Spotlight on cyber security Spotlight on cyber security

Has cyber security in its current form failed? Most information security leaders agree that traditional methods, on their own, aren’t working in the face of the increasing number and severity of threats.

So what are the new and likely future threats? How can cyber security be fixed? Is your infosec team suffering from breach fatigue and, if so, what tools can you put in place to help them?

iTnews will provide some answers to these questions in our Spotlight on cyber security, coinciding with the Australian Information Security Association’s national conference on 18-20 October.

This Spotlight is supported by RSA.

Cisco patches critical vulnerabilities in SME routers

Cisco patches critical vulnerabilities in SME routers

Arbitrary code and command execution and other flaws fixed.
Juha Saarinen Feb 4 2022 9:00AM Networking
Atos rules out sale of cyber security arm to Thales

Atos rules out sale of cyber security arm to Thales

After talk of a potential acquisition.
Mathieu Rosemain Feb 4 2022 6:50AM Security
Crypto platform Wormhole says funds 'restored' after $448m hack

Crypto platform Wormhole says funds 'restored' after $448m hack

But offers few other details.
Tom Wilson and Pushkala Aripaka Feb 4 2022 6:43AM Security
Meta accused by whistleblower of skimping on safety in Australia

Meta accused by whistleblower of skimping on safety in Australia

Budget "disproportionately" spent in the US.
Justin Hendry Feb 3 2022 4:10PM Security
Attacker plunders DeFi platform Wormhole

Attacker plunders DeFi platform Wormhole

Exploited vulnerability leads to A$452 million theft.
Juha Saarinen Feb 3 2022 11:25AM Security
FBI tested NSO Group's spyware

FBI tested NSO Group's spyware

Did not use it for any investigation.
Staff Writer Feb 3 2022 10:11AM Security
NAB recruits Google Cloud's A/NZ head of security

NAB recruits Google Cloud's A/NZ head of security

For a new security consultancy role.
Kate Weber Feb 3 2022 7:05AM Financial Services
Thales considers move for Atos' cyber security arm

Thales considers move for Atos' cyber security arm

Potential breakup of Atos on the cards.
Pamela Barbaglia Feb 3 2022 6:56AM Security
New Iranian hacker backdoor evades security products

New Iranian hacker backdoor evades security products

Phosphorus APT targets medical research and academic organisations.
Juha Saarinen Feb 2 2022 10:00AM Security
Home Affairs says end-to-end encryption is detrimental to public safety

Home Affairs says end-to-end encryption is detrimental to public safety

"Not striking the right balance between the benefits and the risks of harm".
Justin Hendry Feb 2 2022 6:44AM Security
US official to discuss Ukraine cyber security with European allies

US official to discuss Ukraine cyber security with European allies

After massive attack.
Staff Writer Feb 2 2022 6:32AM Security
SoftBank-backed Cybereason confidentially files for US IPO

SoftBank-backed Cybereason confidentially files for US IPO

Could value it at more than $7 billion.
Anirban Sen and Krystal Hu Feb 1 2022 1:20PM Security
Your business must bring cybersecurity out of its "dark corner"

Your business must bring cybersecurity out of its "dark corner"

Learn what that means.
Novaworks Feb 1 2022 12:08PM Partner Content
NSW Planning dept creates new cyber security function, CISO role

NSW Planning dept creates new cyber security function, CISO role

As uplift continues.
Justin Hendry Feb 1 2022 6:59AM Strategy
Australian Red Cross clients potentially caught up in international cyber attack

Australian Red Cross clients potentially caught up in international cyber attack

Database of International Committee of the Red Cross breached.
Ry Crozier Jan 31 2022 12:58PM Security
Home Affairs says online account takeover powers now in use

Home Affairs says online account takeover powers now in use

First warrants issued to authorities late last year.
Justin Hendry Jan 31 2022 8:01AM Security
Researchers detail novel Russian Cozy Bear intrusion techniques

Researchers detail novel Russian Cozy Bear intrusion techniques

Attackers were in victim networks for years.
Juha Saarinen Jan 28 2022 1:14PM Security
Apple patches exploited iOS and macOS zero-day

Apple patches exploited iOS and macOS zero-day

Forms part of an exploit chain.
Juha Saarinen Jan 27 2022 11:33AM Security
BYOD registration abused in large-scale phishing campaign

BYOD registration abused in large-scale phishing campaign

Australian organisations targeted.
Juha Saarinen Jan 27 2022 11:00AM Security

Log In

  |  Forgot your password?