Latest News
Poor patching creates easy zero-day vulnerability reuse
Telstra boosts optical links to 400 Gbps
Toll Global Express to begin technology separation after divestment
Atlassian patches Jira server plugin to fix vulnerability
HyperOne completes detailed design of Syd-Melb fibre segments
Australia Edition
Asia Edition
LOG IN
SUBSCRIBE
NEWS
GOVERNMENT
SECURITY
RESOURCES
PODCAST
STATE OF IT
DIGITAL NATION
BENCHMARK AWARDS
Search
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCE
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
EVENTS
Insights
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
PROMOTED CONTENT
REPORTS
NEWS
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCE
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
GOVERNMENT
SECURITY
RESOURCES
EVENTS
Insights
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
PROMOTED CONTENT
REPORTS
PODCAST
STATE OF IT
DIGITAL NATION
BENCHMARK AWARDS
Australia Edition
Asia Edition
Log In
Email:
Password:
Remember me
|
Forgot password?
Don't have an account? Register now!
Home
secure
secure
SSL subverted by hacker
The security of the Secure Sockets Layer (SSL) protocols widely used for ecommerce has been questioned again after a delegate at the Black Hat computer security conference showed how the system could be easily bypassed.
Feb 20 2009 3:02PM
How to deploy secure unified communication
There is an uneasy tension between the concepts of unified communications (UC) and IT security.
Jan 23 2009 6:26AM
Secure Computing's Krieger talks about his resignation
After eight years with Secure Computing, Eric Krieger told CRN he has handed in his resignation to relax and take some time out.
Jan 21 2009 3:57PM
New phishing ploy exploits secure sessions to hijack data
Researchers have discovered a new way for attackers to phish for credentials without the need to send emails or trick users into visiting a malicious website.
Jan 14 2009 10:49AM
Marshal8e6’s new software locks down Microsoft Exchange
Marshal8e6 promises to secure all Internet-based communication streams in the workplace with an internal filtering solution for Microsoft Exchange 2003 and 2007.
Dec 1 2008 2:22PM
Review: Avoco Secure secure2Trust
Avoco secure2trust provides many great features for document rights management across the enterprise.
Nov 6 2008 2:46PM
VeriSign boasts secure authentication in the cloud
VeriSign today announced strong growth for its VIP identity protection service, including the imminent launch of DocLocker, an online document storage system.
Nov 6 2008 2:26PM
VeriSign boasts secure authentication in the cloud
VeriSign today announced strong growth for its VIP identity protection service, including the imminent launch of DocLocker, an online document storage system.
Nov 6 2008 2:17PM
McDonald's chooses earthwave to secure WiFi
McDonald’s has chosen earthwave to secure its ‘Family Friendly’ internet service in over 720 stores across Australia.
Oct 28 2008 2:56PM
Internet voting starts for US citizens
The first internet votes in U.S. history will be cast on Friday in an experiment to judge the effectiveness of the system.
Oct 24 2008 3:04PM
McAfee to buy Secure Computing
Security giant McAfee has agreed to acquire network security firm Secure Computing in a US$465m.
Sep 23 2008 9:58AM
What you need to know to keep Mac OS X secure
Just a few years ago, Apple commanded only a small fraction of the computer market.
Sep 22 2008 4:12PM
Secure Computing buys Securify for US$15M
Enterprise security firm Secure Computing has announced plans to purchase Securify, provider of identity-based network monitoring solutions.
Sep 5 2008 10:03AM
Review: NetIQ Secure Configuration Manager 5.7
NetIQ's Secure Configuration Manager (SCM) is a combination of client server and web-based components to help organisations manage configurations of workstations and servers.
Sep 2 2008 4:12PM
Review: Secure Auditor 2.0
Secure Bytes Secure Auditor is actually a suite comprised of several different pieces designed to audit vulnerabilities across a broad range of systems.
Sep 1 2008 3:02PM
Emerging countries to take spam lead
The majority of the world's spam continued to be sent from the US during the second quarter of 2008 but experts predict it won’t be long till developing nations take the lead.
Aug 7 2008 4:28PM
Emerging countries to take spam lead
The majority of spam is currently sent from the US but experts predict it won’t be long till developing nations take the lead.
Aug 7 2008 12:09PM
Staying secure at the Olympics
Is it safe to take your mobile devices with you to the Beijing Olympic Games?
Aug 5 2008 10:06AM
Secure Computing warns Olympic Fever could impact your network
The 2008 Beijing Olympics are nearly upon us. And for the first time employees will be able to watch the games via live streaming through a local host – Channel Seven will be streaming over 100 hours of footage from the Games via Yahoo!7.
Jul 4 2008 1:18PM
3 Mobile enlists online help to secure iPhone
3 Mobile is enlisting legions of its customers to pile Internet pressure on Apple in an attempt to secure the iPhone for its network.
Jun 27 2008 2:57PM
Previous
Next
Most popular tech stories
COVER STORY: Operationalising net zero through the power of IoT
Cisco has the world's best supply chain, says Gartner
The security threat of quantum computing
Integrity, ethics and board decisions in the digital age
Case study: How Prospa creates a seamless CX for its lenders
Come to CRN's CyberSecurity Live Event!
See who was at Channel Meets: UC in Sydney
Who was in Melbourne for Channel Meets: UC?
Enter CRN's 2022 Impact Awards now!
Resellers, vendors come together for CRN Kickstarter 2022
5 essential digital transformation ideas
Don't miss Australia’s premiere IoT Conference on 9th June
Venom BlackBook Zero 15 Phantom
Top 5 Benefits of Managed IT Services
Digital dystopia: your reputation is on the line
IoT Explained: What is the Internet of Things in Australia (June 2022)
IoT Impact Conference
IoT Impact moving to June 9
2021 IoT Awards winners announced
Photos: Australian industry comes together to explore IoT opportunities
Log In
Don't have an account? Register now!
Email:
Password:
Remember me
|
Forgot your password?