Access control and authentication - News, Features, and Slideshows
Don't look now, but we've failed to anticipate our attackers' next moves --- again.
By By Kenneth van Wyk | 28 August, 2014 03:38
Future versions of the Firefox OS mobile platform will allow users to control application-specific permissions, a feature with both privacy and security benefits that's missing on Android.
By Lucian Constantin | 27 August, 2014 00:01
British intelligence agency GCHQ used port scanning as part of the "Hacienda" program to find vulnerable systems it and other agencies could compromise across at least 27 countries, German news site Heise Online has revealed.
By Mikael Ricknäs | 16 August, 2014 05:47
Microsoft's strategy for providing customers with identity management options is increasingly reliant on cloud-based methods of authentication and access control for provisioning of Windows-based mobile devices as well as Apple iOS and Google Android devices.
By Ellen Messmer | 15 August, 2014 02:02
Amazon Web Services now lets enterprises use two-factor authentication to better protect hosted WorkSpaces virtual desktops.
By Mikael Ricknäs | 12 August, 2014 20:59
Developers being overly trusting is one of them.
By Kenneth van Wyk | 21 May, 2013 20:56
An assessment of the information security department shows that it has a lot of growing up to do yet.
By Mathias Thurman | 05 November, 2012 11:15
UXC Connect’s Jesmond Psaila says that DevOps can do for IT operations what Agile did for software development. This paper demonstrates how, by combining both approaches, you can significantly improve operational efficiency and time-to-market. • Marketing and development teams want to constantly change or increase functionality, while IT operations teams want to keep the environment as stable as possible • Agile software development and virtualisation have not solved the time-to-value problem faced by marketing and IT operations teams • Recent movements in DevOps aim to address and redefine a more agile service management platform, while new tools have vastly improved functionality to configure and automate common processes
- CCL2 Technical Support Engineer - RightFax/MessagingVIC
- FTCampaign Managers| RTB / Programmatic | Expression of InterestNSW
- FTCampaign Managers | RTB | Display + Video | Trading desk |SydneyNSW
- FTDigital Media PlannerNSW
- FTMachine Learning | JAVA | San Fran based global Company | SydneyNSW
- FTSenior Media TraderNSW
- FTDigital Account Manager X 3 | Display + Video advertisingNSW
- FTChief Information OfficerNSW
Organisations have the option to manage IT internally or outsource to a third-party provider. This paper discusses new research by Telsyte into how Australian organisations are using ICT outsourcing to support innovation. • In October 2013 Telsyte surveyed more than 450 Australian CIOs, CEOs and IT decision makers on their outsourcing strategies for 2014 • Outsourcing is a key feature of businesses that have a focus on innovation • Organisations that engage in outsourcing arrangements are more likely to spend greater than 25% of their IT budget on innovative projects
- Bill shock measures extended to all telcos
- Warrantless requests for customer data dominate in Telstra Transparency Report
- Eftpos' online play moves closer with Coles trial
- Honda Australia uses automation to accelerate PC patching
- Smart city apps to alleviate Melbourne’s infrastructure problems
- Senate backs ads for Bureau of Meteorology site
- NZ’s AO Cloud to expand into two Australian data centres
- SuperPartners uses virtualization to conduct systems testing
- As tablet growth slows, Apple may face a year-long iPad sales contraction
- Backoff malware infections are more widespread than thought
- IBM Watson cooks up some new dishes
- Apple will keep pushing for a sales ban on Samsung products
- Facebook testing mobile searches for old posts
- US appeals court denies Oracle request to restore $1.3 billion judgment against SAP
- Scientists create one robot brain to rule them all