Features

  • Iris ID systems go mainstream

    Dropping prices, fast processing speeds and more user-friendly designs have given a boost to this highly accurate biometric technology.

  • Microsoft board motivated to hire new CEO before activist joins in early '14

    Microsoft's board of directors wants to wrap up its search for a new CEO before the end of the year, according to Bloomberg, citing anonymous sources close to the action.

  • Forget fingerprints: Your iris is your new identity

    At the entrance to The Vault, the most secure room within the most protected building operated by security services provider, Symantec, an iris recognition system stands guard as the last line of defense.

  • Straight talk on security gets employees to listen -- and comply

    Sure, you want users to comply with security edicts, but would you phish your own employees or share your company's hack history? At least some CIOs say yes.

  • Applying Big Data approaches to information security a challenge

    Applying Big Data approaches to information security can help enterprises build better situational awareness capabilities, but implementation could prove to be a major challenge, security experts said at the RSA Conference 2013 being held here this week.

  • How to talk security so people will listen (and comply!)

    Sure you want users to comply with security edicts, but would you phish your own employees or share your company's hack history? At least some CIOs say yes. Insider (registration required)

  • Worst security snafus of 2012

    The first half of 2012 was pretty bad - from the embarrassing hack of a conversation between the FBI and Scotland Yard to a plethora of data breaches - and the second half wasn't much better, with events including Symantec's antivirus update mess and periodic attacks from hactivists at Anonymous.

  • PDF files most trusted...and most targeted

    PDF files are one of the most common, and most trusted document formats out there. However, that trust, combined with the cross-platform use of PDFs makes the Adobe file format one of the most targeted and exploited by malicious attacks as well.

  • Free vs. fee: Free, paid antivirus programs

    Depending on whom you ask, paying for antivirus software is either a good investment or a total ripoff. In reality, neither viewpoint is accurate. You can find plenty of good reasons to choose a paid antivirus product, and plenty of good reasons to go with a freebie.

  • DR a growing concern for A/NZ CIOs: Symantec

    CIOs in Australia and New Zealand are increasingly getting involved in the disaster recovery planning of their organisations, according to a new survey from Symantec.

  • Symantec gets good vibes from virtualized browser

    Security vendor Symantec is using new virtual machine technology to protect Web surfers from online attack.

  • Symantec: Online underground economy is booming

    An online underground economy has recently matured into an efficient, global marketplace to trade stolen goods and offer fraud-related services.

  • Inside Symantec's Security Operations Center

    The inside of the Symantec Security Operations Center looks like a scene out of the movie "War Games," and in many ways, the connection is fitting. The SOC, as it is known by Symantec employees, is in the business of detecting and analyzing network threats. And as malicious activity online gets increasingly more sophisticated, the war against cybercrime is definitely on.

Sign up now to get free exclusive access to reports, research and invitation only events.

Computerworld newsletter

Join the most dedicated community for IT managers, leaders and professionals in Australia