- Megaupload seeks return of millions in frozen Hong Kong assets
- Privacy jitters derail controversial K-12 big data initiative
- Cloud attacks are following enterprise workloads
- Survey respondents shun much-hyped mobile shopping technologies
- Russian SMS Trojan for Android hits US, dozens of other countries
- Should Australians prepare for rubber-hose cryptanalysis?
- USB Type-C: Simpler, faster and more powerful
- Data retention: Just like diamonds, metadata is forever
- Connected vehicle tech trial to start trucking on in NSW
- UPDATED: 4G in Australia: The state of the nation
Computer Emergency Response Team (CERT) Australia has called for more Australian organisations to report cyber security issues to the police following the results of its annual survey.
Many enterprises around the world think they are prepared for cyber attacks but the reality is that any organisation is at risk of a security breach, consulting firm Deloitte has warned.
The Australian security-as-a-service market climbed 17.2 per cent this year and was driven by increasing Cloud adoption, according to new research from analyst firm, Frost & Sullivan.
Tax deductions, photo albums and Web source codes were just some of the kinds of personal information Sophos found on 50 USB keys purchased in a RailCorp lost property auction in Sydney.
While the repeated hacking of Sony’s PlayStation Network service grabbed mainstream media attention this year, an even more surprising compromise was being played out with RSA’s SecurID tokens, earning it a place in the Top 10 Influential list for 2011.
Whitepapers about information security
Your company's information is often not secured in a large safe which can be easily protected. Instead, information is spread across many systems, networks and devices exposing it to a higher possibility of it being compromised in some way. This paper discusses the challenges of vulnerability management - human, implementation, changes, and software and how to overcome these by implementing an effective vulnerability management program.
Read this independent research report to learn how business managers around the world are using Cloud applications. Discover the top motivations for adopting the Cloud, the most common problems and recurring pitfalls; common barriers to Cloud application integration and the consequences of security breaches and compliance issues.
Why do we continue to pay the earth for global roaming? With Telstra increasing global roaming charges by 100-500% in over 180 countries, bill shock can only get worse. This paper investigates why, what and how your company can address the need for global coverage.