Spotlight on Cyber Security Spotlight on Cyber Security

Most infosec leaders agree that traditional security methods, on their own, are no longer enough to combat advanced new threats. But what new techniques and strategies are they using? What lessons have they learnt from breaches?

iTnews will provide some answers to these questions in our Spotlight on Cyber Security, coinciding with the Australian Information Security Association’s national conference on 10-12 October.

Mobile devices are IT managers' security headache

Mobile devices are IT managers' security headache

Two-third of IT managers are still experiencing security breaches because of poor practices on mobile devices, according to new findings.
René Millman Jan 31 2006 11:24AM Security
IT security giants team up to solve spyware

IT security giants team up to solve spyware

In a bid to combat the growing menace of spyware, IT security giants McAfee, Symantec, Trend Micro, ICSA Labs and Thompson Cyber Security Labs Unite have teamed up to define identification and testing methodologies for spyware mitigation technologies.
William Eazel Jan 31 2006 10:09AM Security
Dial ‘D’ for DoS; VoIP’s hidden security threat

Dial ‘D’ for DoS; VoIP’s hidden security threat

Communication technology experts have released a report highlighting inherent security issues with VoIP applications such as Skype and Vonage that could give online criminals an opportunity to operate undetected.
William Eazel Jan 30 2006 9:46AM Security
Endpoint security reaches across the network perimeter

Endpoint security reaches across the network perimeter

The economy may be on the upswing, but increasing global competition combined with a multitude of compliance issues such as regulatory audits continue to pose a costly problem for organizations.
Alan Bentley Jan 27 2006 1:20PM Security
Enterprises ignorant of outsourcing security risks

Enterprises ignorant of outsourcing security risks

Organizations that outsource their IT systems are increasing their vulnerability to security breaches, causing possible long-term damage to their businesses, insurers have warned.
William Eazel Jan 27 2006 11:19AM Security
IT security 'top priority' for European financial institutions

IT security 'top priority' for European financial institutions

The growing threat from hackers, new regulations, reputation issues and the growing importance of direct channel self-service banking are pushing IT security to the very top of the corporate agenda for Western European financial institutions, new research has revealed.
William Eazel Jan 25 2006 10:37AM Security
Application security: Beyond the buzzwords

Application security: Beyond the buzzwords

One of the emerging buzzwords of 2005 is "application security" but many managers still don’t have a clear picture of what the term means. Security vendors are not helping as they all clamor for a piece of this emerging budget line-item with very diverse offerings.
Andrew Stern Jan 23 2006 12:55PM Security
FBI: Security lapses at 90 percent of companies

FBI: Security lapses at 90 percent of companies

A new FBI computer crime survey claims that nine out ten polled companies have experienced a security lapse.
Dan Kaplan Jan 19 2006 8:30PM Security
Porn worm disables security tools

Porn worm disables security tools

Security experts have warned users to be wary of unsolicited emails claiming to contain obscene pictures and sex movies. The Nyxem-D worm (also known as Email-Worm.Win32.VB.bi or W32.Blackmal.E@mm) can spread via email using a variety of pornographic disguises in an attempt to disable security software.
William Eazel Jan 19 2006 9:43AM Security
IDC: Firms unprepared for blended security threats

IDC: Firms unprepared for blended security threats

Industry analysts warned today that IT security threats are becoming more sophisticated and organized, making it imperative for businesses of all sizes to put controls into place that secure operations and infrastructures.
William Eazel Jan 17 2006 9:50AM Security
iTunes security flaws a bum note

iTunes security flaws a bum note

IT security experts have warned enterprises to take immediate action against four “critical” security vulnerabilities related to an old, but widely distributed, versions of Apple’s QuickTime media player and iTunes music store software.
William Eazel Jan 16 2006 9:58AM Security
Security starts with coding

Security starts with coding

A mix of regulatory requirements coupled with front-page news stories regarding security breaches worldwide have unveiled an array of application security issues.
Brad Arkin Jan 11 2006 10:20PM Security
Endpoint security reaches across the network perimeter

Endpoint security reaches across the network perimeter

The economy may be on the upswing, but increasing global competition combined with a multitude of compliance issues such as regulatory audits continue to pose a costly problem for organizations.
Alan Bentley Jan 6 2006 12:26PM Security
Review: Web Security Suite Lockdown Edition

Review: Web Security Suite Lockdown Edition

Part of a suite of Websense tools designed to protect your network, this is one of the more difficult products to install. A range of components need to be installed individually, so you’ll want to dedicate a fresh Windows 2000/20003 server to it. These components, such as reporting, can be installed on different PCs across the network, so it is flexible and scalable.
Christopher Moody Jan 1 2006 12:00AM Security
Review: Web Security Suite Lockdown Edition

Review: Web Security Suite Lockdown Edition

Part of a suite of Websense tools designed to protect your network, this is one of the more difficult products to install. A range of components need to be installed individually, so you’ll want to dedicate a fresh Windows 2000/20003 server to it. These components, such as reporting, can be installed on different PCs across the network, so it is flexible and scalable.
Christopher Moody Jan 1 2006 12:00AM Security
Security experts fear Nazi Sober worm epidemic poised for January

Security experts fear Nazi Sober worm epidemic poised for January

The recent Sober.AH epidemic could form part of an orchestrated neo-Nazi strategy to saturate mailboxes worldwide with pro-Nazi spam, security experts have warned.
William Eazel Dec 22 2005 11:30AM Security
IT security professionals moving up the corporate pecking order

IT security professionals moving up the corporate pecking order

Ultimate responsibility for information security is moving up corporate management hierarchies, as board-level directors and CEOs - or CISO/CSOs – are increasingly held accountable for safeguarding IT infrastructures, new research has revealed.
William Eazel Dec 22 2005 11:28AM Security
Social engineering and other threats to internal security

Social engineering and other threats to internal security

How difficult would it be for a good looking woman dressed in a provocative outfit to gain access to your internal network?
Ari Tammam Dec 16 2005 11:46AM Security
Christmas season stretches British corporate IT security

Christmas season stretches British corporate IT security

Newly published research claims that corporate IT security will be stretched to the limit this festive season, as an estimated 33 percent of staff rely on their office PCs for online Christmas shopping.
William Eazel Dec 16 2005 9:29AM Security
5 steps for ensuring storage network security

5 steps for ensuring storage network security

The Storage Security Industry Forum (the security forum in SNIA) recommends a five-step review for improved storage network security.
Staff Writers Dec 15 2005 10:43PM Security

Log In

  |  Forgot your password?