Security News, Features, and Interviews

News
Round Table
  • Roundtable: Security Guide for the Cloud - right here, right now

    By Jennifer O'Brien | 07 June, 2011 15:15

    The cloud 'security strategy' involves adopting security solutions that seamlessly span physical, virtual and private/hybrid/public cloud environments while simplifying operational and management complexities. Roundtable attendees got down to business, discussion the 'practical steps' and issues and opportunities involved in securing the cloud environment. Jennifer O'Brien reports.

  • Selling security to SMBs

    By Nadia Cameron | 02 July, 2009 10:40

    ARN pulled together a panel of industry representatives to discuss how to position security solutions successfully to 5-499 seat organisations in today’s economic climate. This roundtable was held in conjunction with Symantec.

  • The future of IT security

    By ARN Staff | 07 May, 2008 12:05

    The ARN round table was held in conjunction with Firewall Systems and its vendor partners, AirMagnet, Blue Coat, Check Point, Network Box, TippingPoint and WatchGuard.

Features
Interviews
  • Cisco describes its SDN vision: A Q&A with Soni Jiandani

    By John Dix | 24 July, 2014 00:10

    Soni Jiandani is one of Cisco's serial entrepreneurs, having been a key member of the teams that developed everything from the Nexus 5000 to Cisco's Unified Computing System (which in five years has leapt to the top of the x86 blade server market in North America, according to IDC). Today Jiandani is Senior Vice President of Cisco's Insieme business unit, the group pushing the company's Software Defined Networking vision. Network World Editor in Chief John Dix caught with Jiandani to get her take on how SDN plays out.

  • Early user of VMware NSX net virtualization tool extols fine grain controls

    By John Dix | 26 June, 2014 04:09

    Canadian airline company WestJet is one of the earliest customers of VMware's NSX network virtualization tools, which initially reached for the tech to address a security issue. Network World Editor in Chief John Dix recently sat down with WestJet technologist Richard Sillito to learn what the company is learning about network virtualization and its broader NSX plans.

  • Interview: New Juniper MD lays down A/NZ strategy

    By Brian Karlovsky | 19 June, 2014 07:00

    Juniper's new managing director sits down with ARN to discuss the path forward for the Australian arm of one of the largest networking companies in the world.

  • Cloud provider FireHost's security chief brings lessons from the front lines

    By Stephen Lawson | 31 May, 2014 04:56

    Jeff Schilling, who joined cloud hosting startup FireHost this week as chief security officer, knows a thing or two about cybersecurity.

  • How a cyber cop patrols the underworld of e-commerce

    By Taylor Armerding | 17 April, 2014 08:55

    Melissa Andrews, a resident of Canada, is a cyber security "cop" for Payza, an international e-commerce payment platform operating in 97 countries. Her job, described by the company's public relations firm as "the worst security job on the Internet," is to protect the public from illegal, and many times revolting, content, by shutting the sites down and alerting authorities about criminal activity. She spoke with CSO this week about her job and why she is proud of what she does.

Opinions
Reviews
  • 5 Twitter clients for Linux

    By Himanshu Arora | 09 May, 2014 21:12

    Linux users who want to avoid browser-based Twitter apps can try out these five local clients -- including one that still uses a command-line interface.

  • Review: FireEye fights off multi-stage malware

    By David Newman | 05 May, 2014 22:38

    You can't see some malware until it's too late. Sophisticated attacks arrive in pieces, each seemingly benign. Once these advanced attacks reassemble, the target is already compromised.

  • Unisys unveils invisibility cloak for network traffic

    By David Strom | 05 May, 2014 20:38

    If you are ultra paranoid, what could be better than hiding your network traffic in such a way that no one could possibly intercept it? This is what Unisys is offering with its new Stealth appliance, which could make man-in-the-middle attacks and keylogger exploits obsolete, or at least more difficult to mount.

  • Review: Office 365 administration made easy

    By Martin Heller | 21 October, 2013 10:09

    Going beyond Office 365's native admin GUI, 365 Command provides powerful Exchange admin capabilities without the need to run PowerShell

  • Best tools for protecting passwords

    By David Strom | 03 September, 2013 10:23

    For enterprises trying to get a handle on password management, the good news is that there are products that can help implement stronger password policies for end users logging into corporate and personal Web-based services, as well as for employees who share a local server login.

 

Latest News

09:05AM
Australia gains early access to Microsoft's Cortana personal assistant
04:09PM
One in four channel partners offering deduplication: Kroll Ontrack
04:06PM
Acer appoints new Australian channel boss
03:16PM
Salesforce joins BSA
More News
05 Aug
Systems Technology Day - Build Your Own Private Cloud
06 Aug
Oracle Employee Experience Journey Mapping Workshops
20 Aug
Westcon Group Imagine 2014 - Melbourne
21 Aug
CAST 611 Advanced Penetration Testing
View all events