Spotlight on cyber security Spotlight on cyber security

Has cyber security in its current form failed? Most information security leaders agree that traditional methods, on their own, aren’t working in the face of the increasing number and severity of threats.

So what are the new and likely future threats? How can cyber security be fixed? Is your infosec team suffering from breach fatigue and, if so, what tools can you put in place to help them?

iTnews will provide some answers to these questions in our Spotlight on cyber security, coinciding with the Australian Information Security Association’s national conference on 18-20 October.

This Spotlight is supported by RSA.

Brandis says white hats will be exempt from data law changes

Brandis says white hats will be exempt from data law changes

Criminal offences won't apply to researchers.
Allie Coyne Sep 29 2016 5:31PM Security
Health pulls Medicare dataset after breach of doctor details

Health pulls Medicare dataset after breach of doctor details

[Updated] Researchers say govt encryption was poor.
Paris Cowan Sep 29 2016 11:27AM Security
Telstra grilled over security of cancer register data

Telstra grilled over security of cancer register data

OAIC floats new breach reporting requirements.
Allie Coyne Sep 29 2016 9:12AM Telco/ISP
Apache unleashes Spot, the open source cyber security project

Apache unleashes Spot, the open source cyber security project

Security through big data analytics and machine learning.
Juha Saarinen Sep 29 2016 9:00AM Security
ASX shareholders are worried about blockchain security

ASX shareholders are worried about blockchain security

Chairman admits exchange could become a target.
Allie Coyne Sep 28 2016 2:41PM Security
Facebook ordered to delete WhatsApp user data in Germany

Facebook ordered to delete WhatsApp user data in Germany

Regulator says company breached data protection law.
Staff Writers Sep 28 2016 6:35AM Security
Is the internet of things the new DDoS attack weapon?

Is the internet of things the new DDoS attack weapon?

[Blog post] Leveraging IoT devices for botnets.
Tony Campbell Sep 27 2016 3:00PM Security
Apple OS X machines targeted by new Komplex Trojan

Apple OS X machines targeted by new Komplex Trojan

Aerospace employees falling victim.
Juha Saarinen Sep 27 2016 11:43AM Security
Rio Tinto scales up cyber security

Rio Tinto scales up cyber security

Global drive to focus on security control systems.
Ry Crozier Sep 27 2016 6:35AM Security
OpenSSL security patches created critical vulnerability

OpenSSL security patches created critical vulnerability

Fix for low severity issue turns problematic.
Juha Saarinen Sep 27 2016 4:38AM Security
Apple iOS 10 backup security can be easily cracked

Apple iOS 10 backup security can be easily cracked

Flaw could unravel whole Keychain secure credentials storage.
Juha Saarinen Sep 26 2016 11:05AM Security
ABS claims IBM's botched geoblocking failed the Census

ABS claims IBM's botched geoblocking failed the Census

Blame game begins in post-survey hose down.
Paris Cowan Sep 26 2016 9:28AM Hardware
Yahoo sued over 2014 mega hack

Yahoo sued over 2014 mega hack

"Gross negligence" alleged for leak of 500m accounts.
Jonathan Stempel , Staff Writers Sep 24 2016 10:34AM Security
'World's largest' DDoS sees infosec journo's site taken down

'World's largest' DDoS sees infosec journo's site taken down

Akamai's Prolexic puts packet flood at 620 Gbps.
Juha Saarinen Sep 23 2016 11:35AM Security
Probe of NSA hacking tools leak points to an own goal

Probe of NSA hacking tools leak points to an own goal

Careless operative blamed for fumble three years ago.
Joseph Menn , John Walcott Sep 23 2016 8:21AM Security
OpenSSL patches high-severity vulnerability

OpenSSL patches high-severity vulnerability

Could be abused for denial-of-service attacks.
Juha Saarinen Sep 23 2016 7:00AM Security
Yahoo confirms mega user account data breach

Yahoo confirms mega user account data breach

Says 500m accounts stolen in 2014 attack.
Juha Saarinen Sep 23 2016 6:38AM Security
Crims place booby-trapped USB drives in letter boxes

Crims place booby-trapped USB drives in letter boxes

Victorians warned not to plug in malware-laden devices.
Paris Cowan Sep 22 2016 10:12AM Security
Tesla patches remote attack vulnerability

Tesla patches remote attack vulnerability

Researchers could brake, turn on windscreen wipers.
Staff Writers Sep 21 2016 11:04AM Security
Global cyber standards aren't enough to secure central banks

Global cyber standards aren't enough to secure central banks

[Blog post] Don't rely on frameworks for protection.
Tony Campbell Sep 20 2016 3:00PM Security

Log In

  |  Forgot your password?