Security »
-
Huawei urges world to step back from online “Wild West”
Huawei may have been barred by the Australian federal government from National Broadband Network (NBN) deals on security grounds, but the Chinese vendor has invited governments to review its security capabilities in a new white paper.
-
Twitter battles photo upload bug
If you have been unable to post photos to your Twitter account, the problem probably isn't on your end.
-
LinkedIn adds notifications feature to promote user engagement
LinkedIn will now notify its members whenever their contacts interact with them in a variety of ways, such as liking something they posted.
-
Vendors continue to pick sides between CloudStack, OpenStack
Earlier this year Citrix rumbled the open source cloud industry when it ditched OpenStack, a project backed by big-name companies such as Rackspace, Red Hat, Dell and HP, and launched CloudStack, a competing open source platform for cloud deployments. Months later, vendors across the industry are strategically aligning themselves on either side of the divide between OpenStack or CloudStack, which is now an Apache Software Foundation-managed project.
-
Apple patches Java 6 for OS X Snow Leopard, Lion
Apple today issued a Java update for OS X Lion and Snow Leopard to make it more difficult for hackers to exploit other vulnerabilities.
-
Survey: Mobile users care about data privacy
More than half of all mobile-phone app users surveyed have either declined to download an available app or deleted one from their device because of concerns about the collection of their personal data, according to the survey released Wednesday by the Pew Internet and American Life Project.
-
US privacy, consumer groups back EU's proposed privacy rules
Twenty-two U.S. privacy and consumer groups have voiced support for a tough online privacy proposal being considered by the European Union, even though some U.S. businesses and government officials have described the proposal as too regulatory.
-
French antipiracy authority 'happy' it has sent just 14 cases to court in the last year
Just 14 of the 1.15 million emails warning of copyright infringement sent out by the French online antipiracy authority have resulted in a case file being sent to a court -- but Mireille Imbert-Quaretta, president of the Commission for Rights Protection, is happy with that.
-
Qubes OS 1.0 isolates programs inside virtual machines for increased security
The first stable version of Qubes OS, an open source desktop operating system designed to provide a greater level of security by isolating programs inside virtual machines with different permissions, was released Monday by Polish security firm Invisible Things Lab (ITL).
-
12 hot cloud computing companies worth watching
While big-name players such as Amazon, Google, IBM, Verizon and VMware sit atop the burgeoning cloud computing market, an entire ecosystem of early stage startups are looking to stake their claim, too.
-
Review: Google Compute Engine rocks the cloud
Google's new compute cloud offers a crisp and clean way to spin up Linux instances and easily tap other Google APIs
- 13/8
DLP tools deliver strong endpoint protection
- 13/8
Cisco Ironport delivers strong email protection
- 13/8
How we tested DLP products
- 9/8
First look: Windows Azure Active Directory preview
- 16/7
First look: Microsoft Office 2013
- 16/7
Microsoft raises the bar with SQL Server 2012
- 13/7
10 file-sharing options: Dropbox, Google Drive and more
- 9/7
Windows Server 2012 Release Preview: Compelling new features
- 6/7
Galaxy S III review: Hands down, the best Android smartphone
-
Five key takeaways from Workday's IPO filing
The enterprise software market on Thursday suddenly got an intimate look inside Workday, a red-hot startup that makes cloud applications for human resources and financials, with the public release of its S-1 IPO filing.
Google should speed up Apps' enterprise social networking development
Best BYOD management: Containment is your friend
Developing apps for the mobile cloud: What you need to know
Social networking just got real
IT's 9 biggest security threats
The Grill: Ramon Baez on outsourcing challenges at Kimberly-Clark.
Security Manager's Journal: Closing off a hole in Outlook
Career Watch: New ways to find a job
60-minute security makeover: Prevent your own 'epic hack'
Online travel takes off with EV SSL security
Furniture maker uses NAC gear for more than NAC
How does the CIA keep its IT staff honest?
Employment firm trains staff in compliance with network management kit
Uni fortifies Western Front with IDS
Law firm stop unsolicited mail with software-as-a-service
Trojan horse payload strikes recruiter
Junior soldiers protected by patches
The Observatory Hotel makes spam an unwelcome visitor
Air force base adopts modern alert system
Key trends driving global business resilience and risk
Learn how organisations are adapting to an increasingly complex global environment with more holistic approaches to business resilience planning.
Gadwin GeForms
GeForms allows you to create your own forms or fill in existing forms electronically. Using GeForms you are provided with sophisticated form design tools which ...
Case Study: Gadens Law Firm Reclaims 22 Hours of Lost Productivity Each Month
For the past eight years, Gadens Brisbane has used a “big three” security vendor to protect its network against malware and other threats. Despite deploying a complete antivirus package, the firm still experienced up to three infections across the network every week. This gap in security meant the firm’s IT team was spending up to six hours a week on security management, resulting in lawyers being unable to work on their computers for hours a time – an inconvenience for the individual, and costly for a business reliant on hourly charging. Read how Gadens Law Firm have reduced their security management time from about 6 hours a week to 30 minutes a week.
- CCSAP Cutover ManagerNSW
- FTICT Service Delivery Specialists Level 4/5ACT
- CCSAP Functional Payroll ConsultantNSW
- CCLead Abinitio ArchitectNSW
- FTProduct Manager Strategist - Enterprise ApplicationsNSW
- CCSAP Security Project ManagerNSW
- FTSAP Project ManagerNSW
- FTBusiness Intelligence AnalystSA
- FTProduct Manager Strategist - Enterprise ApplicationsNSW
- FTSAP Basis Principle ConsultantNSW
- FTICT Service Delivery Specialists Level 3ACT
- FTApplication Support - C#NSW
- CCSAS / Teradata Technical Lead - Sydney - SAS guru / SAS SpecialistNSW
- FTSharePoint Consultants - Architects and developers Needed - Perth basedNSW