Security
Wireless Network the Weakest Security Link in Enterprise IT Infrastructure, According to Fortinet Global Survey of IT Leaders
9 in 10 CIOs Report Concerns Over Insufficient Wireless Protection; Over One-third of Enterprises Found…
Check Point Delivers SCADA Security Solutions to Protect Industrial Control Systems against Cyber Threats
Check Point Software Technologies has announced the extension of its comprehensive Industrial Control Systems (ICS)…
Night Vision Australia – What’s the perfect tool for Security & Law Enforcement in Australia?
FLIR Thermal Imaging Camera’s Thermal imaging cameras produce a crisp image in the darkest of…
HP and FireEye Announce First of its Kind Global Alliance for Incident Response and Advanced Threat Services
HP and FireEye, have announced a first of its kind, go-to-market partnership to make incident response,…
BAE Systems Applied Intelligence: Why intelligence-led penetration testing needs to be the proactive defence in every business
As the cyber threat landscape evolves, so too does the need for more robust defences,…
Here We Go Again: Yet Another Drone Intrusion at the White House
Another drone was discovered flying in restricted air space around the White House recently. The Secret…
HID Global Launches vanGO, Industry’s First One-2-One Visual Security Solution to Eliminate Counterfeit Cards
HID Global, has announced the introduction of vanGO® , a visual security solution that enables universities, enterprises…
MAST Security Update: Libya and Yemen
A third ship has been attacked off the coast of Libya. The Anwaar Afriqya is…
Palo Alto Networks acquires CirroSecure
Palo Alto Networks has announced it has acquired CirroSecure, a Silicon Valley-based company with a…
Managing BYOD security effectively
Most companies now let employees use their own devices for business to some extent. However,…
Antaira Technologies’ Industrial Serial Device Servers with Dual LAN
Antaira Technologies is proud to introduce the advanced version STE-708 and STE-716 Industrial Serial Device…
Everyone has a role to play in securing Asia’s digital future
Asia is in the middle of a digital revolution, with a booming market for consumer…
Sniffing and tracking wearable tech and smartphones
Researchers at Context Information Security have demonstrated how easy it is to monitor and record…
Australian Agency Replaces Legacy IT with SimpliVity’s Hyperconverged Infrastructure
SimpliVity, has announced that a new Australian customer has recently deployed SimpliVity’s hyperconverged infrastructure solution in…