Spotlight on cyber security Spotlight on cyber security

Has cyber security in its current form failed? Most information security leaders agree that traditional methods, on their own, aren’t working in the face of the increasing number and severity of threats.

So what are the new and likely future threats? How can cyber security be fixed? Is your infosec team suffering from breach fatigue and, if so, what tools can you put in place to help them?

iTnews will provide some answers to these questions in our Spotlight on cyber security, coinciding with the Australian Information Security Association’s national conference on 18-20 October.

This Spotlight is supported by RSA.

Microsoft boosts bug bounties to $135k with Windows 10

Microsoft boosts bug bounties to $135k with Windows 10

Cleaning up new OS post launch.
Adrian Bridgwater Aug 11 2015 6:41AM Security
Brandis urged to dump telco security reforms

Brandis urged to dump telco security reforms

Industry unites in fierce opposition to proposed changes.
Allie Coyne Aug 10 2015 3:03PM Security
Apple iOS Masque bug under active exploit

Apple iOS Masque bug under active exploit

Cybercrims crack open security on Apple devices.
Staff Writers Aug 10 2015 11:31AM Security
Xen Project to stick with QEMU despite vulnerabilities

Xen Project to stick with QEMU despite vulnerabilities

Work on sandboxing hardware emulation kicks off.
Juha Saarinen Aug 10 2015 6:55AM Hardware
Mozilla issues patches against Firefox file-stealing flaw

Mozilla issues patches against Firefox file-stealing flaw

Vulnerability under active exploit.
Juha Saarinen Aug 9 2015 5:26PM Security
ICANN website passwords captured by hacker

ICANN website passwords captured by hacker

Users asked to reset passphrases.
Juha Saarinen Aug 6 2015 12:55PM Security
China to put govt security teams inside big internet firms

China to put govt security teams inside big internet firms

To ensure fast action on undesirable online behaviour.
Staff Writers Aug 6 2015 11:11AM Security
Know where your traffic actually goes

Know where your traffic actually goes

[Blog post] Plan on dealing with BGP hijacks.
Juha Saarinen Aug 4 2015 2:30PM Security
Australia takes part in Interpol's first 'dark web' training program

Australia takes part in Interpol's first 'dark web' training program

As use of darknets grows.
Ashley Carman Aug 4 2015 12:50PM Security
Sensis publishes hundreds of silent numbers online

Sensis publishes hundreds of silent numbers online

Telstra partner blamed as 230 unlisted numbers land in White Pages.
Andrew Sadauskas Aug 3 2015 5:38PM Telco/ISP
Critical BIND bug could crash large portions of the internet

Critical BIND bug could crash large portions of the internet

Apply patch now.
Staff Writers Aug 3 2015 9:41AM Security
Silent Circle offers Android for Work-ready Blackphone

Silent Circle offers Android for Work-ready Blackphone

Blackphone 2 signed-up for device partitioning.
Juha Saarinen Jul 31 2015 12:24PM Hardware
New Android bug renders device silent, unresponsive

New Android bug renders device silent, unresponsive

Denial-of-service flaw affects more than half of all current users.
Allie Coyne Jul 30 2015 12:15PM Security
Critical vulnerability found in Apple App Store, iTunes

Critical vulnerability found in Apple App Store, iTunes

Device name in invoices can be swapped with malicious code.
Allie Coyne Jul 29 2015 11:06AM Security
Aussie cyber centre warns of growing threat in first report

Aussie cyber centre warns of growing threat in first report

But ACSC reveals no major national attack yet.
Allie Coyne Jul 29 2015 7:37AM Security
When Australia's telco sector says enough is enough

When Australia's telco sector says enough is enough

[Blog post] Don't poke the bear.
Allie Coyne Jul 28 2015 11:59AM Software
Android bug leaves a billion phones open to attack

Android bug leaves a billion phones open to attack

Hackers only need phone number to target devices.
Juha Saarinen , Allie Coyne Jul 28 2015 9:40AM Security
US Treasury's intelligence network vulnerable to hack

US Treasury's intelligence network vulnerable to hack

Audit finds connected devices not meeting infosec standards.
Staff Writers Jul 27 2015 1:08PM Security
High-risk denial of service flaw found in Juniper network gear

High-risk denial of service flaw found in Juniper network gear

Customers asked to patch against JunOS vulnerability.
Juha Saarinen Jul 23 2015 4:43AM Telco/ISP
Infosec experts hack Jeep, gain control of moving car

Infosec experts hack Jeep, gain control of moving car

Highlight concerns about driver safety in internet-connected vehicles.
Staff Writers Jul 22 2015 3:38PM Security

Log In

  |  Forgot your password?