- Megaupload seeks return of millions in frozen Hong Kong assets
- Privacy jitters derail controversial K-12 big data initiative
- Cloud attacks are following enterprise workloads
- Survey respondents shun much-hyped mobile shopping technologies
- Russian SMS Trojan for Android hits US, dozens of other countries
- Should Australians prepare for rubber-hose cryptanalysis?
- USB Type-C: Simpler, faster and more powerful
- Data retention: Just like diamonds, metadata is forever
- Connected vehicle tech trial to start trucking on in NSW
- UPDATED: 4G in Australia: The state of the nation
security industry in pictures
Akamai Technologies, whose network handles up to 30 percent of all Internet traffic, said Sunday a researcher found a fault in custom code that the company thought shielded most of its customers from the Heartbleed bug.
Symantec Australia held its annual symposium at the Sydney convention centre. Delegates heard insights from Symantec's Brenton Smith, Sean Kopelke and Fujitsu’s John Kaleski.
Arbor Networks has acquired Australian security analytics firm Packetloop and is set to hire 12 new staff for a Sydney research and development centre.
Plans to build an Australian Cyber Security Centre (ACSC) have been slammed by the Opposition for containing few details about how the ACSC will be funded or staffed.
This article provides you with an overview of the current state of application security testing. Some of the challenges with application security testing include ensuring adequate coverage of black-box application testing, false negative issues with white box testing using automated source code analysis software and the lack of experience in the security industry with testing of client side applications.
Whitepapers about security industry
Any size organization can be a target, generally because of weak authentication. Password-only protection is simply too risky. In addition, stolen passwords were responsible for major thefts of records from Best Buy and Twitter. This paper will show why any size organization can be a target; and how the legal and threat environment—combined with BYOD and cost factors—make multi-factor, risk based authentication the logical approach to solving the problem.
Existing IT operational models and an ageing infrastructure are CIOs back from their full potential. This paper reveals the three IT imperatives for a CIO-led transformation, and details how CIOs are adopting strategies to change IT and assert their organisations as business leaders and innovators.
Why do we continue to pay the earth for global roaming? With Telstra increasing global roaming charges by 100-500% in over 180 countries, bill shock can only get worse. This paper investigates why, what and how your company can address the need for global coverage.