Spotlight on cyber security Spotlight on cyber security

Has cyber security in its current form failed? Most information security leaders agree that traditional methods, on their own, aren’t working in the face of the increasing number and severity of threats.

So what are the new and likely future threats? How can cyber security be fixed? Is your infosec team suffering from breach fatigue and, if so, what tools can you put in place to help them?

iTnews will provide some answers to these questions in our Spotlight on cyber security, coinciding with the Australian Information Security Association’s national conference on 18-20 October.

This Spotlight is supported by RSA.

How to steal data through PC components

How to steal data through PC components

No hacking required.
Staff Writers Jun 2 2016 3:55PM Security
No data stolen in hack: NSW Transport

No data stolen in hack: NSW Transport

Booking system still offline.
Allie Coyne Jun 2 2016 2:46PM Security
NSW unis ignoring calls to improve IT

NSW unis ignoring calls to improve IT

Auditor bemoans lax security stance.
Paris Cowan Jun 2 2016 12:01PM Security
US Federal Reserve breached more than 50 times

US Federal Reserve breached more than 50 times

Regular cyber attacks on lucrative target.
Staff Writers Jun 2 2016 10:10AM Security
Malaysian immigration officials fired for sabotaging passport system

Malaysian immigration officials fired for sabotaging passport system

Outages allowed people to enter country undetected.
Paris Cowan Jun 1 2016 2:00PM Security
PC makers blasted for bad bloatware security

PC makers blasted for bad bloatware security

Trivially exploitable vulnerabilities in bundled software.
Juha Saarinen Jun 1 2016 9:02AM Security
Respect my Certificate Authority!

Respect my Certificate Authority!

[Blog post] You should decide who to trust.
Juha Saarinen May 31 2016 2:30PM Security
How an Aussie hacker used information leakage to trade stocks

How an Aussie hacker used information leakage to trade stocks

Why businesses should be conscious of the data they let out.
Allie Coyne May 31 2016 11:00AM Security
Bangladesh Bank hack investigators hint at insider role

Bangladesh Bank hack investigators hint at insider role

Official report due in two to three weeks.
Staff Writers May 31 2016 6:41AM Security
Data61's mission to wipe out the password

Data61's mission to wipe out the password

Researchers want to authenticate you by the way you swipe.
Paris Cowan May 31 2016 6:35AM Security
Australia not spending enough on cyber security

Australia not spending enough on cyber security

Country still lagging despite new strategy, UNSW experts say.
Allie Coyne May 30 2016 12:13PM Security
US push for encryption law dead despite iPhone spotlight

US push for encryption law dead despite iPhone spotlight

Lack of White House support.
Staff Writers May 30 2016 10:04AM Security
MySpace breach potentially the largest ever

MySpace breach potentially the largest ever

Hackers offer 360 million user credentials for 6 Bitcoin.
Juha Saarinen May 29 2016 9:31PM Security
Hack shuts down NSW Trainlink booking system

Hack shuts down NSW Trainlink booking system

Updated: Some customer credit card data, personal info likely captured.
Juha Saarinen May 29 2016 6:36PM Security
Telstra blames network outage on DNS bungle, modem firmware bug

Telstra blames network outage on DNS bungle, modem firmware bug

Confirms 370,000 users affected at peak.
Andrew Sadauskas May 27 2016 12:33PM Telco/ISP
Stemming Heartbleed with the human element

Stemming Heartbleed with the human element

How OpenSSL pulled back from the brink.
Juha Saarinen May 27 2016 9:40AM Security
The $3 billion IT security problem

The $3 billion IT security problem

Why business email compromise is the new malware.
Allie Coyne May 26 2016 3:35PM Security
Watchdog slaps Clinton over private email server

Watchdog slaps Clinton over private email server

Hacking attempts never reported.
Staff Writers May 26 2016 6:57AM Security
Hackers build alternative to 'flawed' CVE bug ID system

Hackers build alternative to 'flawed' CVE bug ID system

New identifier platform needed to address MITRE problems.
Allie Coyne May 25 2016 3:43PM Security
Chips can be built with undetectable malware: researchers

Chips can be built with undetectable malware: researchers

Near-impossible to spot, defend against hardware Trojan.
Juha Saarinen May 25 2016 2:22PM Security

Log In

  |  Forgot your password?