Spotlight on Cyber Security Spotlight on Cyber Security

Most infosec leaders agree that traditional security methods, on their own, are no longer enough to combat advanced new threats. But what new techniques and strategies are they using? What lessons have they learnt from breaches?

iTnews will provide some answers to these questions in our Spotlight on Cyber Security, coinciding with the Australian Information Security Association’s national conference on 10-12 October.

User privacy rights must move with their data: Microsoft

User privacy rights must move with their data: Microsoft

Seeks stronger privacy protection to revive 'Safe Harbour' deal.
Juha Saarinen Oct 21 2015 11:03AM Strategy
Inside Interpol's digital crime centre

Inside Interpol's digital crime centre

What's holding back cybercrime investigations?
Andrew Sadauskas Oct 21 2015 11:00AM Security
US cyber information sharing bill sparks privacy concerns

US cyber information sharing bill sparks privacy concerns

Lawmakers to vote on controversial proposal.
Staff Writers Oct 21 2015 6:43AM Security
Turnbull given ok to use Slack, Wickr

Turnbull given ok to use Slack, Wickr

Advice from national security chief revealed.
Allie Coyne Oct 20 2015 3:52PM Security
Things are looking good for Australia's cyber security strategy

Things are looking good for Australia's cyber security strategy

[Blog post] AISA abuzz with chat of what the future holds.
Tony Campbell Oct 20 2015 2:30PM Security
Facebook warns users of state-sponsored attacks

Facebook warns users of state-sponsored attacks

Reveals new notification plans for targets.
Staff Writers Oct 20 2015 1:04PM Security
IBM letting governments review its source code

IBM letting governments review its source code

Says it's to discover flaws.
Staff Writers Oct 19 2015 2:57PM Software
Atlassian's tips for effective breach disclosure

Atlassian's tips for effective breach disclosure

Honesty is still the best policy.
Andrew Sadauskas Oct 19 2015 12:30PM Security
Alleged hacker arrested in Malaysia over supply of stolen data to IS

Alleged hacker arrested in Malaysia over supply of stolen data to IS

Accused of releasing details on 1351 US govt employees.
Staff Writers Oct 16 2015 4:30PM Security
Seek security chief's secrets to board buy-in

Seek security chief's secrets to board buy-in

Three tips to try when advocating for an infosec project.
Andrew Sadauskas Oct 16 2015 10:54AM Security
Yahoo's attempt to eliminate the password

Yahoo's attempt to eliminate the password

IDs verified via smartphone for mail app.
Staff Writers Oct 16 2015 7:10AM Security
Uber leaked drivers' personal data in new app

Uber leaked drivers' personal data in new app

Driver's licenses, tax forms and other personally identifiable data left open.
Staff Writers Oct 15 2015 10:44AM Security
WA Police hires a CISO

WA Police hires a CISO

Drone aficionado jumps on board.
Allie Coyne Oct 14 2015 4:00PM Security
Government agencies targeted with Adobe Flash zero-day

Government agencies targeted with Adobe Flash zero-day

Pawn Storm spear-phishing campaign underway.
Juha Saarinen Oct 14 2015 1:52PM Security
Turnbull advisor offers peek at cybersecurity strategy

Turnbull advisor offers peek at cybersecurity strategy

Previews priorities of impending plan.
Andrew Sadauskas Oct 14 2015 12:20PM Security
All Windows affected by critical security flaws

All Windows affected by critical security flaws

Patch pushed out to plug remote code execution.
Allie Coyne Oct 14 2015 9:13AM Security
Australia's data retention goes live, but ISPs say they're still in the dark

Australia's data retention goes live, but ISPs say they're still in the dark

AGD silence leaves many unclear on exemptions.
Allie Coyne Oct 13 2015 7:00AM Security
When the watchers use Wickr

When the watchers use Wickr

[Blog post] What's secure and open, and what isn't?
Bruce Arnold Oct 12 2015 5:53PM Security
LastPass to retain freemium model after LogMeIn takeover

LastPass to retain freemium model after LogMeIn takeover

Software maker aims to strengthen identity management portfolio.
Juha Saarinen Oct 12 2015 10:57AM Security
Turnbull admits to using private email server

Turnbull admits to using private email server

Denies potential issues with freedom of information.
Staff Writers Oct 9 2015 10:27AM Security

Log In

  |  Forgot your password?