Spotlight on Cyber Security Spotlight on Cyber Security

Most infosec leaders agree that traditional security methods, on their own, are no longer enough to combat advanced new threats. But what new techniques and strategies are they using? What lessons have they learnt from breaches?

iTnews will provide some answers to these questions in our Spotlight on Cyber Security, coinciding with the Australian Information Security Association’s national conference on 10-12 October.

How hard do you hack back?

How hard do you hack back?

[Blog post] Taking the offensive could have unintended consequences.
Juha Saarinen Sep 16 2014 2:39PM Security
Govts pressure Google for more user data

Govts pressure Google for more user data

Australian requests dip slightly.
Allie Coyne Sep 16 2014 9:57AM Security
Snowden accuses NZ PM of lying about mass surveillance

Snowden accuses NZ PM of lying about mass surveillance

Five days out from national election.
Juha Saarinen Sep 15 2014 2:48PM Telco/ISP
NSW Police named as FinFisher spyware user

NSW Police named as FinFisher spyware user

Wikileaks values license at $2.6 million.
Allie Coyne Sep 15 2014 11:52AM Security
Wordpress resets logins after Gmail credentials leak

Wordpress resets logins after Gmail credentials leak

600,000 Wordpress accounts found in dump.
Juha Saarinen Sep 14 2014 6:04AM Security
Researcher uncovers timing attack to decloak Google users

Researcher uncovers timing attack to decloak Google users

But web giant isn't interested in remediating it.
Juha Saarinen Sep 12 2014 5:39AM Security
Microsoft drops dangerous ASP.NET setting

Microsoft drops dangerous ASP.NET setting

Change in advice could affect web applications.
Juha Saarinen Sep 11 2014 6:33AM Software
Millions of Gmail user credentials posted on web

Millions of Gmail user credentials posted on web

Passwords may be from more than one source.
Juha Saarinen Sep 11 2014 6:06AM Security
Tax office on the hunt for new infosec chief

Tax office on the hunt for new infosec chief

To contribute to 'technology transformation'.
Paris Cowan Sep 10 2014 11:21AM Training & Development
What to say when things go wrong

What to say when things go wrong

[Blog post] Is crisis comms part of your disaster recovery plan?
Juha Saarinen Sep 9 2014 11:07AM Security
Salesforce customers targeted by malware

Salesforce customers targeted by malware

Dyreza Trojan spreading.
Juha Saarinen Sep 9 2014 8:26AM Security
Feds propose strict security controls for ICT suppliers

Feds propose strict security controls for ICT suppliers

Extra checks to address data breaches.
Andrew Colley Sep 8 2014 3:44PM Security
Infected Linux servers give DDoS attacks some oomph

Infected Linux servers give DDoS attacks some oomph

Admins urged to take action.
Teri Robinson Sep 8 2014 12:03PM Security
Barclays Bank to adopt vein-scanner authentication

Barclays Bank to adopt vein-scanner authentication

To stem the tide of bank fraud.
Steve Slater Sep 5 2014 4:54PM Financial Services
Apple shares slump ahead of Sept 9 iPhone launch

Apple shares slump ahead of Sept 9 iPhone launch

Worst day in nine months follows iCloud breach.
Staff Writers Sep 4 2014 1:43PM Security
Govt backed research body proposes big data for APS staff vetting

Govt backed research body proposes big data for APS staff vetting

But admits 'just because we can do it, does not mean we should'.
John Hilvert Sep 4 2014 9:50AM Security
US Home Depot investigating possible data breach

US Home Depot investigating possible data breach

Banks reportedly trace stolen cards to retailer.
Staff Writers Sep 3 2014 11:39AM Security
Govt dumps controversial Labor offshore cloud policy

Govt dumps controversial Labor offshore cloud policy

Complaints lead to removal of double ministerial sign-off.
Allie Coyne Sep 3 2014 10:33AM Software
Research contradicts Brandis' focus on insider threats

Research contradicts Brandis' focus on insider threats

Warns against creating an 'oppressive workplace'.
John Hilvert Sep 3 2014 10:31AM Security
Want an Internet of Things? Fix the internet first

Want an Internet of Things? Fix the internet first

[Blog post] What if the physical world inherits the bugs of the virtual one?
Anthony May Sep 3 2014 9:30AM Hardware

Log In

  |  Forgot your password?