Security News, Features, and Interviews

News
Round Table
  • Roundtable: Security Guide for the Cloud - right here, right now

    By Jennifer O'Brien | 07 June, 2011 15:15

    The cloud 'security strategy' involves adopting security solutions that seamlessly span physical, virtual and private/hybrid/public cloud environments while simplifying operational and management complexities. Roundtable attendees got down to business, discussion the 'practical steps' and issues and opportunities involved in securing the cloud environment. Jennifer O'Brien reports.

  • Selling security to SMBs

    By Nadia Cameron | 02 July, 2009 10:40

    ARN pulled together a panel of industry representatives to discuss how to position security solutions successfully to 5-499 seat organisations in today’s economic climate. This roundtable was held in conjunction with Symantec.

  • The future of IT security

    By ARN Staff | 07 May, 2008 12:05

    The ARN round table was held in conjunction with Firewall Systems and its vendor partners, AirMagnet, Blue Coat, Check Point, Network Box, TippingPoint and WatchGuard.

Features
Interviews
  • Cisco describes its SDN vision: A Q&A with Soni Jiandani

    By John Dix | 24 July, 2014 00:10

    Soni Jiandani is one of Cisco's serial entrepreneurs, having been a key member of the teams that developed everything from the Nexus 5000 to Cisco's Unified Computing System (which in five years has leapt to the top of the x86 blade server market in North America, according to IDC). Today Jiandani is Senior Vice President of Cisco's Insieme business unit, the group pushing the company's Software Defined Networking vision. Network World Editor in Chief John Dix caught with Jiandani to get her take on how SDN plays out.

  • Early user of VMware NSX net virtualization tool extols fine grain controls

    By John Dix | 26 June, 2014 04:09

    Canadian airline company WestJet is one of the earliest customers of VMware's NSX network virtualization tools, which initially reached for the tech to address a security issue. Network World Editor in Chief John Dix recently sat down with WestJet technologist Richard Sillito to learn what the company is learning about network virtualization and its broader NSX plans.

  • Interview: New Juniper MD lays down A/NZ strategy

    By Brian Karlovsky | 19 June, 2014 07:00

    Juniper's new managing director sits down with ARN to discuss the path forward for the Australian arm of one of the largest networking companies in the world.

  • Cloud provider FireHost's security chief brings lessons from the front lines

    By Stephen Lawson | 31 May, 2014 04:56

    Jeff Schilling, who joined cloud hosting startup FireHost this week as chief security officer, knows a thing or two about cybersecurity.

  • How a cyber cop patrols the underworld of e-commerce

    By Taylor Armerding | 17 April, 2014 08:55

    Melissa Andrews, a resident of Canada, is a cyber security "cop" for Payza, an international e-commerce payment platform operating in 97 countries. Her job, described by the company's public relations firm as "the worst security job on the Internet," is to protect the public from illegal, and many times revolting, content, by shutting the sites down and alerting authorities about criminal activity. She spoke with CSO this week about her job and why she is proud of what she does.

Opinions
  • Solidifying Microsoft Azure Security for SharePoint and SQL in the Cloud

    By Rand Morimoto | 23 July, 2014 08:14

    More and more organizations are moving SharePoint and SQL workloads into Microsoft Azure in the cloud because of the simplicity of spinning up servers in the cloud, adding more capacity, decreasing capacity without having to BUY servers on-premise. What used to cost organizations $20,000, $50,000, or more in purchasing servers, storage, network bandwidth, replica disaster recovery sites, etc and delay SharePoint and SQL rollouts by weeks or month is now completely managed by spinning up virtual machines up in Azure and customizing and configuring systems in the Cloud.

  • Julia King: We're all data scientists now

    By Julia King | 21 July, 2014 23:22

    It's up to each one of us to figure out what in the daily surge of data is useful, what's crap and what's truly valuable.

  • Kenneth van Wyk: We can't just blame users

    By Kenneth van Wyk | 16 July, 2014 22:23

    Yes, users sometimes do stupid things. Some always will. But developers need to do more to save users from themselves.

  • Why we need an underground Google

    By Mike Elgan | 14 July, 2014 23:49

    There has never been a search engine that accurately reflects the Internet.

  • Facebook is a school yard bully that's going down

    By Alex Burinskiy | 09 July, 2014 05:19

    Facebook has grown and evolved in recent years. In addition to connecting people online, it bombards users with unnecessary ads and useless sponsored stories. And it runs experiments on its users. Columnist Alex Burinskiy is not amused.

Reviews
  • 5 Twitter clients for Linux

    By Himanshu Arora | 09 May, 2014 21:12

    Linux users who want to avoid browser-based Twitter apps can try out these five local clients -- including one that still uses a command-line interface.

  • Review: FireEye fights off multi-stage malware

    By David Newman | 05 May, 2014 22:38

    You can't see some malware until it's too late. Sophisticated attacks arrive in pieces, each seemingly benign. Once these advanced attacks reassemble, the target is already compromised.

  • Unisys unveils invisibility cloak for network traffic

    By David Strom | 05 May, 2014 20:38

    If you are ultra paranoid, what could be better than hiding your network traffic in such a way that no one could possibly intercept it? This is what Unisys is offering with its new Stealth appliance, which could make man-in-the-middle attacks and keylogger exploits obsolete, or at least more difficult to mount.

  • Review: Office 365 administration made easy

    By Martin Heller | 21 October, 2013 10:09

    Going beyond Office 365's native admin GUI, 365 Command provides powerful Exchange admin capabilities without the need to run PowerShell

  • Best tools for protecting passwords

    By David Strom | 03 September, 2013 10:23

    For enterprises trying to get a handle on password management, the good news is that there are products that can help implement stronger password policies for end users logging into corporate and personal Web-based services, as well as for employees who share a local server login.

 

Latest News

01:03PM
Good Technology launches enterprise mobility suites
12:31PM
Telstra fixed line access price consultation begins
11:11AM
Telstra to send 671 jobs to Asia
10:44AM
World first Braille mobile phone launches in Australia
More News
24 Jul
Veeam’s Crazy 8 Roadshow
24 Jul
The Rise of the Challenger Marketer
24 Jul
Executive Sales Breakfast Briefing
24 Jul
Dell Connected Security: Listen to what the experts have to say about security
View all events