Security

SWIFT Action Required – By David Stafford-Gaffney
On April 30, The New York Times reported that the Federal Reserve Bank of New…

Managing Cyber Risk a Top Priority in Asia Pacific, Yet Vulnerability Management Strategies Lag According to New Research
Regional survey of information security professionals found 80 percent of companies attacked in 2015 lacked…

Red Hat opens Canberra office to bring open hybrid cloud solutions to broader market in ANZ growth
Red Hat has announced the opening of its Canberra office. The office was opened in response…

CIVIL SECURITY AND CIVIL DEFENCE – A FREE FORUM FOR PROFESSIONALS
CIVSEC 2016 is an international forum dealing with the acutely relevant, and inextricably interconnected, imperatives…

UXC Saltbush: Cyber security leadership from the top
There are many reasons to be encouraged by the Federal Government’s Cyber Security Strategy for…

Cybersecurity breaches hit 63 per cent of Australian organisations, new CompTIA research reveals
71 per cent of organisations experienced mobile security incidents May 5, 2016 – 63 per…
Zscaler Launches Zscaler Private Access – Remote Access Without The Security Risk of VPNs
Zscaler, the leading cloud security provider, today announced the introduction of Zscaler Private Access, a…

WatchGuard Response to Federal Budget
David Higgins, ANZ Regional Director, WatchGuard Technologies “The Government’s recent investment into funding cyber security…

Check Point Software Technologies Responds to Federal Government Budget
David DeLaine, Regional Managing Director for Australia and New Zealand – Check Point Software Technologies “Check…

Four steps to implementing a big data program in the cloud
Big data projects don’t exist in a vacuum. Your big data infrastructure elements should have…

Dark Motives Online: An Analysis of Overlapping Technologies Used by Cybercriminals and Terrorist Organizations
Cybercriminal activities have always involved the abuse of legitimate online tools and services. Examples of…

(ISC)² Partners with ST Electronics to Offer Globally Recognised SSCP Training in Singapore
First ever SSCP training offered with hands-on practical using cyber range to help security practitioners defend…

Why you should use a ‘robo-hacker’ before launching a bug bounty program
Companies with a heavy online presence often employ so-called ‘white-hat’ hackers to discover vulnerabilities in…

CrimTrac selects NEC to provide national facial recognition and fingerprint matching capability
NEC Australia has been selected by Federal Government agency CrimTrac to deliver a national capability…