Security »
-
Google dumps more products
Google continues purging its product roster of services and applications that it considers redundant or obsolete, deciding now to axe an unpopular edition of Google Apps and a podcast player.
-
Defcon Wi-Fi hack called no threat to enterprise WLANs
Security researchers at the recent Defcon event showed a successful attack against one part of Wi-Fi network security, but experts say it will have zero impact on enterprise WLANS.
-
Twitter takes social spotlight at London Olympics
Twitter is basking in the Olympic spotlight, with athletes tweeting about the games and fans around the world tweeting their support.
-
Microsoft blames last week's Azure outage on a configuration error
A system configuration mistake caused the outage that affected Windows Azure customers in western Europe last week, according to Microsoft.
-
Facebook, Twitter accounts of Yankees, other teams compromised
The official social media accounts of several Major League Baseball teams were compromised Thursday, leading to some embarrassing messages appearing on the Facebook and Twitter accounts and highlighting the risks social media sites can present for the public image of businesses.
-
Petition to 'fix' Apple's Bonjour technology now online
The petition asking for changes to Apple's Bonjour and Airplay technologies is now online and accepting digital signatures until Aug. 10.
-
Focus on business security, not compliance: CSO
Enterprises are too focused on meeting security standards such as payment card industry (PCI) compliance rather than implementing configuration management, business resumption and fault tolerance, according to a security expert.
-
Microsoft tool evaluates new software's impact on OS security
Microsoft has released Attack Surface Analyzer 1.0, a free tool that can help system administrators, IT security professionals or software developers understand how newly installed applications can affect the security of a Windows OS.
-
Lock-in, migration costs can put a damper on cloud projects, says ISACA
Cloud services promise low cost-of-entry and rapid return on investment, but those advantages make it easy to overlook associated investments. To find out the true return on investment (ROI) of cloud computing enterprises have to dig deeper, according to a white paper from industry organization Information Systems Audit and Control Association (ISACA).
-
US House to ITU: Hands off the Internet
The U.S. House of Representatives voted late Thursday to send a message to the United Nations' International Telecommunication Union that the Internet doesn't need new international regulations. The vote was unanimous: 414-0.
-
First look: Microsoft Office 2013
The next revision of Office adds touches of Metro without itself being a Metro app
- 16/7
Microsoft raises the bar with SQL Server 2012
- 13/7
10 file-sharing options: Dropbox, Google Drive and more
- 9/7
Windows Server 2012 Release Preview: Compelling new features
- 6/7
Galaxy S III review: Hands down, the best Android smartphone
- 5/7
Droid Incredible 4G LTE review: Great sound, good price
- 5/7
Seagate Backup Plus review: Save your social media data
- 3/7
10 e-commerce platforms make selling simpler
- 20/6
Storing in the cloud securely: 30 services compared
- 27/6
Review: Weighing Windows Server 2012
-
Will Outlook.com force Gmail, Yahoo Mail to up their game?
With Microsoft's new Outlook.com free email service getting so much attention, will Google and Yahoo need to update their own email offerings before they start to lose users?
Forecast for systems administrators: Cloudy
Cloud security: Four customers' approaches
Microsoft's Outlook.com may be one-two punch against Google
Microsoft reboots Hotmail to build consumer destination, says analyst
Build a private social network that employees will actually use
In depth: A new app lets you send pictures via sound
Olympics shine spotlight on social networks
Nicira: A classic Silicon Valley story, complete with big payday
How to choose an IaaS provider
Online travel takes off with EV SSL security
Furniture maker uses NAC gear for more than NAC
How does the CIA keep its IT staff honest?
Employment firm trains staff in compliance with network management kit
Uni fortifies Western Front with IDS
Law firm stop unsolicited mail with software-as-a-service
Trojan horse payload strikes recruiter
Junior soldiers protected by patches
The Observatory Hotel makes spam an unwelcome visitor
Air force base adopts modern alert system
Email encryption - Not an option, now a necessity
Adherence to clearly defined IT security standards has become the norm. While the specifics vary from region to region, most share a common thread calling for proactive data protection policies, positive enforcement, regular risk reviews, end-user education and a capacity to demonstrate that such actions are being taken. Read more.
AVG Anti-Virus Free Edition
Note: This review covers version 8.5 of the software. This software is now in version 9.0. Antivirus program AVG 8.5 Free offers solid features and ...
Closing the print security gap - The market landscape for print security
Today, many organisations continue to rely on printing to support business processes, particularly in the public sector, finance industry and legal profession. Whilst MFPs and printers have improved business productivity, they pose the same security risk as any networked device if left unprotected. With reported data breaches on the rise and growing industry and regulatory requirements around information security, businesses may suffer financial and reputational damage if they ignore the risks of unsecured printing. Read more.
- FTSAP FICO ConsultantNSW
- FTManagers and Technical SpecialistsACT
- FTGlobal Chief Information Officer NZ
- FTSharePoint Consultants - Developers/ArchitectsNSW
- FTSupport Engineer -Mandarin (Malaysian/Singaporean dialect) or ThaiNSW
- CCSAP J2EE DeveloperNSW
- FTSupport Engineer -Mandarin (Malaysian/Singaporean dialect)NSW
- FTTHAI SPEAKING - IT Support Engineer - Global IT Services firmNSW