channel Sales Director Australia.…

BT Received Highest Score for Extended Domestic Network in Gartner’s APAC Critical Capabilities Report for Network Services
BT received the highest score in Extended Domestic Network, one of the four use cases…

Trend Micro (Dr Jon Oliver) commentary on Census 2016 hacking
Says Dr Jon Oliver, senior architect at Trend Micro: “I have complete confidence that the…

How to harness cloud without the bill shock
Lowering the total cost of cloud ownership (TCCO) is becoming a priority for most organisations…

Check Point Researchers Uncover ‘QuadRooter’ Vulnerability Affecting Over 900M Android Devices
Four newly discovered Android vulnerabilities can give attackers complete control of devices and access to…

A West African Cyber Threat
“Nigerian prince” and “419” scams have plagued victims for decades and transitioned to the Internet…