Spotlight on Cyber Security Spotlight on Cyber Security

Most infosec leaders agree that traditional security methods, on their own, are no longer enough to combat advanced new threats. But what new techniques and strategies are they using? What lessons have they learnt from breaches?

iTnews will provide some answers to these questions in our Spotlight on Cyber Security, coinciding with the Australian Information Security Association’s national conference on 10-12 October.

Cisco adopts security reporting standard

Cisco adopts security reporting standard

Severity scores to help IT staff prioritise patches.
Tom Sanders Jan 8 2007 9:39AM Security
Bill Hancock, convivial information security pioneer dead at 49

Bill Hancock, convivial information security pioneer dead at 49

Bill Hancock, who, despite being legally blind, parlayed a gregarious demeanor into a career as an information security icon and cyber-risk and network best practices advocate, died Monday. He was 49.
Dan Kaplan Jan 4 2007 10:42PM Security
Virtualisation - the next step in enterprise security

Virtualisation - the next step in enterprise security

The complexity, frequency, and malicious intent of security attacks from many sources are increasing in today's enterprise.
Leo Cohen, Jan 2 2007 8:16PM Security
Tailor your mobile security plan for the iPod generation

Tailor your mobile security plan for the iPod generation

Ever since the emergence of iPod back in 2004, GFI and other experts including Gartner analysts, Ruggero Contu and John Girard have been warning that iPods are a potential danger to the corporate network.
Andre' Muscat, Dec 27 2006 9:39PM Security
IT security predictions for 2007

IT security predictions for 2007

Merged email and Web threats; targeted spam; IM and VoIP attacks go
mainstream.
Andrew Charlesworth Dec 22 2006 9:49AM Security
Security threats fail to deter Mac faithful in 2006

Security threats fail to deter Mac faithful in 2006

Vulnerabilities aplenty this year, but little fear among the OS X community.
Shaun Nichols Dec 22 2006 9:49AM Security
Hacker: "Month of Apple Bugs" project necessary for better security

Hacker: "Month of Apple Bugs" project necessary for better security

The hacker responsible for the upcoming "Month of Apple Bugs" project (MoAB), in which one Mac OS X flaw will be publicly posted each day during January, today defended his undertaking to SCMagazine.com.
Dan Kaplan Dec 20 2006 11:32PM Security
Review: Tenable Security Center

Review: Tenable Security Center

The Tenable Security Center has massive capability wrapped in a single, easy-to-navigate interface. While the overall use of the application is fairly intuitive, once users explore more deeply, they may find that it becomes complex and intricate. This allows for great flexibility, but also requires some time of using the product and learning how to maximize its capability for the specific environment.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Dec 18 2006 12:00AM Security
Fortinet reviews the year's security trends

Fortinet reviews the year's security trends

The monetisation of malware has been the standout security trend of 2006, according to security vendor Fortinet.
Staff Writers Dec 15 2006 1:36PM Security
Mobile security products to be worth US$5bn by 2011

Mobile security products to be worth US$5bn by 2011

The number of security attacks against mobile phones is increasing dramatically, according to new data from Juniper Research.
Will Head Dec 12 2006 9:46AM Security
Document Security 2006

Document Security 2006

Files created in a multitude of applications contain confidential information or valuable intellectual property. How can you keep them safe when sending them to other people? Peter Stephenson reports.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Dec 10 2006 12:00AM Security
Heathrow airport introduces biometric security system

Heathrow airport introduces biometric security system

A new check-in system using biometric technology was officially opened today at London's Heathrow airport.
Emma Pritchard Dec 7 2006 9:00AM Security
Vista validates encryption for mobile and endpoint security

Vista validates encryption for mobile and endpoint security

Long viewed as a major vector for incoming threats such as viruses, malware and worms, organisations are also increasingly viewing laptops as a primary weakness in the fight against the theft, loss and misuse of information.
Nicko van Dec 6 2006 9:57PM Security
IBM takes on telecoms security market

IBM takes on telecoms security market

BladeCenter server budled with security and monitoring software.
Shaun Nichols Dec 6 2006 8:57AM Security
McAfee ties up Citadel Security acquisition

McAfee ties up Citadel Security acquisition

McAfee today announced that it has completed its acquisition of Citadel Security Software, a provider of security risk management and compliance technology.
Robert Jaques Dec 6 2006 8:57AM Security
A network security strategy for the age of terrorism

A network security strategy for the age of terrorism

Just as bacteria evolve around the technological barriers we put in their place, so too do the tactics and strategies employed by computer attackers. When a security measure is put in place, our enemies immediately set out to exploit its weakness. When they are repelled, they adapt their tactics and strategies, regroup and come back yet again.
G. Robert Dec 5 2006 6:42PM Security
Laptop theft, data exposure the result of poor mobile security management

Laptop theft, data exposure the result of poor mobile security management

Hearing news about yet another lost or stolen laptop and exposure of personal information is almost like having seen too many horror flicks. Shock has shifted to disbelief - plus numb outrage at the apparent inability of corporations and government to protect our private personal data.
Peter Larsson, Dec 5 2006 11:00AM Security
Image spam still growing as threat to email security

Image spam still growing as threat to email security

Today one out of four emails on the internet is an image spam message. This is not because spammers have just realised the marketing benefits of captive colours. Instead, this is because the spammers have identified a weakness in many anti-spam systems and are moving diligently to maximise this opportunity by fully exploiting this weakness.
Paul Judge, Dec 5 2006 10:00AM Security
Hot or not: Network embedded device security threats

Hot or not: Network embedded device security threats

Hot: Expect attackers to increasingly target networked, multifunction devices, such as high-end printers, scanners and fax machines, as these devices continue to grow more sophisticated and move away from proprietary operating systems and software.
Amol Sarwate, Dec 5 2006 9:00AM Security
IT security still 'significant challenge' for UK firms

IT security still 'significant challenge' for UK firms

NCircle Risk Management Trends Report paints grim picture.
Clement James Dec 4 2006 10:04AM Security

Log In

  |  Forgot your password?