Spotlight on Cyber Security Spotlight on Cyber Security

Most infosec leaders agree that traditional security methods, on their own, are no longer enough to combat advanced new threats. But what new techniques and strategies are they using? What lessons have they learnt from breaches?

iTnews will provide some answers to these questions in our Spotlight on Cyber Security, coinciding with the Australian Information Security Association’s national conference on 10-12 October.

Government speaks out against WikiLeaks dump

Government speaks out against WikiLeaks dump

'Reckless, irresponsible and potentially dangerous.'
Liz Tay Sep 5 2011 1:55PM Security
DigiNotar a weathervane of failed trust

DigiNotar a weathervane of failed trust

Industry reacts.
Darren Pauli Aug 31 2011 4:38PM Security
China to crack down on hackers

China to crack down on hackers

Pledges tougher penalties.
a Staff Writer Aug 31 2011 7:14AM Security
Britain's G-Cloud strategist plays down security concerns

Britain's G-Cloud strategist plays down security concerns

Government CIOs chided for hiding behind security concerns.
John Hilvert Aug 25 2011 4:48PM Security
Privacy lawsuit targets comScore

Privacy lawsuit targets comScore

Alleged data siphoning.
Dan Levine and Jim Finkle Aug 25 2011 7:21AM Security
Lessons from Britain's G-Cloud strategist

Lessons from Britain's G-Cloud strategist

Government CIOs chided for hiding behind security concerns.
John Hilvert Aug 24 2011 12:26PM Strategy
Securing Facebook

Securing Facebook

Incident response team offers no second chances.
Darren Pauli Aug 22 2011 2:00PM Security
Mobile charging stations steal data from devices

Mobile charging stations steal data from devices

USB mode silently comes to life.
Darren Pauli Aug 22 2011 1:51PM Hardware
Admins advised to move off Advanced Encryption Standard

Admins advised to move off Advanced Encryption Standard

Microsoft finding could render AES obsolete.
Stewart Mitchell Aug 22 2011 1:30PM Security
Killing Conficker, 1000 days on

Killing Conficker, 1000 days on

Comment: Why is a 'headless' worm still top of the malware ecosystem?
Aryeh Goretsky Aug 22 2011 11:29AM Security
Fair punishment for data breaches?

Fair punishment for data breaches?

Stakeholders ponder penalties and mandatory notification laws.
Liz Tay Aug 19 2011 4:35PM Security
Parliament Committee finds flaws in Cybercrime Bill

Parliament Committee finds flaws in Cybercrime Bill

New legal responsibilities recommended for carriers and smaller ISPs.
John Hilvert Aug 19 2011 12:40PM Telco/ISP
Privacy review blasts app terms

Privacy review blasts app terms

Google and LinkedIn are riskiest.
John Hilvert Aug 19 2011 7:37AM Software
Aussie Mincom chief leaps to Blue Coat

Aussie Mincom chief leaps to Blue Coat

Trades in asset management hat for WAN optimisation.
Liam Tung Aug 18 2011 6:34AM Networking
Adobe patches critical vulnerabilities

Adobe patches critical vulnerabilities

Shockwave, Flash and Photoshop vulnerable to system hijacking, denial of service.
Dan Raywood Aug 16 2011 12:27PM Security
Hackers disrupt Hong Kong stock exchange

Hackers disrupt Hong Kong stock exchange

Exchange to revert to BBS if interruptions continue.
Darren Pauli Aug 16 2011 12:27PM Financial Services
Police bust card skimming ring

Police bust card skimming ring

Alleged fraud masterminds arrested.
Darren Pauli Aug 16 2011 12:11PM Security
What's a fair punishment for data breaches?

What's a fair punishment for data breaches?

Stakeholders ponder penalties and mandatory notification laws.
Liz Tay Aug 16 2011 12:00PM Security
PCI Council issues tokenization guidance

PCI Council issues tokenization guidance

Replacing sensitive data with tokens doesn't ensure compliance.
Angela Moscaritolo Aug 16 2011 11:10AM Security
Are 'hactivists' freedom fighters or the new face of evil?

Are 'hactivists' freedom fighters or the new face of evil?

Comment: Force and coercion only create fear, uncertainty and doubt.
Craig S. Wright Aug 16 2011 11:07AM Security

Log In

  |  Forgot your password?