Spotlight on Cyber Security Spotlight on Cyber Security

Most infosec leaders agree that traditional security methods, on their own, are no longer enough to combat advanced new threats. But what new techniques and strategies are they using? What lessons have they learnt from breaches?

iTnews will provide some answers to these questions in our Spotlight on Cyber Security, coinciding with the Australian Information Security Association’s national conference on 10-12 October.

Photos: AISA National Conference 2014

Photos: AISA National Conference 2014

Highlight's from Australia's volunteer-run information security event.
Staff Writers Oct 20 2014 11:56AM Security
NSA exec's second job with cyber security firm raises eyebrows

NSA exec's second job with cyber security firm raises eyebrows

"Unusual" job share scheme subject to review.
Warren Strobel , Mark Hosenball , Staff Writers Oct 20 2014 9:25AM Training & Development
Cloud, big data propel bank CISOs into the boardroom

Cloud, big data propel bank CISOs into the boardroom

And this time, they are welcome.
Brett Winterford Oct 20 2014 6:25AM Security
Obama signs Executive Order on payment security

Obama signs Executive Order on payment security

Backs microchips and PINs.
Teri Robinson , Brett Winterford Oct 19 2014 5:25PM Security
NSW Police arrest another alleged Liberty Reserve fraudster

NSW Police arrest another alleged Liberty Reserve fraudster

Arrests total 32.
Allie Coyne Oct 17 2014 3:22PM Security
Committee rules against expanding biometric data collection

Committee rules against expanding biometric data collection

Privacy inquiry needed first.
Allie Coyne Oct 17 2014 12:03PM Security
FBI urges companies to build spying tools into devices

FBI urges companies to build spying tools into devices

Wants entry through 'front door, not back door'.
Allie Coyne Oct 17 2014 10:10AM Security
ASD staff move into Australia’s new security hub

ASD staff move into Australia’s new security hub

Seeks to exchange threat data with telcos, other industries.
Brett Winterford Oct 16 2014 10:59AM Security
FBI seeks out victims of recent industrial espionage hack

FBI seeks out victims of recent industrial espionage hack

Detects suspected Chinese cyber intrusion.
Staff Writers Oct 16 2014 9:44AM Security
OpenSSL plugs high severity vulnerability

OpenSSL plugs high severity vulnerability

0.9.8 end-of-life countdown starts.
Juha Saarinen Oct 16 2014 5:19AM Security
Telstra to buy managed network specialist Bridge Point

Telstra to buy managed network specialist Bridge Point

Latest acquisition bolsters NAS unit.
Allie Coyne Oct 15 2014 3:18PM Telco/ISP
Vic Govt agencies failing to patch, monitor access controls

Vic Govt agencies failing to patch, monitor access controls

Auditor-General calls on CIOs to focus on security.
Paris Cowan Oct 15 2014 1:49PM Security
Google finds vulnerability in SSL web encryption

Google finds vulnerability in SSL web encryption

Details fix for 'POODLE' attack.
Allie Coyne Oct 15 2014 9:29AM Security
Russian hackers use Windows zero-day to spy on NATO, EU

Russian hackers use Windows zero-day to spy on NATO, EU

SandWorm Team active for five years.
Jim Finkle , Staff Writers Oct 15 2014 6:06AM Security
Router rooting is shooting fish in a barrel

Router rooting is shooting fish in a barrel

[Blog post] Don't rely on broadband or wireless router vendors to protect you.
Juha Saarinen Oct 14 2014 3:05PM Security
JPMorgan to double infosec spending to $570m after hack

JPMorgan to double infosec spending to $570m after hack

PR stunt or positive step?
Staff Writers Oct 14 2014 12:50PM Security
Senate inquiry hears calls for crackdown on 3D printed guns

Senate inquiry hears calls for crackdown on 3D printed guns

Victoria Police warns of 'significant risk' to police, citizens.
Allie Coyne Oct 14 2014 12:36PM Security
Spy watchdog to hire more staff to manage ASIO oversight

Spy watchdog to hire more staff to manage ASIO oversight

Would bring headcount to 16.
Allie Coyne Oct 14 2014 8:21AM Security
HP to revoke certificate that mistakenly signed malware

HP to revoke certificate that mistakenly signed malware

Will re-issue new digital signature.
Allie Coyne Oct 13 2014 3:28PM Security
Leak suggests NSA used secret agents to infiltrate networks

Leak suggests NSA used secret agents to infiltrate networks

Sentry Eagle program conducted in cooperation with industry.
Juha Saarinen Oct 13 2014 7:15AM Security

Log In

  |  Forgot your password?