Spotlight on Cyber Security Spotlight on Cyber Security

Most infosec leaders agree that traditional security methods, on their own, are no longer enough to combat advanced new threats. But what new techniques and strategies are they using? What lessons have they learnt from breaches?

iTnews will provide some answers to these questions in our Spotlight on Cyber Security, coinciding with the Australian Information Security Association’s national conference on 10-12 October.

ISF releases report on cloud computing security

ISF releases report on cloud computing security

Details five key steps to take before moving to the cloud.
Phil Muncaster Nov 13 2009 11:49AM Security
ATM machines free to buy in the US

ATM machines free to buy in the US

Security of previous users at risk.
Dan Raywood Nov 13 2009 11:46AM Security
64 percent of websites contain serious flaws

64 percent of websites contain serious flaws

Cross-site scripting and SQL injection remain the top methods of attack.
Greg Masters Nov 13 2009 11:40AM Security
New iPhone malware spotted

New iPhone malware spotted

Security firm warns users with jailbroken phones.
Cath Everett Nov 12 2009 6:31AM Security
Industry needs to come clean on cloud security: Trend Micro

Industry needs to come clean on cloud security: Trend Micro

CTO warns of widespread data theft.
Phil Muncaster Nov 11 2009 11:49AM Security
Apple unveils massive patch update

Apple unveils massive patch update

32 patches for critical flaws released.
Cath Everett Nov 11 2009 6:06AM Security
US Congress accidentally leaks confidential report

US Congress accidentally leaks confidential report

P2P networks to blame.
Dan Raywood Nov 10 2009 10:42AM Security
RIM offers patch for Blackberry desktop manager

RIM offers patch for Blackberry desktop manager

Risk of remote code execution.
SC Australia Staff Nov 9 2009 11:11AM Security
SSL flaw prompts security scramble

SSL flaw prompts security scramble

Network and server admins affected.
Shaun Nichols Nov 7 2009 7:35AM Security
Commentary: Experts in denial about Mac security?

Commentary: Experts in denial about Mac security?

How important is security when buying a Mac?
Munir Kotadia Nov 7 2009 12:33AM Security
Windows 7 fails to stop eight out of ten viruses

Windows 7 fails to stop eight out of ten viruses

UAC default configuration "is not effective".
Dan Raywood Nov 6 2009 11:15AM Security
McAfee targets SMEs with web and email appliance

McAfee targets SMEs with web and email appliance

Promises comprehensive security and control.
David Neal Nov 6 2009 12:13AM Security
Opinion: Windows 7 is everything Vista should have been, with one noteworthy exception

Opinion: Windows 7 is everything Vista should have been, with one noteworthy exception

Windows 7 is great stuff, just don't forget to go to the control panel and turn security on.
Eric Voskuil, Nov 5 2009 11:20AM Security
Spam volume reaches all-time high: McAfee

Spam volume reaches all-time high: McAfee

Accounts for 92 percent of all emails.
Angela Moscaritolo Nov 4 2009 10:31AM Security
M86 targets the web gateway with Finjan buy

M86 targets the web gateway with Finjan buy

Another strategic purchase.
Phil Muncaster Nov 4 2009 6:16AM Security
Security industry 'not making much difference'

Security industry 'not making much difference'

500 percent increase in malware last year.
Munir Kotadia Nov 3 2009 12:16PM Security
Worm outbreaks on the up, says Microsoft threat report

Worm outbreaks on the up, says Microsoft threat report

Worms climb from fifth to second most prevalent cyberthreat.
Angela Moscaritolo Nov 3 2009 11:45AM Security
USB stick security flaw puts data at risk

USB stick security flaw puts data at risk

"Imminent threat" to sensitive information.
David Neal Nov 2 2009 7:14AM Security
Security podcasters get hairy for charity

Security podcasters get hairy for charity

Movember challenge spans Australia and the US.
Oct 30 2009 4:25PM Security
Opinion: Carelessness is the biggest security threat

Opinion: Carelessness is the biggest security threat

The latest security tech is worth little if users fail to maintain best practice, says John Walker.
Oct 30 2009 3:55PM Security

Log In

  |  Forgot your password?