Latest News
CBA looks to AI for workforce planning
PsiQuantum to build computer at Moreton Bay
US to invest in IBM, other quantum computing firms
Singtel open to selling "meaningful minority stake" in Optus
Fears of unfettered hacking spurred by Anthropic's Mythos AI model likely 'overstated'
LOG IN
SUBSCRIBE
NEWS
GOVERNMENT
SECURITY
AI
DIGITAL NATION
RESOURCES
PODCAST
EVENTS
ADVERTISE
Search
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
State of Security 2026
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
Tech Partner Views
iTnews TV
Cloud Covered
Security Breakfast
Executive Retreat
NEWS
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
GOVERNMENT
SECURITY
AI
DIGITAL NATION
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
RESOURCES
State of Security 2026
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
Tech Partner Views
iTnews TV
PODCAST
EVENTS
Cloud Covered
Security Breakfast
Executive Retreat
ADVERTISE
Log In
Email:
Password:
Remember me
|
Forgot password?
Don't have an account? Register now!
Home
Features
Features
Review: ZyWALL USG300
The ZyWall USG300 combines core UTM functionality with a couple of extra features. This appliance includes standard features such as firewall, IPS and gateway virus protection, and also has a web content filter as well as the cabability to block and control instant messaging and peer-to-peer applications. The gateway anti-virus engine scans critical protocols such as HTTP, FTP, SMTP, POP3 and IMAP4.
Peter Stephenson,
Mar 12 2008 1:47PM
Security
Security Web 2.0: Open Season for the Attackers?
The Web is now a participatory medium. The downside to this ubiquitous connectivity and user participation is a new slew of security threats many IT professionals have yet to fully grasp.
Wayne Neich
Mar 11 2008 3:58PM
Security
Keeping a secret: The digital war
Northrop Grumman has grown to a $30-billion-a-year company by designing and building some of the world's most sophisticated war-fighting tools, be it stealth bombers, airborne surveillance systems or nuclear-powered aircraft carriers and submarines.
Dan Kaplan
Mar 10 2008 3:39PM
Security
Guest column: The impact of quantum computers on cryptography
To explain the impact of quantum computers, it is best to first take a step back to review how current encryption technologies work.
Robin Balean
Mar 10 2008 1:56PM
Security
Is Conroy forgetting about OPEL?
In his first major IT industry address, Senator Stephen Conroy stood before some 500 attendees, but forgot all about mentioning OPEL.
Mitchell Bingemann
Mar 7 2008 9:48AM
Telco/ISP
Review: Yoggie Pico Pro
The Yoggie Pico Pro is a USB security device aimed at corporate road warriors. As mobile workers often rely on third-party WiFi networks to connect to corporate systems on the road, this can represent a loophole in enterprise security.
Mark Mayne
Mar 7 2008 9:14AM
Security
Interview: Scott Weiss, IronPort's CEO
IronPort's charismatic CEO puts his success down to having tasted failure in the past. He talks to Paul Fisher SC Magazine's UK editor about living with Cisco.
Paul Fisher
Mar 6 2008 3:19PM
Security
Review: AirMagnet Enterprise v8.0
AirMagnet Enterprise delivers active full-time protection against the entire spectrum of wireless threats such as denial-of-service attacks, MAC spoofing, fragmentation attacks and other types of wireless hacking and reconnaissance tools. Threats can be traced, located and blocked, and the results saved for analysis.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol
Mar 6 2008 7:52AM
Security
Change default credentials
The easiest way into any system is likely to be the defaults, so make sure you don't leave an open door for criminals.
Ken Munro
Mar 4 2008 10:23AM
Security
Emloyee education key to successful enterprise security
All the technology in the world won't help if your employees don't follow security policies, so how can you win them over?
Rob Buckley
Feb 29 2008 2:55PM
Security
Review: Utimaco Safeware SafeGuard PDA v4.25
Utimaco Safeware’s SafeGuard PDA enterprise offers organisations the control to use PDAs within their architecture, while still protecting sensitive data from unauthorized users.
Peter Stephenson,
Feb 29 2008 2:18PM
Security
Review: Novell ZENworks ESM v3.5
The ZENworks Handheld Management offering focuses on three key issues crucial for any organisation’s bottom line: compliance, risk and cost reduction.
Peter Stephenson,
Feb 28 2008 3:22PM
Security
Storm worm botnet: mutating or fading?
What is the future of the infamous Storm worm, has it morphed into the Mega-D botnet that is now posing a threat or shrunk out of sight?
Negar Salek
Feb 28 2008 11:32AM
Security
Risk management: Calculated risk
Don't wait for the worst to happen. Define your company's key assets, the risks they're exposed to and how to protect them.
Mark Mayne
Feb 27 2008 2:56PM
Security
Review: Centennial Software DeviceWall v4.6
DeviceWall has many applications for both portable device security and endpoint security and management. As far as portable security goes, DeviceWall includes both the ability to stop transfer of data based on security policy and to encrypt data that needs to be transmitted.
Peter Stephenson
Feb 27 2008 7:10AM
Security
Review: Bluefire Mobile Security 4.0.2
Bluefire Mobile Security Enterprise Edition can be centrally deployed and configured from an administration console. Administrative features include the ability to enforce and update security policy, view logs, extract security logs and control devices regardless of location.
Peter Stephenson,
Feb 26 2008 4:02PM
Security
Review: SpectraGuard Enterprise
SpectraGuard Enterprise and SAFE v5.5 is intended for organisations with wireless LAN networks and WiFi capabilities. This product contains many features to protect, analyse, audit and maintain the overall health of a company’s wireless network.
Peter Stephenson,
Feb 25 2008 10:13AM
Security
Review: A10 Networks IDsentrie 1000
The IDsentrie identity management appliance brings together several forms of secure user management into one device. This appliance focuses on two main areas of identity management, the first being network authentication.
Peter Stephenson
,CeRNS,
Feb 22 2008 12:00AM
Security
Superbotnets: Mega-D vs Storm, an in-depth look
Mega-D, set off a firestorm of speculation,
recently.
What family of malware was behind this previously unknown botnet? How had it emerged to challenge Storm with hardly a mention in any research articles or press?
Joe Stewart, Senior Security Researcher, SecureWorks
Feb 21 2008 10:52AM
Security
Review: AirDefence Enterprise v7.3
AirDefense Enterprise provides protection against wireless threats, policy compliance and performance monitoring, troubleshooting and location tracking in an appliance that is scalable for most size organisations.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol
Feb 20 2008 3:25PM
Security
Previous
Next
Most popular tech stories
Rio Tinto brings automation, Copilot to its finance function
AustralianSuper hires its first head of AI and automation
ABC drops Salesforce for Braze
CBA looks to AI for workforce planning
Chemist Warehouse's AI tool for HR becoming a "standard pattern"
HamiltonJet partners with digital services provider Fortude
SentinelOne signs distribution agreement with Sektor
Rapid7’s new SIEM combines exposure management with threat detection
The techpartner.news podcast, episode 3: Why security consultancy founder Kat McCrabb started with the hard stuff
Bluechip Infotech enters final stage of Goodson Imports acquisition
Blackberry celebrates "giant step forward"
'Touch-free' smartphone controlled with head movements
Photos: Australian industry explores data for net zero
Telstra Purple acquires IoT specialists Alliance Automation, Aqura Technologies
Govt launches consumer tech label program for smart devices
Log In
Don't have an account? Register now!
Email:
Password:
Remember me
|
Forgot your password?