Technology

Vormetric hardens Data Security Manager with Thales
Cloud and big data environments demand high assurance data centric security Thales and Vormetric have…

Cisco Annual Security Report Reveals a Decline in Defender Confidence and the Increased Impact of Industrialized Attackers
Businesses make strides in advancing security posture in the face of persistent attacks that take…

WatchGuard Announces New Secure Wireless Access Points so Customers Stay Safer Online
AP300 combines modern wireless features with award-winning security to better protect against network attacks WatchGuard…

$7.8 million to take bright aussie ideas to the world
A $7.8 million investment in 17 innovative Australian companies will benefit the mining, information technology,…

BT Joins New Global Alliance Bringing Real Time Digital Insights From The Store And Across The Supply Chain
The Acuitas Digital Alliance is has launched by global technology leaders BT, Intel, NexGen Packaging,…

Infinera and Telstra Validate Advanced Coherent Toolkit on 9,000 km Endeavour Trans-Pacific Cable
Infinera and Telstra have announced the successful validation of Infinera’s Advanced Coherent Toolkit (ACT) for…

Android.Bankosy: All ears on voice call-based 2FA
Android.Bankosy gets updated to steal passwords sent through voice calls generated by 2FA systems. In…
90% of industries have patient data breaches, says Verizon 2015 Protected Health Information Data Breach Report
Stolen medical information is a much more widespread issue than previously thought, affecting 18 out…

Ixia announces first 50 Gigabit Ethernet (GbE) validation solution on a proven, field tested platform
Ixia Xcellon-Multis QSFP28 Interface Load Module optimises bandwidth, reduces expenses for customers with hyper-scale data…

Ascending the Ranks: The Brazilian Cybercriminal Underground in 2015
The Brazilian underground’s emergence can largely be attributed to an environment where quick returns at…

Forcepoint brings fresh approach to safeguarding users, data and networks from insider and outsider threats
@ForcePointsec announced as the new security brand with integration of Raytheon cyber products, Websense and acquisition…

BT secures major cloud services contracts with the EU
New contracts create one of the largest government clouds in Europe and executes on BT’s…

The role of containerisation in 2016
DevOps is the IT approach that combines development and operations in one unified front. Containerisation,…

ISACA Survey: 63% of IT Professionals Are Against Governments Having Backdoor Access to Encrypted Information Systems
Global poll reveals skepticism about data breach disclosures and anticipated hiring challenges due to cybersecurity…