Technology
Security in the holiday season
For many employees, the approaching holiday season means Christmas parties, social gatherings, and spending more…
Xtralis VESDA-E selected by Telstra to upgrade existing and protect new switching exchages and data centres
The leading telecommunications provider in Australia upgrades its fire prevention with the VESDA-E, the latest…
Hewlett Packard Enterprise Tackles Cloud Sprawl with New Cloud Service Broker
Proactive cloud management service enables organisations to rapidly deploy and manage a mix of traditional…
FireEye Finds Chinese APT Group Attacked Hong Kong Media Outlets
FireEye has released the results of its research into a recent campaign carried out by…
Centrify calls for new look at cybersecurity in 2016
Centrify is warning organisations in Australia and New Zealand to recognise that compromised user…
Cyber Vigilantism: Your Country Needs You
The cyber battleground is already littered with direct hits as well as a landscape of…
One in five parents does nothing to protect their kids online, study reveals
More than half (52%) of parents believing that the threats of cyberbullying and inappropriate content…
Macquarie Telecom Deploys MapR to Secure Australian Government Communications
Cloud-based big data platform analyses massive amounts of data and strengthens proactive and predictive security…
Prototype Nation: The Chinese Cybercriminal Underground in 2015
By the end of 2013, the Chinese cybercrime underground was a very busy economy, with…
Canalys announces winners of APAC Channel Partner of the Year awards
Partners honoured at the APAC Canalys Channels Forum, the region’s largest independent channel conference Canalys…
CyberArk Launches New Industry Initiative to Promote CISO Cyber Security Expertise
Panel of Global 1000 CISOs Share Advice for Implementing Strategic Security Programs, Gaining Stakeholder Support…
Visibility and control over SSL traffic in an era of HTTP/2.0
F5 Networks “SSL Everywhere” architecture is centered on the custom-written SSL/TLS stack that is part…
Secure messaging apps to become everyday payment transaction platforms
A growing trend away from consumer apps to secure messaging apps is about to get…
Securing operational technology: big data’s big role
Convergence between operational technology (OT), the hardware and software that monitors and controls devices or…