Spotlight on Cyber Security Spotlight on Cyber Security

Most infosec leaders agree that traditional security methods, on their own, are no longer enough to combat advanced new threats. But what new techniques and strategies are they using? What lessons have they learnt from breaches?

iTnews will provide some answers to these questions in our Spotlight on Cyber Security, coinciding with the Australian Information Security Association’s national conference on 10-12 October.

Poynter review: HMRC has radically reduced security risks

Poynter review: HMRC has radically reduced security risks

HMRC has radically improved its data security measures since the breach which caused it to lose 25 million child benefit records in October last year.
Richard Thurston Jun 27 2008 10:25AM Security
Security spending to survive the downturn

Security spending to survive the downturn

Budget reductions unlikely, claims VeriSign.
Guy Dixon Jun 27 2008 9:55AM Security
Researchers crack London tube card security

Researchers crack London tube card security

Researchers from Radboud University in the Netherlands have successfully cracked the security of the Oyster card used for fare payments on buses and tubes in London..
Andrew Charlesworth Jun 26 2008 10:30AM Security
Building a security culture

Building a security culture

Lately there has been a lot of discussion about the difference between real security and compliance with data security regulations.
Gordon Rapkin, president and CEO, Protegrity Jun 25 2008 3:30PM Security
Proofpoint acquires email archiving firm Fortiva

Proofpoint acquires email archiving firm Fortiva

Email security provider Proofpoint has acquired an on-demand email archiving vendor to boost its offerings.
Dan Kaplan Jun 25 2008 9:51AM Security
Balancing mobility with security is a fine art

Balancing mobility with security is a fine art

IT managers must keep their eye on risks as mobile devices become widespread.
Dave Bailey Jun 24 2008 9:07AM Security
If you can't trust the compliance officer, whom can you trust?

If you can't trust the compliance officer, whom can you trust?

The insider threat is the main security risk enterprises face -- insider incidents from using system administrator or privileged account access are responsible for nine out of 10 breaches in data security.
Calum Macleod, european director, Cyber-Ark Jun 23 2008 3:14PM Security
Microsoft re-releases security fix

Microsoft re-releases security fix

Microsoft has re-issued an ineffective security patch it released earlier this month.
Shaun Nichols Jun 21 2008 3:24PM Security
Enterprise security software market booms

Enterprise security software market booms

Gartner is reporting that sales of enterprise security products rose by nearly 20 percent last year..
Iain Thomson Jun 18 2008 2:37PM Security
Browser wars changing security game

Browser wars changing security game

The re-emergence of the 'browser wars' between Internet Explorer, Firefox, Opera and newcomer Safari is changing the security landscape, say experts..
Shaun Nichols Jun 18 2008 11:19AM Security
Review: IBM Proventia Network Mail Security System

Review: IBM Proventia Network Mail Security System

The IBM Proventia Network Mail Security System is just that, a full-on mail security system. This product features some high grade functionality for the large enterprise.
Peter Stephenson, Jun 17 2008 12:51PM Security
Learn from these mistakes

Learn from these mistakes

We can't just blame clever hackers for security breaches, infosec professionals need to get their act together.
Ian Castle Jun 12 2008 3:53PM Security
Boffins take Wi-Fi security back to school

Boffins take Wi-Fi security back to school

US academics are to examine live wireless network traffic across a university campus in an effort to learn how best to maintain data security..
Robert Jaques Jun 12 2008 7:37AM Security
Microsoft posts June security fixes

Microsoft posts June security fixes

Microsoft has issued seven security bulletins covering 10 vulnerabilities in components of Windows and Internet Explorer..
Shaun Nichols Jun 12 2008 7:37AM Security
Review: Symantec Mail Security 8300 Series

Review: Symantec Mail Security 8300 Series

The Symantec Mail Security appliance houses several email content management features in one well-integrated device.
Peter Stephenson, Jun 11 2008 2:43PM Security
Faster, cheaper iPhone portends IT security headaches

Faster, cheaper iPhone portends IT security headaches

IT professionals are gearing up for more security headaches from the Apple's latest smart phone.
Jim Carr Jun 11 2008 10:32AM Security
Bug exposed in web security standard

Bug exposed in web security standard

VBAAC flaw in the standard web authorisation technology could affect hundreds of thousands of sites, security experts have warned.
Robert Jaques Jun 11 2008 7:48AM Security
End of the line for standalone security vendors?

End of the line for standalone security vendors?

Technology giants will progressively build security into the foundation of their goods and services squeezing standalone security vendors out of existence, the founder of a local security vendor has claimed.
Negar Salek Jun 10 2008 1:41PM Security
Security expert: BT should be prosecuted over its use of Phorm

Security expert: BT should be prosecuted over its use of Phorm

Cambridge University security researcher Dr Richard Clayton argues that BT should be prosecuted because it monitored internet users' websurfing habits without their permission, while the telco declines to say its activities were legal.
Richard Thurston Jun 10 2008 10:12AM Security
Government launches alert service to kick off E-security Week

Government launches alert service to kick off E-security Week

The Federal Government kicked-off National E-security week today with the launch of a new security alert service for internet users and small businesses.
Staff Writers Jun 6 2008 3:01PM Security

Log In

  |  Forgot your password?