Technology

Indian watchdog investigates breach in major ATM attack

Indian watchdog investigates breach in major ATM attack

Banks lose US$45m in heist.
Staff Writers May 13 2013 6:29AM Security
Amazon expands direct-to-cloud links

Amazon expands direct-to-cloud links

Lower costs, better performance mooted.
Juha Saarinen May 13 2013 6:14AM Networking
Workaround for Internet Explorer zero-day

Workaround for Internet Explorer zero-day

Hole part of an possible espionage campaign against US energy workers.
Dan Kaplan May 10 2013 12:47PM Security
Privacy commissioner reminds APRA of data offshoring rules

Privacy commissioner reminds APRA of data offshoring rules

Regulator develops data protection guide as banks go to the cloud.
Liz Tay May 10 2013 12:06PM Software
GovHack to encourage agencies on open data

GovHack to encourage agencies on open data

500 developers to particpate.
Charis Palmer May 10 2013 11:10AM Training & Development
SC Awards 2013 finalists announced

SC Awards 2013 finalists announced

Winners revealed at AusCERT.
Darren Pauli May 10 2013 11:02AM Security
Hack puts over a million US citizens at risk

Hack puts over a million US citizens at risk

Washington State website attacked.
Staff Writers May 10 2013 9:59AM Security
$45M drained from bank accounts in international carding heist

$45M drained from bank accounts in international carding heist

$2 million withdrawn in one day from hacked prepaid debit card accounts.
Danielle Walker May 10 2013 9:36AM Security
Hackers steal credit card data, passwords from domain registrar

Hackers steal credit card data, passwords from domain registrar

Says its encryption is sufficient.
Danielle Walker May 10 2013 9:36AM Security
Huawei CEO breaks silence

Huawei CEO breaks silence

Company "not connected to US cyber threats".
Staff Writers May 10 2013 7:06AM Networking
Inside eBay’s 90PB data warehouse

Inside eBay’s 90PB data warehouse

Engineers build analytics-as-a-service.
Liz Tay May 10 2013 7:00AM Software
Optus takes on not-for-profit MVNO

Optus takes on not-for-profit MVNO

Telco targets disabled users.
Allie Coyne May 10 2013 7:00AM Telco/ISP
NZ to bypass software patents

NZ to bypass software patents

Compromise reached with new law.
Juha Saarinen May 10 2013 5:00AM Strategy
Review: GFI EventsManager 2013

Review: GFI EventsManager 2013

GFI EventsManager collects, centralizes, normalizes, consolidates and analyzes a wide range of log types, such as World Wide Web Consortium (W3C) and any text-based formats, Windows events, SQL Server and Oracle audits, and syslog and simple network management protocol (SNMP) traps generated by devices, such as firewalls, servers, routers, switches, sensors, SQL server systems, PCs and custom devices.
Peter Stephenson May 9 2013 5:43PM Security
Australian business swallowing tablets at faster rate

Australian business swallowing tablets at faster rate

PC buying intentions fall.
Staff Writers May 9 2013 4:03PM Hardware
Review: HP ArcSight Express

Review: HP ArcSight Express

The HP ArcSight Express appliance features a full set of SIEM capabilities, including security event correlation, log management, IT search, NetFlow monitoring and compliance reporting. Using this tool, security professionals and system administrators can identify and investigate many security events and rule violatations - all from a single interface. Along with the usual monitoring and reporting functions of a SIEM, this offering also features user activity and role monitoring, which provides a more complete picture of certain security events and how they occurred.
Peter Stephenson May 9 2013 3:58PM Security
Review: LogRhythm

Review: LogRhythm

The LogRhythm appliance goes way beyond traditional security event monitoring and management. This appliance features log and event management functions as with any SIEM, but beyond that it includes advanced correlation and pattern recognition driven by its onboard Advanced Intelligence Engine, with host activity and file integrity monitoring, and drill-down capabilities to get to the raw log data for analysis and forensics.
Peter Stephenson May 9 2013 3:50PM Security
Review: McAfee Enterprise Security Manager

Review: McAfee Enterprise Security Manager

The McAfee Enterprise Security Manager is back this year after a full transformation from its former self, the NitroView ESM. Many of the obvious differences are skin deep, and much of the robustness of the previous product remain intact, including the familiar management console, but more on that shortly. For those who do not know this product, the Enterprise Security Manager is the ultimate high-powered SIEM. This tool uses a proprietary backend database that allows it to collect more than 18,000 events per second from a single receiver and feed them through an advanced correlation engine for deep analysis.
Peter Stephenson May 9 2013 3:44PM Security
Review: NetIQ Sentinel

Review: NetIQ Sentinel

Sentinel from NetIQ offers a lot of robust SIEM features and functions. This product features log collection, aggregation, correlation and analysis and reporting - all from one single point that is easy to use and manage. Administrators and security personnel can use this tool to gain a great amount of insight into security events, as well as prevent threats that may be unseen without the use of Sentinel's powerful log correlation engine.
Peter Stephenson May 9 2013 3:41PM Security
Review: SolarWinds Log & Event Manager

Review: SolarWinds Log & Event Manager

The SolarWinds Log & Event Manager, also known as the LEM, is a virtual appliance capable of collecting logs and events from almost any network-connected device and then correlating that data for further analysis. The LEM virtual appliance can be deployed in either a VMware ESX or Microsoft Hyper-V virtual environment and can provide insight into security events, as well as help with performance monitoring and compliance management.
Peter Stephenson May 9 2013 3:37PM Security

Log In

  |  Forgot your password?