- AusCERT 2013: Four dissenters to spur next year's security debates
- AusCERT 2013: Kill the password, says Mozilla
- AusCERT 2013: Unmanaged, unknown privileged logins opening the door for APTs: Cyber-Ark
- AusCERT 2013: Companies unaware of IPv6 security risk even if they’re not using it
- In pictures: AusCERT 2013 roundup
Data Center in pictures
Reddit is not just filled with pictures of cats and silly memes. Seriously. There's a lot of good content on the popular social news aggregator for network professionals whether you're focused on security, Windows, VoIP, IPv6 or a mixed bag.
Many times in discussions about Cloud computing, the hybrid Cloud – meaning a service that combines both off-site public Cloud and on-premises private Cloud computing resources – is thought of as being some nirvana state that will be the dominant architecture at some point in the future.
NOAA is working to fix a broken weather satellite -- the one that watches the Atlantic Ocean -- even as it gears up for what's expected to be an above-normal year for hurricanes.
As the IT infrastructure manager at Digital Intelligence Systems LLC (DISYS), an IT solutions company, I recently initiated the build-out of a virtual desktop infrastructure (VDI) to support our large mobile workforce, and learned some important lessons along the way that may help smooth the way for your VDI rollout.
Disaster recovery plans and the usual mix of uninterrupted power supplies (UPSs), co-location services, data mirroring and hot-standby technologies theoretically make it possible to weather any storm. But are backup systems, replication rules and fast failover solutions enough?
An easy step-by-step guide to the Bash command-line shell and shell scripting
When people talk about the Internet of Things (IoT), the most common examples are smart cars, IP-addressable washing machines and Internet-connected nanny cams.
Chances are you've heard about the Internet of Things (IoT)—or you will soon enough. The term carries a number of definitions. But in general, the IoT refers to uniquely identifiable objects, such as corporate assets or consumer goods, and their virtual representations in an Internet-like structure.
The sky is the limit for both the number and the types of tools that will eventually help enterprise IT fully embrace the cloud, say industry analysts and cloud integration experts.
Cloud vendors are delivering boatloads of new tools to help enterprise IT build, buy, manage, monitor, tweak and track Cloud services. These tools are designed to help IT execs free up their budgets and their staff so both can be used towards more strategic, line of business projects.
Shaw reviews Toshiba's Excite 10 SE tablet and HP's EliteBook Folio 9470m Ultrabook.
Whitepapers about Data Center
A study conducted by Verizon RISK Team with cooperation from the Australian Federal Police, Dutch National High Tech Crime Unit, Irish Reporting & Information Security Service, Police Central e-Crime Unit and United States Secret Service. This year our DBIR includes more incidents, derived from more contributors, and represents a broader and more diverse geographical scope. The number of compromised records across these incidents skyrocketed back up to 174 million after reaching an all-time low (or high, depending on your point of view) in last year’s report of four million. In fact, 2011 boasts the second-highest data loss total since we started keeping track in 2004. Read this report.
This research paper presents findings on APT-related spear phishing from February to September 2012. We analysed APT-related spear-phishing emails collected throughout this period to understand and mitigate attacks. The information we gathered not only allowed us to obtain specific details on spear phishing but also on targeted attacks. We found, for instance, that 91% of targeted attacks involve spear-phishing emails, reinforcing the belief that spear phishing is a primary means by which APT attackers infiltrate target networks.
CDex can extract the data directly (digital) from an Audio CD, which is generally called a CD Ripper or a CDDA utility.
Allianz Shared Infrastructure Services SE (ASIC) wanted to replace its current suite of management tools, some of which had been developed in-house, with a standard solution for the management of 600 network components in its data centre, in order to reduce costs and further improve quality. Find out what approach they took download today.
- FTJob Title: Mac Systems/ Enterprise Systems EngineerNZ
- FTTest EngineerVIC
- FTTechnical Business AnalystNSW
- FTTechnical Consulting ManagerNSW
- FTR&D EngineerSA
- FTWeb Analyst - WebTrendsVIC
- FTQuality ManagerSA
- FTLead Software EngineerSA
- FTSenior Python DeveloperNSW
- FTFlash / ActionScript Developer - ContractNSW
- FT.NET - Sitecore Developer - Melbourne - PermNSW
- FTOS Web Applications DeveloperNSW
- Analytics and personalisation drive leading marketer behaviour: Report
- Innovation and big data take centre stage during CMO panel
- Twitter targets second screen interaction with Amplify advertising partnerships
- Facebook talks hyper-targeting, analytics and cross-platform at AANA event
- Tapping into social experience: Tourism Australia