security

security - News, Features, and Slideshows

security in pictures

News about security
  • IBM breaks silence over Census

    IBM has responded to the Census debacle after a conspicuous silence in the wake of Tuesday night’s website meltdown.

  • Turnbull takes aim at IBM, ABS over Census

    Prime Minister Malcolm Turnbull has shifted his tone on the Census debacle, with the PM telling a press conference that “which heads roll where and when” will be determined by the government review into the website meltdown that left most Australians unable to complete the Census.​

  • ‘Confluence of events’ led to Census failure

    In an at times bizarre press conference small business minister Michael McCormack has confirmed that a series of denial of service attacks targeted the Census 2016 website, with the Australian Bureau of Statistics eventually making the decision to pull it offline.

Tutorials about security
  • Breach detection: Five fatal flaws and how to avoid them

    IT Security today is not about defending a (non-existent) perimeter, but about protecting the organization's attack surface, which has changed dramatically due to the cloud, mobility, BYOD, and other advances in corporate computing that have caused fundamental shifts in network architecture and operations.

  • Digging Deeper into the Cisco ASA Firewall REST API

    Security orchestration methods and of course SDN is driving the need for programmable interfaces in  security products.  The Cisco ASA Firewall added a REST API back in December with the 9.3(2) code release.  I've asked Mason Harris, from Cisco, to write up a quick how-to primer on the ASA API capabilities.  Thank you Mason for the great information.

Features about security
  • How to stop hackers from reaching your deleted files

    What happens when you delete a file? Unknown to most, deleted data from a mobile phone can still be shared with others if not appropriately managed. In a worst-case scenario, this could end up in the hands of a hacker or e-criminal, and used against you.

  • 4 big plans to fix internet security

    Internet security is in crisis. These four proposals offer tangible solutions -- including one scheme to change the Internet's workings from top to bottom

  • ​Spying smart toys – How to protect your kids from exposure online

    In today’s day and age we see a huge amount of excitement around finding the biggest and best presents for kids. Not only this, children are encouraged to surf the web and use mobile apps from a young age. We are seeing toddlers trading toy cars and stuffed animals for tablets and mobile devices. Children are so attracted to having games and electronic devices to play with, they unwittingly give over their personal details without a second thought. Children are now so au fait with technology that it’s not unusual for children under the age of 4 to play with their tablets, mobile devices and watching TV right before bed.

Whitepapers about security

Market Place