Spotlight on Cyber Security Spotlight on Cyber Security

Most infosec leaders agree that traditional security methods, on their own, are no longer enough to combat advanced new threats. But what new techniques and strategies are they using? What lessons have they learnt from breaches?

iTnews will provide some answers to these questions in our Spotlight on Cyber Security, coinciding with the Australian Information Security Association’s national conference on 10-12 October.

AVG releases Internet Security 8.0 with re-engineered engine

AVG releases Internet Security 8.0 with re-engineered engine

AVG has today released the latest edition of its internet security suite, AVG Internet Security 8.0, featuring several enhancements including a re-engineered scanning engine and LinkScanner the anti-exploit technology obtained through last December’s acquisition of Exploit Prevention Labs.
Staff Writers Feb 28 2008 12:00AM Security
Aussies more concerned about securing outbound email than spam

Aussies more concerned about securing outbound email than spam

Australians are more concerned about securing outbound email which can lead to sensitive data loss than they are about securing inbound email that could steal data, according to a new survey by Proofpoint.
Negar Salek Feb 27 2008 12:51PM Security
VMware issues 'critical' security alert

VMware issues 'critical' security alert

VMware has warned of a 'critical' vulnerability in several of the company's virtualisation products..
Shaun Nichols Feb 27 2008 8:15AM Security
Review: Bluefire Mobile Security 4.0.2

Review: Bluefire Mobile Security 4.0.2

Bluefire Mobile Security Enterprise Edition can be centrally deployed and configured from an administration console. Administrative features include the ability to enforce and update security policy, view logs, extract security logs and control devices regardless of location.
Peter Stephenson, Feb 26 2008 4:02PM Security
Building security into your software-development lifecycle

Building security into your software-development lifecycle

You have probably heard by now that the root cause of most security vulnerabilities is in the software we run, and that these vulnerabilities are introduced into the software during the development process. That much has been well understood for several years. What hasn't been well understood is the solution to the problem.
Chris Wysopal Feb 18 2008 4:08PM Security
Guest column: Security Web 2.0 - Open Season for the Attackers?

Guest column: Security Web 2.0 - Open Season for the Attackers?

The Web is now a participatory medium -- users contributing, communing, and building. The downside of this ubiquitous connectivity and user participation is a new slew of security threats many IT professionals have yet to fully grasp.
Wayne Neich Feb 18 2008 12:11PM Security
Microsoft pushes out 17 security fixes

Microsoft pushes out 17 security fixes

Microsoft has patched 17 security flaws in its monthly update for February..
Shaun Nichols Feb 14 2008 7:21AM Security
The key to USB security

The key to USB security

USB devices are getting smaller. That also makes them easier to lose, yet most still have no decent encryption.
Nick Barron Feb 13 2008 4:04PM Security
Security awareness-raising forum is launched

Security awareness-raising forum is launched

A major new initiative was launched today in the UK designed to reduce information security failures in organisations by raising security awareness levels.
Phil Muncaster Feb 13 2008 11:34AM Security
Review: ZENworks Endpoint Security

Review: ZENworks Endpoint Security

ZENworks Endpoint Security Management (ESM) v3.5 provides a centrally managed endpoint security product that controls and manages wireless connectivity. The ESM offers complete control over all wireless connectivity within an organisation.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Feb 12 2008 2:50PM Security
Underinvestment exposes end-point security

Underinvestment exposes end-point security

A lack of investment in end-user application security has left users open to attack, according to a group of security experts..
Matt Chapman Feb 12 2008 7:43AM Security
NetAlert funding slashed in Labor bugdet cuts

NetAlert funding slashed in Labor bugdet cuts

The Labor government has cut funding to NetAlert, the previous government's home and public library free filtering scheme.
Lilia Guan Feb 8 2008 3:28PM Security
Remote workers ignoring security

Remote workers ignoring security

Remote workers are becoming less vigilant in their online behaviour, according to Cisco's annual study on security awareness and online behaviour.
Ian Williams Feb 7 2008 6:47AM Security
Google Apps adds email security

Google Apps adds email security

Google has added a range of email security packages to Google Apps, offering message filtering, encryption, discovery and archiving services.

Staff Writers Feb 6 2008 3:25PM Security
New technology aims to close backdoor threats

New technology aims to close backdoor threats

Veracode updates its software-as-a-service
Phil Muncaster Feb 5 2008 10:07AM Security
Critical ActiveX control flaw found in image uploader sent to users by Facebook, MySpace

Critical ActiveX control flaw found in image uploader sent to users by Facebook, MySpace

Symantec has warned that a critical flaw in the ActiveX control of image uploaders that have been widely distributed to users of popular social networking sites Facebook and MySpace can be exploited by hackers to install malicious code on user's computers.
Jack Rogers Feb 4 2008 10:23AM Security
Retailers lagging behind in security

Retailers lagging behind in security

New Deloitte survey shows consumer businesses are still implementing PCI
Phil Muncaster Feb 4 2008 10:07AM Security
Surviving the Age of Consolidation

Surviving the Age of Consolidation

IT security vendors are acquiring companies that make point products. But what you really need are integrated security solutions. Here’s how to choose your suppliers wisely. By all measures, we live in an age of consolidation.
John McNulty, Chairman and CEO of Secure Computing Corp Feb 4 2008 7:47AM Security
Downtime is more worrying than security threats, finds Symantec survey

Downtime is more worrying than security threats, finds Symantec survey

A new report by Symantec Global Services, ‘IT Risk Management Report 2: Myths and Realities,’ has found that the threat of company downtime is more important than security, in respect of IT risk.
Dave Bailey Feb 4 2008 7:17AM Security
Bruce Schneier on fighting security FUD

Bruce Schneier on fighting security FUD

Security expert Bruce Schneier has long been critical of so-called security ‘theatre' - policies and products tailored to provide the perception of security rather than tackling actual security risks.
Feb 1 2008 2:00PM Security

Log In

  |  Forgot your password?