Australia's leading source of security and threat news
These search results are from across the Techday network of sites
Global Telecoms Awards recognizes importance of 'signalling security'
“Over the last couple of years, we have seen more and more operators recognise the importance of securing their signalling network."
KRACK vs Secure WiFi: What your clients need to know
Ingram Micro de-mystifies KRACK and offers concrete advice to keep your client’s WiFi networks safe and secure.
Sophos targets unknown application traffic through new firewall offering
IT professionals are concerned about the security risks associated with unknown application traffic.
How to simplify your network's security through one platform
Why buy standalone products when what you really need is integration?
Understanding post-breach threat detection in the digital era
Rather than a single attack vector, a solution needs to focus on the whole attack cycle also known as “cyber kill chain”.
To upgrade or not to upgrade – that is the security question
When we think of security, we probably think ‘software’ first. But software runs on hardware, and network security and access appliances are aging.
Chinese 'Bronze Butler' group suspected of stealing IP from Japan
Bronze Butler’s operations suggest a long-standing intent to steal information from Japanese organisations.
Defence-in-depth: Hardening every component on the network
Ingram Micro advises on how to harden your client’s defences without breaking the bank.
Credential theft is the hottest trend for cyber attackers in Q2
This year cyber attackers have narrowed their focus to methods that involve credential theft, be it through malware, phishing or brute force attacks.
M1 takes on Nokia tech to offer network-based mobile security
Singapore telecommunications provider M1 says it has built Asia’s very first network-based mobile malware detection solution.
How an SD-WAN can cure those security blues
SD-WANs must play an increasingly critical role in securing enterprises, says ZK Research’s Zeus Kerravala, writing for Silver Peak. He outlines how.
Aruba extends focus on network security and behavioural analytics
Aruba has extended its reach into the security market by fusing together network security with User and Entity Behavioural Analytics.
How to ensure stronger security in the multi-front WiFi security battle
"Network and security operation teams are fighting a multi-front WiFi security battle," says Netscout's Amit Rao.
Why IT security is a critical part of every learning environment
“Education institutions rely on technology delivered through the network for learning. If a device brings down the network then learning stops."
New Webroot boss flags ANZ markets as 'great potential'
Webroot’s new global chief executive has flagged Australia and New Zealand as an area of ‘great potential’ for the cybersecurity vendor.
Hands-on review: Trend Micro’s Home Network Security simplifies how we get protected from cyber attacks
Protecting your devices from cyber attacks has never been this easy.
Time for kids to go outside and smell the roses: How to limit screen time in a connected world
Children have countless options on how they connect to the internet, so how do parents limit screen-time?
How to make your smart home safe when hackers are looming nearby
The more devices you connect to your network the more you need to protect, your data may be at risk...
The new tenets of effective threat protection
An IoA highlights the need to change focus from what already happened within your network to looking at potential issues as they happen.
Gather around the watering hole: Bronze Union attackers likely based in China
The 'active and formidable' Bronze Union group has been responsible for a spate of targeted attacks on Turkey - how do they do it?
Free the network: Four reasons to build your network with SD-WAN
Digital transformation is only as effective as the network that underpins it.
Exclusive: VMware's Bruce Davie explains why network virtualisation is changing security
Security is not about the perimeter any more. Not when you have applications virtualised in the cloud, each with their own policies.
How to find out the true value of network risk reduction
Networks may make up part of business infrastructure growth, but how do businesses make the most out of any new network & security monitoring tools?
Top tips to secure your home wifi network from net nasties
Your home internet network is become more and more vulnerable. Here's what you can do to help protect it from hackers and other net nasties.