Spotlight on Cyber Security Spotlight on Cyber Security

Most infosec leaders agree that traditional security methods, on their own, are no longer enough to combat advanced new threats. But what new techniques and strategies are they using? What lessons have they learnt from breaches?

iTnews will provide some answers to these questions in our Spotlight on Cyber Security, coinciding with the Australian Information Security Association’s national conference on 10-12 October.

The top 5 inlfuential IT security thinkers

The top 5 inlfuential IT security thinkers

SC Magazine’s U.S. and U.K. editorial teams spotlight some of the noteworthy people, major merger/acquisitions and leading compliance worries of yet another eventful year in IT security. With the help of our U.S. Editorial Advisory Board, we’ve focused on those eminent IT security professionals who are not only out and about around the globe bringing attention to the various issues surrounding cyberspace, but also tirelessly working to thwart cybercriminals’ attacks on organizations and private citizens. These are the players who continue to influence others in the industry and help to evolve thinking around various IT security issues and threats.
Staff Writers Dec 15 2005 9:36PM Security
Ulf Linnarsson, IT security coordinator, Volvo IT Global Security

Ulf Linnarsson, IT security coordinator, Volvo IT Global Security

Staff Writers Dec 9 2005 5:08PM Security
Christmas MP3 players pose serious corporate security risks

Christmas MP3 players pose serious corporate security risks

Companies need to take steps to protect themselves from “very serious security threats” which will be posed by MP3 players received as Christmas presents being brought into workplaces next year, security experts warned.
William Eazel Dec 7 2005 9:09AM Security
Security experts warn that hackers are exploiting IE bug

Security experts warn that hackers are exploiting IE bug

Security experts have warned internet users to take care when surfing the web, following sightings of malware planted on websites that exploits a recently discovered Internet Explorer security vulnerability that has not yet been patched by Microsoft.
William Eazel Dec 5 2005 2:42PM Security
Firms face growing IT security danger from 'enemy within'

Firms face growing IT security danger from 'enemy within'

Global organizations are leaving themselves vulnerable to significant security risks because of widespread failure to take steps against internal threats, industry experts warned today.
William Eazel Dec 1 2005 11:53AM Security
Perimeter Internetworking beefs up security, acquires US Networks

Perimeter Internetworking beefs up security, acquires US Networks

Perimeter Internetworking, a provider of managed network and security services for community financial institutions, healthcare companies and service providers has acquired the assets of US Networks Inc., a managed network and security services provider headquartered in Raleigh, NC.
William Eazel Nov 28 2005 10:43AM Security
IT security fears holding back US e-commerce

IT security fears holding back US e-commerce

One in four U.S. consumers will not shop online this holiday season due to internet security concerns, according to a new survey from the Business Software Alliance (BSA).
William Eazel Nov 24 2005 10:10AM Security
SonicWALL targets SMB security with two corporate acquisitions

SonicWALL targets SMB security with two corporate acquisitions

Security firm SonicWALL today announced that it has acquired data backup company Lasso Logic together with the assets of enKoo, a developer of remote access technology.
William Eazel Nov 23 2005 11:16AM Security
Identity security evolves

Identity security evolves

The issue of identity authentication and security is front of mind for both the public and the banks. Identity theft is at an all time high with fraudsters deploying a wide range of techniques to steal personal identities. At the same time organizations, be they banks, other enterprises or the public sector, have struggled to justify the extensive costs that are associated with mass-deployed and flexible identity systems that are required to meet the identity fraud challenge.
Paul Meadowcroft Nov 22 2005 1:47PM Security
Security firm claims fundamental flaws mar UTM integrated appliances

Security firm claims fundamental flaws mar UTM integrated appliances

An IT security firm today claimed that it has identified potential sources of risk for government and enterprises using integrated security appliances which “sacrifice security for convenience."
William Eazel Nov 18 2005 10:31AM Security
Oracle beefs up security offerings with two acquisitions

Oracle beefs up security offerings with two acquisitions

Oracle moved to shore up its IT security portfolio on Wednesday with two corporate acquisitions. The database giant said the purchase of Thor Technologies, a provider of cross-platform provisioning solutions and OctetString, a developers of virtual directory software, aimed to significantly strengthen its portfolio of identity and access management products.
William Eazel Nov 17 2005 10:47AM Security
Businesses view Sony DRM as 'security threat'

Businesses view Sony DRM as 'security threat'

Nearly all business PC users believe Sony's DRM copy protection to be a security threat, according to a new survey.
René Millman Nov 14 2005 1:27PM Security
Most IT acceptable use policies contain 'gaping security holes'

Most IT acceptable use policies contain 'gaping security holes'

Small- and medium-sized enterprises (SMEs) are leaving themselves vulnerable to security and compliance risks by not having internet acceptable use policies (AUPs) that address the latest and most dangerous internet-based threats, a new study has warned.
William Eazel Nov 14 2005 10:55AM Security
Debate: Should information security firms appoint former hackers to development roles?

Debate: Should information security firms appoint former hackers to development roles?

Simon Khalaf Nov 11 2005 3:46PM Security
Europe's IT directors doubt VoIP security

Europe's IT directors doubt VoIP security

Almost half of European IT directors believe VoIP networks are “inherently insecure”, with the figure rising to 56 percent among computing professionals working in the financial sector, newly published research has claimed.
William Eazel Nov 11 2005 1:24PM Security
Calls for improved security legislation after TransUnion breach

Calls for improved security legislation after TransUnion breach

Enhanced federal legislation and closer scrutiny of user behavior were at the top of leading security professionals’ wish lists this week as news of last month’s theft of a TransUnion PC containing the personal credit information of about 3,600 clients spread.
Frank Washkuch Nov 9 2005 9:41PM Security
Security still a major barrier to converged IP network

Security still a major barrier to converged IP network

Nearly two-thirds of chief executives think that security is the most critical barrier to implementing a converged IP network, according to a new survey.
René Millman Nov 8 2005 5:05PM Security
IT security acquisition specialist snaps up St. Bernard Software

IT security acquisition specialist snaps up St. Bernard Software

Sand Hill IT Security Acquisition Corp, a public targeted acquisition corporation, has entered into a definitive merger agreement with privately held IT security company St. Bernard Software.
William Eazel Nov 4 2005 12:34PM Security
Nortel and Websense talk up mobile phone security

Nortel and Websense talk up mobile phone security

Nortel and Websense have signed an agreement to develop web content filtering technology to protect GSM/UMTS mobile handsets from receiving and accessing unwanted content.
William Eazel Nov 2 2005 10:44AM Security
Review: NetIQ Security Manager

Review: NetIQ Security Manager

This comprehensive product seems to offer a great deal: event monitoring and management; intrusion detection; comprehensive reporting and analysis. All this, plus three printed manuals, an installation guide, user guide and programming guide.
Julian Ashbourn Nov 1 2005 12:00AM Security

Log In

  |  Forgot your password?