Spotlight on Cyber Security Spotlight on Cyber Security

Most infosec leaders agree that traditional security methods, on their own, are no longer enough to combat advanced new threats. But what new techniques and strategies are they using? What lessons have they learnt from breaches?

iTnews will provide some answers to these questions in our Spotlight on Cyber Security, coinciding with the Australian Information Security Association’s national conference on 10-12 October.

Enterprises urged to plug IM security holes

Enterprises urged to plug IM security holes

One in four employees has used instant messaging to send information about company plans, finances or password/login credentials, security experts have warned..
Clement James Mar 26 2008 7:00AM Security
Hijacked Facebook accounts used to spread torture pics

Hijacked Facebook accounts used to spread torture pics

Security researchers claim to have uncovered a new wave of attacks in which profiles on Facebook are used to post images of child torture..
Shaun Nichols Mar 26 2008 7:00AM Security
Microsoft updates Excel security patch

Microsoft updates Excel security patch

Last week's fix caused performance problems.
Shaun Nichols Mar 21 2008 9:20AM Security
Red Hat releases free security code

Red Hat releases free security code

Red Hat is freeing up the source code behind its identity management and security system in a bid to show that open source software is more secure than rival technologies..
Guy Dixon Mar 21 2008 9:20AM Security
Gordon Brown announces new UK security push

Gordon Brown announces new UK security push

Prime Minister promises more action on UK cyber attacks
David Neal Mar 20 2008 2:52PM Security
Apple delivers record Mac OS X security update

Apple delivers record Mac OS X security update

Apple has issued its largest Mac OS X security update ever, delivering fixes for more than 80 vulnerabilities.
Dan Kaplan Mar 20 2008 10:28AM Security
Apple issues major OS X security update

Apple issues major OS X security update

Apple has issued a major security update for Mac OS X and Safari. The update addresses 86 common vulnerability and exposure CVE entries in 30 applications for Mac OS..
Shaun Nichols Mar 19 2008 10:00PM Security
Changes to information security regulation in US health industry

Changes to information security regulation in US health industry

With California's data breach notification law now being extended to cover health care organisations, businesses in this space must pay closer attention to how the personal health information entrusted to their care is safeguarded.
Illena Armstrong Mar 19 2008 1:45PM Security
Security skills in high demand

Security skills in high demand

CompTia research finds big gap between perception and reality
Phil Muncaster Mar 17 2008 12:17PM Security
McAfee CSO: Security pros need to better understand business needs

McAfee CSO: Security pros need to better understand business needs

McAfee’s chief security officer Dr Martin Carmichael flew into Sydney this week and SC Magazine had the opportunity to catch up with him to discuss all things security.
Negar Salek Mar 14 2008 4:14PM Security
Security vs. privacy

Security vs. privacy

Does anyone today really believe that they can keep their personal information entirely confidential? While some people have personal preferences about how much personal information they are forced to reveal, to function within society requires some exposure of such information.
Tim Mather Mar 14 2008 3:22PM Security
Review: DeepNines i Trust Security Platform

Review: DeepNines i Trust Security Platform

DeepNines’ Security Edge Platform (SEP) takes a new look at UTM. This device does not become the gateway, but instead works with an existing firewall and sits between the internet and the perimeter to stop attacks before they can hit the firewall.
Peter Stephenson, Mar 13 2008 3:17PM Security
Microsoft releases Beta 1 version of IE 8, with new security features

Microsoft releases Beta 1 version of IE 8, with new security features

Microsoft on Wednesday released the Beta 1 version of Internet Explorer 8, which the company says is configured to protect against phishing attacks and malware.
Jim Carr Mar 13 2008 9:45AM Security
IT security budgets on the rise: Cisco

IT security budgets on the rise: Cisco

Three out of five IT professionals plans to increase spending on security over the coming year, according to a study by Cisco..
Staff Writers Mar 13 2008 7:26AM Security
Security Web 2.0: Open Season for the Attackers?

Security Web 2.0: Open Season for the Attackers?

The Web is now a participatory medium. The downside to this ubiquitous connectivity and user participation is a new slew of security threats many IT professionals have yet to fully grasp.
Wayne Neich Mar 11 2008 3:58PM Security
Quantum computers: technological deliverance or the end of security?

Quantum computers: technological deliverance or the end of security?

Quantum computing might spell the end of today's computer and credit card encryption technology, a U.S. physicist has claimed.
Liz Tay Mar 10 2008 2:21PM Security
Guest column: The impact of quantum computers on cryptography

Guest column: The impact of quantum computers on cryptography

To explain the impact of quantum computers, it is best to first take a step back to review how current encryption technologies work.
Robin Balean Mar 10 2008 1:56PM Security
Cyber Storm II offers proactive IT security

Cyber Storm II offers proactive IT security

Telstra has been working closely with government and the IT industry to ensure it is ready and resilient to possible cyber attacks as part of its involvement in the international simulated Cyber Storm II exercise being held 11-14 March, 2008.
a Staff Writer Mar 7 2008 12:53PM Security
European users slam dodgy bank security

European users slam dodgy bank security

Banks and credit card firms not doing enough to protect consumers.
Robert Jaques Mar 7 2008 11:19AM Security
VMware takes aim at virtualised security

VMware takes aim at virtualised security

VMware has unveiled a security technology that protects applications running in virtual machines in ways previously not possible in physical environments..
Staff Writers Feb 29 2008 7:22AM Security

Log In

  |  Forgot your password?