Security News, Features, and Interviews

News
Round Table
  • Roundtable: Security Guide for the Cloud - right here, right now

    By Jennifer O'Brien | 07 June, 2011 15:15

    The cloud 'security strategy' involves adopting security solutions that seamlessly span physical, virtual and private/hybrid/public cloud environments while simplifying operational and management complexities. Roundtable attendees got down to business, discussion the 'practical steps' and issues and opportunities involved in securing the cloud environment. Jennifer O'Brien reports.

  • Selling security to SMBs

    By Nadia Cameron | 02 July, 2009 10:40

    ARN pulled together a panel of industry representatives to discuss how to position security solutions successfully to 5-499 seat organisations in today’s economic climate. This roundtable was held in conjunction with Symantec.

  • The future of IT security

    By ARN Staff | 07 May, 2008 12:05

    The ARN round table was held in conjunction with Firewall Systems and its vendor partners, AirMagnet, Blue Coat, Check Point, Network Box, TippingPoint and WatchGuard.

Features
Interviews
Opinions
  • The signs of spring: Birds, flowers and new tech

    By Barbara Krasnoff | 27 March, 2015 05:01

    Back in the dark ages, when the only way to get onscreen entertainment was by tuning in a television set at a specific time (get home late? miss your favorite show? too bad for you!), networks had a habit of scheduling similar shows opposite each other. The notion was presumably, that the competition would cause one show to win out over the other, which would eventually drop in the ratings and get cancelled. The idea that viewers might be interested in seeing both apparently was not in the networks' psychology.

  • When It Comes to Threat Detection and Incident Response, Context Matters

    By Scott Crane | 24 March, 2015 14:09

    In an environment of unrelenting attacks, network packet capture and security analytics are essential for discovering the attack while it is in progress and to provide the intelligence to minimise the damage done as well as to prevent future attacks.

  • Where's the data?

    By Evan Schuman | 18 March, 2015 01:56

    It's a time-honored tradition: U.S. businesses find ways to skirt inconvenient or expensive laws by moving operations to other countries. Thus we have had U.S. corporations operating overseas to exploit child labor, run sweatshops or avoid taxes and rigorous health and safety inspections. Now the U.S. government says something similar is happening in regards to email.

  • Don't get into an email mess

    By Kenneth van Wyk | 13 March, 2015 08:01

    Though she may have broken no laws, Hillary Clinton acted irresponsibly in using a personal email account to conduct official U.S. government business in her capacity as secretary of State.

  • Web browsers are also to blame for Lenovo's Superfish fiasco

    By Michael Horowitz | 10 March, 2015 00:07

    Lenovo pre-installing Superfish software was a security disaster. Whether Lenovo was evil, or, as they eventually claimed, merely incompetent, it's hard to trust them going forward. If nothing else, their initial denials that anything was wrong, leave a lasting impression. Of course, Superfish, along with the software that they bundled from Komodia, also deserve plenty of blame for breaking the security of HTTPS and SSL/TLS.

Reviews
 

Latest News

Mar 27
AppSense takes the wraps off its new analytics platform
Mar 27
SugarCRM beefs up its global executive team with three new hires
Mar 27
'Do Not Call' spam phone call legislation passed
Mar 27
HubOne lands its first channel partnership in Australia
More News
30 Mar
Australian experts to address cybersecurity challenges and solutions at Canberra...
21 Apr
APJ Progress Spark Conference
22 Apr
2015 Innotribe Startup Challenge
27 Apr
Disruptocon
View all events