Modern Listing Example
It’s all about cyber security
The threat to cyber security is mounting even as the technology landscape transforms across the…
Mobile messaging: Company reputation and security risks rise as business mobile messaging usage increases
Phone hacking was once thought of as News of the World type media spying on…
Improved border security, faster border clearance and reduced cost – the must have Holy Grail for airports
How enabling technologies can help Australia’s airports achieve all three The recent focus on improvements…
The Best Ways to Fend Off DDoS Attacks – Martin Ryan, VP, MD, APAC Dyn
When Australia’s largest wireless broadband provider Cirrus Communications suffered a distributed denial of service (DDoS) attack in…
Joint OSAC and ASIS Meeting
Tentative meeting topics include a high level security briefing from the US Embassy’s Regional Security…
Software Companies Adopting “Ring of Defense” Licensing Strategy to Reduce Hacker Theft
According to a study from IDC and Flexera Software, a significant proportion of software companies…
Akamai Launches Cloud Networking to Accelerate and Secure Cloud-based Applications for Enterprise Branch Offices
New Services Designed to Address Performance, Connectivity, and Security Challenges of Hybrid WAN and Direct…
Protected Health Information shows up in 90 percent of sectors, not just healthcare
Initial findings from Verizon’s inaugural Protected Health Information Data Breach Report suggests securing PHI Data…