Spotlight on cyber security Spotlight on cyber security

Has cyber security in its current form failed? Most information security leaders agree that traditional methods, on their own, aren’t working in the face of the increasing number and severity of threats.

So what are the new and likely future threats? How can cyber security be fixed? Is your infosec team suffering from breach fatigue and, if so, what tools can you put in place to help them?

iTnews will provide some answers to these questions in our Spotlight on cyber security, coinciding with the Australian Information Security Association’s national conference on 18-20 October.

This Spotlight is supported by RSA.

Roaming Mantis malware expands its reach

Roaming Mantis malware expands its reach

Now targeting iOS devices.
a Staff Writer May 22 2018 2:40PM Security
Intel trials microcode for browser-exploitable Spectre bug

Intel trials microcode for browser-exploitable Spectre bug

Spectre Variant 4 can be triggered with Javascript.
Juha Saarinen May 22 2018 11:20AM Security
Former Uber cyber security chief lands at Cloudflare

Former Uber cyber security chief lands at Cloudflare

Has lofty goal to secure the internet.
a Staff Writer May 18 2018 6:40AM Security
Security leaders try to make staff cyber training stick

Security leaders try to make staff cyber training stick

Making it personal.
Ry Crozier May 17 2018 4:22PM Security
Open banking security is still an open question

Open banking security is still an open question

Analysis: Is bank data security really superior?
Ry Crozier May 15 2018 2:49PM Financial Services
'Efail' vulnerability lies in apps, not PGP and GnuPG

'Efail' vulnerability lies in apps, not PGP and GnuPG

Early fears over research largely unfounded.
Juha Saarinen May 15 2018 6:07AM Security
Family Planning NSW hit by ransomware attack

Family Planning NSW hit by ransomware attack

May have compromised online databases.
Ry Crozier May 14 2018 12:01PM Security
Govt releases My Health Record secondary data use plan

Govt releases My Health Record secondary data use plan

Provides more detail on opt-out model.
Justin Hendry May 11 2018 4:22PM Strategy
WA govt funnels $10m into health systems

WA govt funnels $10m into health systems

And brings forward cyber security funds.
Justin Hendry May 11 2018 12:11PM Strategy
Researchers hide attacks against voice recognition

Researchers hide attacks against voice recognition

Subliminal sounds issue commands without users knowing.
Juha Saarinen May 11 2018 12:01PM Security
Senate backs Greens push for GDPR-style data laws

Senate backs Greens push for GDPR-style data laws

Supports Privacy Act review.
Justin Hendry May 10 2018 1:30PM Strategy
'Misunderstanding' causes serious vulnerability in every OS

'Misunderstanding' causes serious vulnerability in every OS

Emergency patches appear from all vendors.
Juha Saarinen May 10 2018 8:22AM Hardware
Telstra wants legal clarity to block malicious traffic

Telstra wants legal clarity to block malicious traffic

Reveals plan to 'inoculate' Australia against threats.
Ry Crozier May 9 2018 11:55AM Security
Apple iOS update to block mobile forensics

Apple iOS update to block mobile forensics

Disables USB port after a week of device remaining locked.
Juha Saarinen May 9 2018 9:28AM Security
DLA Piper paid 15,000 hours of IT overtime after NotPetya attack

DLA Piper paid 15,000 hours of IT overtime after NotPetya attack

Had to wipe its systems and start again.
Ry Crozier May 8 2018 11:55AM Security
Equifax provides more detail on cyber security incident

Equifax provides more detail on cyber security incident

Copies of passports, driver's licenses also stolen.
a Staff Writer May 8 2018 11:47AM Security
Pentagon's cyber command given upgraded status

Pentagon's cyber command given upgraded status

Puts it on a par with nine other US war commands.
Warren Strobel May 7 2018 12:17PM Security
IAG creates 'novel' model to predict cost of cyber attack

IAG creates 'novel' model to predict cost of cyber attack

Checks how its investments may offset losses.
Ry Crozier May 7 2018 9:56AM Security
Cyber resilience self-reporting on auditor's radar

Cyber resilience self-reporting on auditor's radar

After agencies struggle to meet top four strategies.
Justin Hendry May 7 2018 6:27AM Security
Eight more Spectre-style flaws found in Intel processors

Eight more Spectre-style flaws found in Intel processors

Four rated as high severity.
Juha Saarinen May 4 2018 10:55AM Hardware

Log In

  |  Forgot your password?