News
Security policy and user awareness
-
April 29, 2011
29
Apr'11
Store dealing with dishonest employees uses internal theft prevention software
A London-based sushi chain expects to save almost £1 million this year with the help of new fraud-detection software.
-
March 30, 2011
30
Mar'11
Two-factor authentication alternatives
Worried by the breach at RSA? Here are some two-factor authentication alternatives to consider.
-
February 17, 2011
17
Feb'11
Optus email rejects shortened URLs
Optus has adjusted its email security regime to repel incoming emails that use URLs shortened by services like bit.ly or TinyURL.
-
December 24, 2008
24
Dec'08
Ian Yates' quite literal year in review
Ian Yates product reviews are unique and make ideal holiday reading.
-
September 27, 2007
27
Sep'07
Pacific Hydro finds UTM improves its environment
Renewable energy company Pacific Hydro has found Watchguard's unified threat management devices make a valuable contribution to its defence in depth strategy.
-
September 02, 2007
02
Sep'07
Now the dust has settled on pornography filtering...
Andrew Collins looks at the controversial topic of Internet porn filtering in Australia, now that the federal government has enacted its hotly debated plans.
-
August 21, 2007
21
Aug'07
Nigel Phair, author of 'Cybercrime: The Reality of the Threat', on Australia's response
In the first instalment of a three part interview, TechTarget Australia's Patrick Gray interviews Australian Federal Police Agent Nigel Phair about his new book: Cybercrime: The Reality of the Threat. Until recently, Phair was the Team Leader of ...
-
August 14, 2007
14
Aug'07
Telstra network build spurs new security plan
Telstra's experience constructing the Next G and Next IP networks has seen the telco evolve a new security strategy.
-
November 19, 2006
19
Nov'06
Virtualisation: friend or foe? [Day Two: The virtual appliance]
Virtualisation slashes costs, makes management easier, unshackles software configurations from hardware. And it is being embraced around the world. But is it secure? In this three-part series, Patrick Gray explores the security implications of this ...