Spotlight on Cyber Security Spotlight on Cyber Security

Most infosec leaders agree that traditional security methods, on their own, are no longer enough to combat advanced new threats. But what new techniques and strategies are they using? What lessons have they learnt from breaches?

iTnews will provide some answers to these questions in our Spotlight on Cyber Security, coinciding with the Australian Information Security Association’s national conference on 10-12 October.

Security fears holding back WLAN deployments

Security fears holding back WLAN deployments

Security fears are creating the biggest barrier preventing corporate rollouts of wireless LAN (WLAN) infrastructures.
Robert Jaques Sep 24 2004 9:42AM Security
Technology changes leave IT security playing catch up

Technology changes leave IT security playing catch up

The arrival of new waves of technology over the next five years will render existing information security measures obsolete and increase security risks in both new and legacy environments, industry experts have warned.
Robert Jaques Sep 23 2004 11:24AM Security
Security chief lays down law on regulation

Security chief lays down law on regulation

Increased regulation will be the main driver of security for the forseeable future according to a security expert.
René Millman Sep 22 2004 4:05PM Security
Creating an ROI to justify information security budgets

Creating an ROI to justify information security budgets

The way to get the executive team to pay attention is to provide a quality ROI on any new initiative. If the boards of directors can’t understand the needs of various departments then the only way to their pocketbook is to present them with a bottom line return on their investment.
Ron Lepofsky Sep 22 2004 3:12PM Security
European security software sales slowing

European security software sales slowing

Previously soaring security software sales in Western Europe began to slow down last year, according to the latest market research from IDC.
Robert Jaques Sep 22 2004 2:49PM Security
Salvation Army sings praises of integrated security appliance solution

Salvation Army sings praises of integrated security appliance solution

The Salvation Army has beefed up the security of its network serving more than 4,000 users across the US Midwest with the installation of an integrated security appliance.
Robert Jaques Sep 22 2004 2:39PM Security
E-commerce security attacks quadruple

E-commerce security attacks quadruple

Security exploits are being created more easily and faster than ever, with attackers targeting e-commerce sites for financial gain, according to new research.
Robert Jaques Sep 20 2004 12:04PM Security
IT security worries top agenda for UK firms

IT security worries top agenda for UK firms

Data security is top of the list of IT concerns for small and medium-sized businesses in the UK, research carried out for the Institute Directors (IoD) has found.
Robert Jaques Sep 16 2004 11:18AM Security
Indiana University automates software security patching

Indiana University automates software security patching

Indiana University has automated its software security patch management in a bid to help protect potentially sensitive student records and reduce network vulnerabilities.
Robert Jaques Sep 16 2004 11:09AM Security
Debunking the Security Tool Myth

Debunking the Security Tool Myth

As organizations continue to move more of their business online, and as they upgrade to newer, better, faster, feature-laden software, their vulnerability to cyberattacks grows, as does the pressure on security professionals entrusted to keep the infrastructure safe.
Tom Kuhr Sep 15 2004 10:52AM Security
When it comes to wireless security, good enough is simply not good

When it comes to wireless security, good enough is simply not good

As security threats increase in quantity and complexity, assuring business continuity means that corporations need to aggressively and proactively protect the entire network infrastructure.
Bethany Mayer Sep 15 2004 10:52AM Security
A five step process for achieving measurable returns on security investments

A five step process for achieving measurable returns on security investments

What do the president of the United States and a Fortune 1000 CIO have in common? For starters, both are responsible for mitigating immense security threats, maintaining budgets and justifying expenditures to governing committees for approval. They are also accountable for the failure or success of security in their respective domains.
Edward Schenk Sep 15 2004 10:52AM Security
Analysts herald arrival of smart security patching tools

Analysts herald arrival of smart security patching tools

IT security managers can look forward to the arrival of enhanced patching technology which will automate and reduce the cost of installing software security and maintenance updates, industry experts have predicted.
Rob Jaques Sep 14 2004 11:42AM Security
Updated: Hundreds of products fall through MIME security flaw

Updated: Hundreds of products fall through MIME security flaw

Serious security flaws that potentially affect hundreds of email gateway products have been discovered in the widely deployed MIME (Multi-Purpose Internet Mail Extensions) protocol.
Rob Jaques Sep 13 2004 9:45AM Security
New internet enables better bandwidth and security

New internet enables better bandwidth and security

The next internet will be 'self-aware' and dynamically responsive to security threats and global network issues, according to Intel.
Ty Pendlebury Sep 13 2004 12:00AM Software
Kier Group plugs password security vulnerabilities

Kier Group plugs password security vulnerabilities

International building and civil engineering contractor, Kier Group has revamped its global network security by ditching a password-based based remote access system which had become “a major point of vulnerability”.
Rob Jaques Sep 9 2004 10:31AM Security
Perimeter security is changing fast

Perimeter security is changing fast

Most security solutions today are built around attempting to protect the vulnerability of the PC and, or the server, by attempting to keep “bad” things outside of the network security perimeter. But, with the changing and disappearing perimeter - security now needs to be intrinsic in every system and for every user.
Bob Johnson Sep 7 2004 12:49PM Security
Security concerns over Metro Ethernet

Security concerns over Metro Ethernet

Ethernet technology has continually reinvented itself over the years to satisfy user requirements. It now supports a range of speeds from 10 Mbps to 10 Gbps, and due to the open, competitive nature of the Ethernet market, prices are very competitive. Ethernet has won the local area network (LAN) battle and is today a ubiquitous technology that provides connectivity for over 97 per cent of networking devices worldwide.
Rami Houbby Sep 7 2004 11:15AM Security
Security IT tops NSW tech showcase awards

Security IT tops NSW tech showcase awards

Two security-focused IT developers creamed the competition this year at the patrons’ awards for the NSW Government’s export-focused Australian Technology Showcase.
Fleur Doidge Sep 7 2004 12:00AM Security
Security fears shake up enterprise instant messaging

Security fears shake up enterprise instant messaging

Security problems associated with public instant messaging (IM) technology will force enterprises to ban employee use of such services and replace them with enterprise IM (EIM) applications.
Robert Jaques Sep 6 2004 5:32PM Security

Log In

  |  Forgot your password?