in

Oracle ISVs to get helping hand in database app market

Oracle ISVs to get helping hand in database app market

Fleur Doidge Jul 5 2004 12:00AM Software
Net-Itech ramps up in Aust

Net-Itech ramps up in Aust

Byron Connolly Jul 2 2004 12:00AM Oddware
Frew back in the channel

Frew back in the channel

After spending five years overseas, LAN Systems founder Scott Frew is back in the channel and has taken a 75 percent stake in security distributor Firewall Systems.
Byron Connolly Jul 1 2004 12:00AM Hardware
Gates sounds off in Sydney

Gates sounds off in Sydney

Microsoft chairman Bill Gates told Australian media he was unfazed about the threat of open source or scepticism by business towards technology and defended the security of Microsoft's software products.
Siobhan Chapman Jun 28 2004 12:00AM Software
WLAN sales to jump 90 percent in 2004

WLAN sales to jump 90 percent in 2004

Fleur Doidge Jun 28 2004 12:00AM Telco/ISP
Symantec wins $3.2 million settlement in counterfeit case

Symantec wins $3.2 million settlement in counterfeit case

Symantec on Monday said it won a $3.2 million judgment as part of a settlement against a company that sold counterfeit Symantec software.
Marcia Savage Jun 21 2004 5:52PM Security
Shavlik partners Networld to run patch management in Japan

Shavlik partners Networld to run patch management in Japan

Shavlik Technologies has teamed up with solutions integrator Networld to sell its patch management application in Japan.
Dan Ilett Jun 21 2004 3:48PM Security
German ISP saves 90% in security costs

German ISP saves 90% in security costs

German ISP Host Europe has implemented an all-in-one virtual security solution that has saved the firm 90 per cent in operating costs.
Dan Ilett Jun 17 2004 3:12PM Security
In search of a better approach to secure e-mail

In search of a better approach to secure e-mail

The volume of internet traffic generated by an ever-increasing number of applications, including e-mail, Instant Messaging (IM), web services, Voice over IP (VoIP), and other network transactions is growing unabated. Together with these applications has come an associated proliferation in the number of user identities within enterprises – e-mail addresses, IM handles, VoIP telephone numbers, all of which need to be managed. Concurrently, companies are under increasing scrutiny to adhere to government regulations and other compliance requirements to protect the privacy of customers, employees, and their personal data.
Dan Nadir Jun 15 2004 12:13PM Security
Managing information security in modern commercial environments

Managing information security in modern commercial environments

We began this series of articles with the observation that recent advances in the area of network technology and the success of the Internet have resulted in a new business model. This new model has resulted in a number of new challenges in the area of information security which, although largely understood, are only partially resolved. As a result, information security-related risk has been growing rapidly in the last few years and companies will need to take a more proactive stance to managing this risk in order to continue to enjoy the benefits that technological advances have made possible.
Steve Purser Jun 15 2004 12:09PM Security
VPN and firewall market up 11 per cent in Q1

VPN and firewall market up 11 per cent in Q1

VPN and firewall revenue has risen by 11 per cent at $733 million in the first quarter of 2004.
Dan Ilett Jun 10 2004 11:48AM Security
MMS, SMS use in business accelerating: IDC

MMS, SMS use in business accelerating: IDC

MMS and SMS applications for business use are tipped to proliferate across Australia in the coming year, new market research by IDC has suggested.
Fleur Doidge Jun 10 2004 12:00AM Telco/ISP
Managing information security in modern commercial environments

Managing information security in modern commercial environments

Previous articles in this series have outlined the challenges facing the present-day information security manager, presented an approach to meeting these challenges and analysed the purpose of the consolidation phase in some detail. We now turn our eyes to the second phase of the approach – the strategic planning cycle.
Steve Purser Jun 8 2004 11:37AM Security
Swivel strikes WhiteGold in Australia

Swivel strikes WhiteGold in Australia

Niche VAD WhiteGold Solutions has signed its first authentication software vendor, a UK company offering an application using mobile phones instead of dedicated security tokens.
Fleur Doidge Jun 8 2004 12:00AM Hardware
Wireless hacker faces 15 years in jail

Wireless hacker faces 15 years in jail

A wireless hacker faces up to 15 years in jail for stealing credit card numbers from a chain of shops in the US.
Dan Ilett Jun 7 2004 3:40PM Security
Managing information security in modern commercial environments

Managing information security in modern commercial environments

The previous article in this series described an overall approach to securing information and provided a high-level description of the consolidation period and the strategic planning cycle. We continue this development by taking a more detailed look at the consolidation period.
Steve Purser Jun 1 2004 12:01PM Security
Microsoft demos security features in Windows XP Service Pack 2

Microsoft demos security features in Windows XP Service Pack 2

Microsoft demonstrated the security features of its upcoming Windows XP Service Pack 2 during a presentation on the company's security efforts held Thursday at its Mountain View, Calif., campus.
Marcia Savage May 28 2004 12:06AM Security
Deloitte survey shows rise in attacks but flat security budgets

Deloitte survey shows rise in attacks but flat security budgets

A survey of top financial services firms by Deloitte & Touche showed that a majority of financial institutions have suffered external attacks within the past year but many don't expect their security budgets to grow.
Marcia Savage May 26 2004 11:26PM Security
Managing Information Security in Modern Commercial Environments, Part 2 – A Pro-Active Approach

Managing Information Security in Modern Commercial Environments, Part 2 – A Pro-Active Approach

In the first article of this series, we identified and provided examples of the types of issues that need to be resolved if organisations are to correctly manage risk in the area of information security. If we combine the impact of these trends and issues with the fact that most enterprises are being forced to cut costs in order to remain competitive the true magnitude of the problem becomes apparent. Simply put, information security managers have to secure more complex environments, faster and using less resources.
Steve Purser May 24 2004 5:37PM Security
Viable solutions in the fight against phishing

Viable solutions in the fight against phishing

David Brunswick, technical director for Tumbleweed Communications Europe and a member of the Anti-Phishing Working Group, discusses potential solutions in the fight against phishing
David Brunswick May 19 2004 3:46PM Security

Log In

  |  Forgot your password?