Spotlight on Cyber Security Spotlight on Cyber Security

Most infosec leaders agree that traditional security methods, on their own, are no longer enough to combat advanced new threats. But what new techniques and strategies are they using? What lessons have they learnt from breaches?

iTnews will provide some answers to these questions in our Spotlight on Cyber Security, coinciding with the Australian Information Security Association’s national conference on 10-12 October.

Kaspersky crowdsources malware encryption cracks

Kaspersky crowdsources malware encryption cracks

Hopes to open mystery payload.
Juha Saarinen Aug 15 2012 5:50AM Security
Hackers face loyalty card treasure trove

Hackers face loyalty card treasure trove

Aussies' personal details on the line.
Caitlin Fitzsimmons Aug 13 2012 2:00PM Security
Hackers breach Battle.net gaming community

Hackers breach Battle.net gaming community

Aussie encrypted passwords, email details stolen.
Darren Pauli Aug 13 2012 1:08PM Security
WikiLeaks suffers massive DDoS attack

WikiLeaks suffers massive DDoS attack

Attacks coincide with Stratfor dumps.
Dan Kaplan Aug 13 2012 1:04PM Security
Australian Privacy Foundation slams privacy amendments

Australian Privacy Foundation slams privacy amendments

'Once-in-a-generation' opportunity lost.
Chris Jager Aug 13 2012 12:30PM Security
Roxon reportedly pushes back data retention law

Roxon reportedly pushes back data retention law

Contentious law on ice.
Juha Saarinen Aug 10 2012 7:24AM Security
Ex-Goldman programmer charged again over code theft

Ex-Goldman programmer charged again over code theft

Faces another prison bout.
Staff Writers Aug 10 2012 5:20AM Security
Google cops record fine for Safari bypass

Google cops record fine for Safari bypass

Cookie crumbles.
Jasmin Melvin Aug 10 2012 5:14AM Security
Myki security scare 'offers nothing' to fraudsters

Myki security scare 'offers nothing' to fraudsters

Inadvertent info not enough for fraud.
Darren Pauli Aug 9 2012 7:03AM Security
Apple too tightens policies after journo hack

Apple too tightens policies after journo hack

Mitigates social engineering hacks.
Juha Saarinen Aug 9 2012 5:15AM Security
Amazon shuts social engineering hole

Amazon shuts social engineering hole

Phone call no longer enough.
Juha Saarinen Aug 8 2012 5:36PM Security
Patriot Act provides 'comfortable' risk on cloud

Patriot Act provides 'comfortable' risk on cloud

Conroy pushes self-regulation for vendors.
James Hutchinson Aug 8 2012 2:24PM Networking
Amazon closes social security hole after journo hack

Amazon closes social security hole after journo hack

Phone call no longer enough.
Juha Saarinen Aug 8 2012 5:28AM Security
UK health trust fined for privacy breach

UK health trust fined for privacy breach

'Extremely troubling' privacy breach.
Juha Saarinen Aug 7 2012 7:37AM Security
Dropbox pins spam attack on breached staff account

Dropbox pins spam attack on breached staff account

Hackers steal customer email details.
Fahmida Y. Rashid Aug 6 2012 12:32PM Security
Scammers attack payroll outsourcer

Scammers attack payroll outsourcer

Customers faced with Java exploit.
Darren Pauli Aug 6 2012 11:58AM Security
Queensland GCIO defends web security

Queensland GCIO defends web security

Does open for business mean open to attack?
John Hilvert Aug 6 2012 11:00AM Security
RIM refutes Indian encryption key reports again

RIM refutes Indian encryption key reports again

Claims corporate emails remain safe from government surveillance.
Staff Writers Aug 3 2012 3:30PM Security
Aussie banks spend up on IT security: survey

Aussie banks spend up on IT security: survey

Escape budget constraints.
Ry Crozier Aug 2 2012 7:00AM Security
Banks refresh IT security strategies in Asia Pacific

Banks refresh IT security strategies in Asia Pacific

Escape budget constraints.
Ry Crozier Aug 1 2012 1:35PM Security

Log In

  |  Forgot your password?