Security » Case studies »
The image of organised crime rings running rampant across the Internet, creating legitimate-looking Web sites to lure cash from unsuspecting consumers, has many would-be customers scurrying back to the relative safety of the retail store environment.
When Chad Clement joined worldwide office furniture maker Haworth 18 months ago, he discovered the company needed to get a handle on network security.
Be prepared to go through a lot of scrutiny if you want to work in the Central Intelligence Agency's IT department, says chief information officer Al Tarasiuk.
Employment and training firm CVGT has installed a network management toolkit to enforce compliance and protect the financial and personal data of its 40,000-plus apprentices and trainees.
The University of Western Sydney (UWS) has today gone live with a managed Intrusion Detection System (IDS) for its 5000 users.
Sydney based law practice Law Partners Solicitors and Barristers (LPSB), has cleared network congestion and continual downtime by replacing its in-house Microsoft Outlook solution with hosted Exchange Server.
Employment and consulting agency Australian Recruiting has found refuge with a new anti-spam gateway and firewall solution after its IT network suffered a denial of service (DoS) attack, Trojan horse infections, and plagues of malware.
The Australian Defence Force Academy (ADFA) has rolled out automated patching software to minimize monthly load on staff manually patching machines.
With only a small IT staff, yet a significant amount of its business being conducted electronically, cyber security is an issue high on the priority list of Grant Raubenheimer, Hotel Manager of the Observatory Hotel in Sydney.
In past emergencies involving Vance Air Force Base in Oklahoma, U.S., the only way to contact some 2,500 military and civilian workers to tell them to return to the base pronto was with an old-fashioned telephone calling chain.
Papa Gino's and D'Angelo Sandwich Shops now can add fast, easy, bulletproof security to its traditional menu of quick, casual food.
Depository Trust and Clearing isn't taking any chances when protecting its network from application-layer attacks. The company's 450 software developers use an automated scanning tool to make sure that security holes are plugged during the software development life cycle, not after an application has been deployed.
It started as a relatively simple business-to-business hub. It became an industry-altering secure collaboration platform.
For the most part, hackers break into corporations for one reason: Status. "The hacking community is a strong meritocracy where status is determined by level of competence," says Dr. Max Kilger, a social psychologist for the Honeynet Project.
Upfront preparation helped my company ward off the SQL Slammer worm, which exploits a buffer overflow vulnerability in Microsoft SQL Server and creates a flood of packets, similar to a denial-of-service attack. But we still didn't totally avoid it.
The MD Andersen Cancer Center in Houston last week abruptly put an 18-month effort to provide wireless LAN access to 11,000 users on its five building campus on hold due to security concerns.
Eighteen months ago, my company, a large financial services organization, suffered a number of attacks that were stopped mostly by luck. With the awareness of security raised, management hired me as information security manager to secure their infrastructure and operations.
Lawyers work hard, and they work fast. Any activity that takes their focus away from the task at hand represents lost productivity and lost revenue. Slater & Gordon Lawyers needed to filter spam and email-borne malware and provide high availability for email. Results from the business solution they chose include 250 hours of IT staff time reclaimed annually for other tasks, long delays in email delivery alleviated, reduced email-related storage costs, and email failover to the cloud in minutes, avoiding hours-long outages. Find out how they got these results.
Gadwin Web Snapshot will effectively capture the entire page including all design elements when capturing web pages. It makes an image of the browser’s content ...
Allianz Shared Infrastructure Services SE (ASIC) wanted to replace its current suite of management tools, some of which had been developed in-house, with a standard solution for the management of 600 network components in its data centre, in order to reduce costs and further improve quality. Find out what approach they took download today.
- FTTechnical Consulting ManagerNSW
- FTTechnical Business AnalystNSW
- FTTest EngineerVIC
- FTJob Title: Mac Systems/ Enterprise Systems EngineerNZ
- FTWeb Analyst - WebTrendsVIC
- FTR&D EngineerSA
- FT.NET - Sitecore Developer - Melbourne - PermNSW
- FTQuality ManagerSA
- FTFlash / ActionScript Developer - ContractNSW
- FTOS Web Applications DeveloperNSW
- FTSenior Python DeveloperNSW
- FTLead Software EngineerSA
- CITRIX SYNERGY ’13: Partners and customers main focus in mobile strategy, says Willis
- CITRIX SYNERGY ’13: Mobile is key to a digital worklife, says CEO (+12 photos)
- ASI brings LapCabby to Australia
- Two in three Australian tweens are on a social network: McAfee
- Huawei Australia 2012 revenue up 61 per cent to $368m