Spotlight on Cyber Security Spotlight on Cyber Security

Most infosec leaders agree that traditional security methods, on their own, are no longer enough to combat advanced new threats. But what new techniques and strategies are they using? What lessons have they learnt from breaches?

iTnews will provide some answers to these questions in our Spotlight on Cyber Security, coinciding with the Australian Information Security Association’s national conference on 10-12 October.

Why good business is also good security

Why good business is also good security

February is a big month for SC Magazine this year. We'll be having our SC Magazine Awards ceremony and dinner for the first time in the U.S. on February 16 during the RSA Conference at San Francisco's Moscone Center. It is, by far, the biggest and swankiest event by which excellence in all things IT security is acknowledged.
Illena Armstrong Feb 22 2005 5:36PM Security
Getronics launches security centre following accord with Counterpane

Getronics launches security centre following accord with Counterpane

IT services company Getronics has launched its Network and Security Centre, from which it will offer managed security services, following a deal with US network security services company Counterpane.
Staff Writers Feb 22 2005 5:04PM Security
Embryonic infosec institute seeks funds in mission to raise standards

Embryonic infosec institute seeks funds in mission to raise standards

A professional institute for information security is beginning to take shape with the backing of high-profile users and academics.
Staff Writers Feb 22 2005 4:36PM Security
Aon uses Postini for mail security

Aon uses Postini for mail security

Risk management and reinsurance giant Aon is deploying mail encryption across its UK operation, using email security service provider Postini to switch on TLS (Transport Layer Security) encryption at its mail gateways.
Staff Writers Feb 22 2005 3:02PM Security
Keeping email as a service, not as a security hole

Keeping email as a service, not as a security hole

Email may make communication easier, but it is open to a variety of security and productivity issues.
Michael Patterson Feb 22 2005 2:51PM Security
T-Mobile USA emphasizes security as details of 2003 breach emerge

T-Mobile USA emphasizes security as details of 2003 breach emerge

T-Mobile USA says it has made security a top priority after it emerged that a hacker had broken into the company's internal systems and viewed customer details.
Staff Writers Feb 22 2005 2:27PM Security
It’s good to talk security

It’s good to talk security

Who is responsible for your infosec? Jaime Chanaga suggests you start a dialog with your vendors to find out
Jaime Chanaga Feb 22 2005 11:36AM Security
Dire data destruction creates security nightmare

Dire data destruction creates security nightmare

Organisations are putting themselves at risk by not properly deleting files before selling on old computers according to new research.
David Quainton Feb 17 2005 4:42PM Security
Vigilance needed against phishers

Vigilance needed against phishers

Phishing scam emails are looking more authentic and becoming more prevalent than six months ago, according to Rob Forsyth, managing director of Sophos Australia and New Zealand.
Ron Osborn Feb 17 2005 3:06PM Security
Security professional associations form alliance

Security professional associations form alliance

Three security professional associations have launched an alliance to improve enterprise security worldwide.
Marcia Savage Feb 16 2005 11:52PM Security
Gates lays out security plans at RSA

Gates lays out security plans at RSA

Microsoft's chairman and chief software architect Bill Gates pledged further commitment to help users and corporations improve their security, with special emphasis on preventing spyware and email-based malware.
Marcia Savage Feb 15 2005 6:05PM Security
Why standards are important for wireless security

Why standards are important for wireless security

Industry standards play a critical role in R&D, product development and marketing initiatives which in turn help organizations meet their business objectives.
Staff Writers Feb 7 2005 11:33AM Security
Alliance forms for VoIP security

Alliance forms for VoIP security

A group of vendors and security researchers has launched an alliance for VoIP (Voice over Internet Protocol) security awareness, research and testing.
Marcia Savage Feb 4 2005 5:37PM Security
Microsoft to issue 13 security advisories

Microsoft to issue 13 security advisories

Microsoft is readying its customers for the release of 13 new security advisories, including fixes for Microsoft Office, Windows Media Player and MSN Messenger that are rated as critical.
David Quainton Feb 4 2005 3:20PM Security
Avoiding internet threats top security spending driver

Avoiding internet threats top security spending driver

The main motivator for spending money on IT security is preventing external threats that interfere with business, according to a survey of enterprises conducted by AberdeenGroup.
Marcia Savage Feb 2 2005 11:38PM Security
3G dream a security nightmare

3G dream a security nightmare

Smart mobile technology is rapidly gaining in popularity – and hackers and crackers are among its biggest fans! Very few consumers know about the vulnerabilities of 3G technology, and only now is the industry waking up to the potential security nightmare.
Dr Hamid Feb 2 2005 1:08PM Security
NIST releases draft list of security controls

NIST releases draft list of security controls

The National Institute of Standards and Technology (NIST) has released a final draft of recommended security controls for federal systems.
Marcia Savage Jan 31 2005 8:14PM Security
PayPal confirms security breach at partner site

PayPal confirms security breach at partner site

Online payment website PayPal confirmed that a breach of security had taken place at one of its partner sites last weekend and exposed a number of email addresses to hackers.
René Millman Jan 26 2005 11:23AM Security
Audit shows IRS failed to adequately identify security weaknesses

Audit shows IRS failed to adequately identify security weaknesses

The U.S. Internal Revenue Service used a flawed and ineffective process for monitoring system security weaknesses, according to a report recently released by the Treasury Inspector General for Tax Administration.
Marcia Savage Jan 21 2005 9:57PM Security
Time for a Sophisticated Approach to Security

Time for a Sophisticated Approach to Security

As a new year begins, we aspire to achieve more and worker harder. Those with more sinister agendas are no exception, namely - spammers and virus writers -and 2005 will see these people become more shrewd, more malicious, more sophisticated and more hungry for commercial gain.
Matt Peachey Jan 18 2005 3:58PM Security

Log In

  |  Forgot your password?