Spotlight on Cyber Security Spotlight on Cyber Security

Most infosec leaders agree that traditional security methods, on their own, are no longer enough to combat advanced new threats. But what new techniques and strategies are they using? What lessons have they learnt from breaches?

iTnews will provide some answers to these questions in our Spotlight on Cyber Security, coinciding with the Australian Information Security Association’s national conference on 10-12 October.

Sony says 25 million more users at risk

Sony says 25 million more users at risk

Crisis deepens.
Isabel Reynolds and Liana B. Baker May 4 2011 7:04AM Security
New index a step to trading IT security risks

New index a step to trading IT security risks

Sets March base.
Liam Tung May 4 2011 6:39AM Security
Review: Norton Internet Security 2011

Review: Norton Internet Security 2011

Great protection for those who don't mind a little complexity.
Staff Writers Apr 29 2011 12:39PM Security
Google, Microsoft recruiting 6200 in talent war

Google, Microsoft recruiting 6200 in talent war

Will search tools be needed to sift through applications for a record number of jobs this quarter?
Nate Cochrane Apr 21 2011 6:27AM Training & Development
Photos: Trend Micro's Security Roadshow 2011

Photos: Trend Micro's Security Roadshow 2011

David Higgins addresses Trend Micro's partners at the annual Security Roadshow in Sydney on Friday.
Apr 20 2011 1:13PM Security
BlackBerry brings security smarts to Aussie users

BlackBerry brings security smarts to Aussie users

Offers enterprise-class security via downloadable app.
Stuart Finlayson Apr 20 2011 6:24AM Hardware
Researchers propose cyberwar framework

Researchers propose cyberwar framework

Honeypots, web mining lead counter-terrorism offensive.
Liz Tay Apr 20 2011 6:00AM Security
Apple addresses Comodo hack with security patches

Apple addresses Comodo hack with security patches

Safari looks set to get do-not-follow system.
Nicole Kobie Apr 18 2011 6:03AM Security
Storage, security on SMB cloud users' risk list

Storage, security on SMB cloud users' risk list

Small and medium businesses (SMBs) are focusing on their infrastructure as a key priority, according to research released today.
Adrian Bridgwater Apr 15 2011 9:44AM Security
Cloud users remain worried by security, lock-in

Cloud users remain worried by security, lock-in

Those committed to the cloud most worried by the risks.
Dan Hatch Apr 15 2011 9:39AM Security
Serco employee suspected of Victoria Police breach

Serco employee suspected of Victoria Police breach

Man accused of adjusting 67,541 traffic infringement records.
Liz Tay Apr 15 2011 8:08AM Security
Man arrested for meddling in Victoria Police camera data

Man arrested for meddling in Victoria Police camera data

Outsourced staffer adjusts 60,000 records of red light and speeding offences.
Liz Tay Apr 13 2011 4:46PM Security
Microsoft calls Google on key government credentials

Microsoft calls Google on key government credentials

Google denies it misled court.
Liam Tung Apr 12 2011 8:43AM Networking
France password law 'shocks' Google, Facebook

France password law 'shocks' Google, Facebook

Handing passwords to police could be a security nightmare
Stewart Mitchell Apr 8 2011 12:07PM Security
Epsilon: Does phishing constitute 'harm'?

Epsilon: Does phishing constitute 'harm'?

Comment: High time for data breach notification debate.
Liam Tung Apr 8 2011 11:13AM Security
Epsilon breach used four-month-old attack

Epsilon breach used four-month-old attack

ReturnPath had warned partners of breach in November.
Brett Winterford Apr 7 2011 3:13PM Security
Analysis: Epsilon breach reveals "spear-phishing" risk

Analysis: Epsilon breach reveals "spear-phishing" risk

Major banks and retailers impacted.
Staff Writers Apr 6 2011 11:44AM Security
IBM opens European advanced security centre

IBM opens European advanced security centre

Big Blue sets up a security institute in Brussels, helping firms come together to learn about threats and how to deal with them.
Tom Brewster Apr 1 2011 12:30PM Security
Hacker: Avionics vulnerable to next-gen attacks

Hacker: Avionics vulnerable to next-gen attacks

Stuxnet concepts could give terrorists remote control.
Liz Tay Apr 1 2011 9:03AM Security
Ex-Commissioner calls for privacy restructure

Ex-Commissioner calls for privacy restructure

Unnecessary ID requirements could drive a criminal market.
Liz Tay Mar 31 2011 6:32AM Security

Log In

  |  Forgot your password?