Spotlight on cyber security Spotlight on cyber security

Has cyber security in its current form failed? Most information security leaders agree that traditional methods, on their own, aren’t working in the face of the increasing number and severity of threats.

So what are the new and likely future threats? How can cyber security be fixed? Is your infosec team suffering from breach fatigue and, if so, what tools can you put in place to help them?

iTnews will provide some answers to these questions in our Spotlight on cyber security, coinciding with the Australian Information Security Association’s national conference on 18-20 October.

This Spotlight is supported by RSA.

Cisco warns of another 'Shadow Brokers' leaked zero-day

Cisco warns of another 'Shadow Brokers' leaked zero-day

PIX firewall flaw being exploited.
Juha Saarinen Sep 19 2016 5:18PM Security
Google Play spyware apps target business travellers

Google Play spyware apps target business travellers

Info-stealer uncloaked.
Juha Saarinen Sep 19 2016 6:49AM Security
Telstra signals analytics boost for security ops centre

Telstra signals analytics boost for security ops centre

New data platform to be built.
Ry Crozier Sep 16 2016 10:42AM Security
Chrome OS adds enterprise identity verification

Chrome OS adds enterprise identity verification

Uses Trusted Platform Module to confirm identity.
Juha Saarinen Sep 16 2016 7:53AM Strategy
Central banks seek global cyber standards after Bangladesh heist

Central banks seek global cyber standards after Bangladesh heist

Establish international task force.
Staff Writers Sep 16 2016 7:07AM Security
Adobe patches 27 critical Flash Player vulnerabilities

Adobe patches 27 critical Flash Player vulnerabilities

Multiple flaws allow remote code execution.
Juha Saarinen Sep 15 2016 5:02AM Security
Apple's iOS 10 update bricks devices

Apple's iOS 10 update bricks devices

Fix issued.
Juha Saarinen Sep 14 2016 10:20AM Hardware
Russia accused of hacking world anti-doping agency

Russia accused of hacking world anti-doping agency

"Fancy Bear" hackers release Olympic athletes' data.
Staff Writers Sep 14 2016 8:42AM Security
Did Intel mishandle McAfee?

Did Intel mishandle McAfee?

[Blog post] Security is not a product, it's a process.
Tony Campbell Sep 13 2016 3:00PM Security
Anonymous bots could DDoS US emergency call network

Anonymous bots could DDoS US emergency call network

Threat currently difficult to block.
Juha Saarinen Sep 13 2016 6:40AM Security
Australia's cyber spooks to outsource support, dev

Australia's cyber spooks to outsource support, dev

Want to quickly scale up IT operations.
Paris Cowan Sep 12 2016 1:00PM Security
Slew of Xen bugs leave hosts vulnerable to guest abuse

Slew of Xen bugs leave hosts vulnerable to guest abuse

New hypervisor holes menace cloud infrastructure.
Juha Saarinen Sep 9 2016 11:28AM Security
US govt names first-ever CISO

US govt names first-ever CISO

Plucked from Homeland Security.
Staff Writers Sep 9 2016 9:35AM Security
Chrome to start shaming HTTP sites

Chrome to start shaming HTTP sites

Will mark as insecure from January.
Staff Writers Sep 9 2016 8:22AM Security
Plug'n'play USB attack steals locked Windows creds

Plug'n'play USB attack steals locked Windows creds

No fix for cheap, easy hack.
Juha Saarinen Sep 8 2016 9:26AM Security
Intel to spin off McAfee, sell majority stake

Intel to spin off McAfee, sell majority stake

Security business valued at US$4.2 billion.
Allie Coyne Sep 8 2016 6:53AM Security
NBN Co beefs up cyber security offense

NBN Co beefs up cyber security offense

Ramp up of rollout leads to fresh capabilities.
Ry Crozier Sep 8 2016 6:50AM Security
Aruba products contain compromised HTTPS certificate

Aruba products contain compromised HTTPS certificate

Issue of reused certs in devices rears its ugly head again.
Juha Saarinen Sep 7 2016 11:15AM Security
Australia still has a way to go to become an infosec world leader

Australia still has a way to go to become an infosec world leader

[Blog post] Taking lessons from Israel.
Tony Campbell Sep 6 2016 3:00PM Security
Pokémon-inspired rootkit attacks Linux systems

Pokémon-inspired rootkit attacks Linux systems

Provides backdoor and traffic-hiding capabilities.
Juha Saarinen Sep 6 2016 9:00AM Security

Log In

  |  Forgot your password?