Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

Making Hybrid Cloud Safe for Business

Shifting more infrastructure and services to the Cloud carries new security risks that need managing, specifically: reliability, data governance and endpoint protection.

Awareness training: How much is too much?

Security awareness training is one of the most effective ways to strengthen what is generally known as “the weakest link in the security chain.” The key is to make employees skeptical without paralyzing them with paranoia

Privacy, cybercrime and the law in a post-ransomware world

In an age where data has become a valuable commodity that is the object of cybercrime, organisations and cybersecurity professionals must work within applicable legal frameworks in preventing, detecting and responding to cybercrime and cyber-attacks.

TECHNOLOGY

APPLICATIONS

MongoDB launches 'Stitch' backend as a service tool to simplify app development

Cloud database service MongoDB Atlas has also been rolled out across all major cloud platforms.

CLOUD COMPUTING

MongoDB launches 'Stitch' backend as a service tool to simplify app development

Cloud database service MongoDB Atlas has also been rolled out across all major cloud platforms.

COMPUTER HARDWARE

Start-up Spotlight - Meet the emerging tech businesses of Australia

DATA CENTRE

Australian defence dept. said to divorce Global Switch over Chinese stake

Reports of plans to take back control of classified data stored in Sydney.

EMERGING TECHNOLOGY

St Vincent's Melbourne to trial automation in microbiology lab

New machine promises to scan and sort 200 agar plates an hour.

INDUSTRIES

EnergyAustralia gets dragged into phishing scam

Second Aussie energy provider impersonated by cyber criminals in malware campaign this year.

INTERNET

Philippines launches one-stop portal for government services

However, government agencies still have the option of retaining their existing websites for their services.

MOBILE

Cybercriminals are embedding malware in pirated software: NUS study

92 percent of new computers with non-genuine software were found to be infected with malware too.

NETWORKING

Start-up Spotlight - Meet the emerging tech businesses of Australia

OPERATING SYSTEMS

5 things you need to know about Stack Clash to secure your shared Linux environment

Attackers can locally exploit the privilege escalation vulnerability to gain root access over Linux, Solaris and BSD machines. This is bad news for Unix-based servers, and even more so for multi-tenant environments.

SECURITY

Cybercriminals are embedding malware in pirated software: NUS study

92 percent of new computers with non-genuine software were found to be infected with malware too.

STORAGE

Start-up Spotlight - Meet the emerging tech businesses of Australia

RELATED WHITE PAPERS

BLOGS

Privacy, cybercrime and the law in a post-ransomware world

In an age where data has become a valuable commodity that is the object of cybercrime, organisations and cybersecurity professionals must work within applicable legal frameworks in preventing, detecting and responding to cybercrime and cyber-attacks.

myGov update fails on promises and potential

Even after a revamp, myGov is failing to live up to its potential.

RELATED WHITE PAPERS