Spotlight on Cyber Security Spotlight on Cyber Security

Most infosec leaders agree that traditional security methods, on their own, are no longer enough to combat advanced new threats. But what new techniques and strategies are they using? What lessons have they learnt from breaches?

iTnews will provide some answers to these questions in our Spotlight on Cyber Security, coinciding with the Australian Information Security Association’s national conference on 10-12 October.

IBM adds to its security roster

IBM adds to its security roster

IBM has made a fleet of announcements regarding new security options for firms operating virtual environments, explaining that by using them firms could better secure information, applications, and infrastructures.
Staff Writers Apr 9 2008 4:09PM Security
Mixed fortunes for IT security players

Mixed fortunes for IT security players

The information security sector faces a mixed financial picture in 2008 with the pattern of M&A continuing but IPO activity less certain. That was the verdict of two leading financial analysts at the RSA Conference on Tuesday.
SC Australia Staff Apr 9 2008 4:06PM Security
RSA '08: Art Caveillo's keynote highlights data centric security

RSA '08: Art Caveillo's keynote highlights data centric security

Technical innovations, coupled with regulations, more sophisticated attacks and gaps between technology deployed and the knowledge of the users continue to grow larger, Art Coveillo Jr., president of RSA, said in his keynote address at the RSA Conference.
Deb Radcliff Apr 9 2008 7:18AM Security
Symantec boss appeals for security rethink

Symantec boss appeals for security rethink

John W. Thompson uses keynote speech on the opening morning of the RSA Conference to call for an information-centric approach to security.
SC Australia Staff Apr 8 2008 5:56PM Security
Security hack reveals Microsoft porn virus

Security hack reveals Microsoft porn virus

Well, nothing in the headline above is remotely connected to the truth, but with those keywords this webpage is going to go ballistic. Can you digg it baby? Yeah! Groovy! But there was a little bit of something in the headline, which connects with today’s sermon, so pay attention up the back! And stop doing that to your sister. Eeew!
Ian Yates Apr 8 2008 3:36PM Security
Outsourcing code puts security at risk

Outsourcing code puts security at risk

A study into companies that outsource code development has found that six out of 10 do not include security specifications..
Iain Thomson Apr 8 2008 7:54AM Security
Review: Trend Micro's InterScan Web Security

Review: Trend Micro's InterScan Web Security

Trend Micro’s InterScan Web Security Appliance (IWSA) is a real-time, security-rich tool for protecting organisations from web threats. IWSA’s new web reputation feature blocks users’ access to suspicious domains while performing website reputation scoring without the need of uploading updates.
Peter Stephenson, Apr 8 2008 7:06AM Security
Hot or Not: Virtualisation Security

Hot or Not: Virtualisation Security

What are the potential security implications of virtualisation? The answer is: they are considerable.
Amol Sarwate, Apr 8 2008 3:21AM Security
Nigerian scam takes this year's 'Pie in the Sky' award

Nigerian scam takes this year's 'Pie in the Sky' award

A ‘Nigerian letter’ scam has won this year’s annual ASIC ‘Pie in the Sky’ award for the most outrageous offer that was too good to be true.
Staff Writers Apr 7 2008 3:20PM Security
Security expert slams PCI auditing

Security expert slams PCI auditing

A recent security breach at US supermarket chain Hannaford Bros was almost certainly the work of hackers exploiting a single code flaw on internal systems, experts say..
Clement James Apr 7 2008 3:09PM Security
Security gurus laud process benefits

Security gurus laud process benefits

Information risk experts at a leading IT security conference have underlined the importance of people and processes in delivering an effective enterprise security programme.
Phil Muncaster Apr 4 2008 4:01PM Security
Security chiefs urged to embrace risk

Security chiefs urged to embrace risk

Chief information security officers were urged to take a more strategic approach to guarding corporate networks at a gathering of security leaders in Amsterdam this week. The current obsession with tactical issues raised costs and impeded business efficiency, they were warned.
Phil Muncaster Apr 4 2008 4:01PM Security
Smartphone security beyond office walls

Smartphone security beyond office walls

With data becoming more mobile than ever, it is critical that companies have a pervasive security strategy across the corporate network.
Matt Bancroft, CMO, Mformation Technologies Inc. Apr 3 2008 11:42AM Security
Security chiefs urged to become business focused

Security chiefs urged to become business focused

Enterprise security chiefs can gain credibility and visibility within their organisations by delivering initiatives that are based on business-centric metrics, a high-level security conference has been told.
Phil Muncaster Apr 3 2008 7:32AM Security
EMC embraces physical security

EMC embraces physical security

EMC is to partner with IP video firm Verint Systems, aiming to bring physical security controls in to its information management portfolio.
Rosalie Marshall Apr 1 2008 7:34AM Security
Review: BorderWare's Email Security Gateway v7.1

Review: BorderWare's Email Security Gateway v7.1

BorderWare Email Security Gateway incorporates two features: the intercept engine and the BorderWare security network (BSN). These work together seamlessly to provide solid protection against email, web and IM security threats.
Peter Stephenson, Mar 31 2008 2:18PM Security
Untrained users highlighted as security risks

Untrained users highlighted as security risks

Businesses are giving users greater freedom with corporate IT systems, according to a recent report, but many of those users lack the necessary security training.
Phil Muncaster Mar 31 2008 1:12PM Security
Going solo: How to be a security consultant

Going solo: How to be a security consultant

We all dream of being our own boss, but what does it take to set up a successful business in the real world? Mark Mayne has some advice.
Mark Mayne Mar 27 2008 12:04PM Security
Facebook privacy flap should spark concern for business

Facebook privacy flap should spark concern for business

A security and privacy breach that made personal Facebook photos available to unwelcome visitors could have had real consequences for businesses, experts said.
Jim Carr Mar 27 2008 10:03AM Security
Google in trouble over data security

Google in trouble over data security

Organisations and individuals using Google's applications suite have no right to data privacy, a case in arbitration has shown..
Iain Thomson Mar 27 2008 7:35AM Security

Log In

  |  Forgot your password?