Spotlight on Cyber Security Spotlight on Cyber Security

Most infosec leaders agree that traditional security methods, on their own, are no longer enough to combat advanced new threats. But what new techniques and strategies are they using? What lessons have they learnt from breaches?

iTnews will provide some answers to these questions in our Spotlight on Cyber Security, coinciding with the Australian Information Security Association’s national conference on 10-12 October.

Good Samaritan Hospital patches up Active Directory security

Good Samaritan Hospital patches up Active Directory security

The Good Samaritan Hospital in Lebanon, Pennsylvania, has boosted the security of its Microsoft Active Directory infrastructure with the deployment of a third party administration suite that sits on top of Microsoft’s management tools.
Robert Jaques Sep 3 2004 12:04PM Security
Lan1 to host internet security seminars

Lan1 to host internet security seminars

Storage and security distributor Lan1 is hosting internet security seminars for customers around Australia starting next week.
Staff Writers Sep 3 2004 12:00AM Security
Chicago hospital remote access security gets shot in the arm

Chicago hospital remote access security gets shot in the arm

A group of Chicago’s largest hospitals has completed a series of mobile network infrastructure rollouts incorporating two-factor authentication security to provide doctors with secure remote access to highly sensitive patient health information.
Robert Jaques Sep 1 2004 5:34PM Security
IM security tools (2004)

IM security tools (2004)

With instant messaging fast becoming the next big communication tool at home and work, we must be aware of the security issues that exist, says Rob Jaques
Robert Jaques Sep 1 2004 12:00AM Security
Balancing security products with management time. Are you stretching yourself too thin?

Balancing security products with management time. Are you stretching yourself too thin?

With new threats emerging by the second, enterprise security has become paramount. IT managers, however, are faced with the daunting task of coordinating numerous elements from VPNs and e-mail scanning systems to content filters and anti-virus software.
John Edwards Aug 31 2004 5:21PM Security
Japanese bank goes live with virtual security solution

Japanese bank goes live with virtual security solution

An IT firm belonging to the Bank of Tokyo-Mitsubishi is implementing a virtual switch to create layered security in its data centre.
Dan Ilett Aug 31 2004 4:14PM Security
Hifn security processors win FIPS certification

Hifn security processors win FIPS certification

Four algorithms implemented in Hifn's 795x and Intelligent Packet Processing (HIPP) security processors - DES, 3DES, SHA-1, and AES - have received Federal Information Processing Standard (FIPS) algorithm conformance certification by the National Institute of Standards and Technology (NIST).
Marcia Savage Aug 27 2004 6:41PM Security
Security worries back to 2001 levels

Security worries back to 2001 levels

The severity and number of exploits and vulnerabilities in computer systems are causing greater concern for IT directors.
René Millman Aug 26 2004 1:23PM Security
Websense appeals to security community

Websense appeals to security community

A new security web site will be asking the security community to send it details of attacks on network infrastructure in order to the security community overcome new attacks.
René Millman Aug 24 2004 3:57PM Security
Survey shows dissatisfaction with security management

Survey shows dissatisfaction with security management

Almost 60 per cent of IT managers currently manage point solutions individually, but only 35 per cent believe this is the way security environments should be managed.
Jon Tullett Aug 17 2004 6:03PM Security
Betting against VOIP security

Betting against VOIP security

After more false dawns than a TV soap opera, IP Telephony (IPT) is finally happening in the mass market.
Denny Meijer Aug 17 2004 3:03PM Security
Corporations spend millions on single sign-on, yet don’t achieve their security goals

Corporations spend millions on single sign-on, yet don’t achieve their security goals

Single sign-on (SSO) has gained great popularity, but due to confusion in the marketplace, decision makers in many organizations don’t realize that SSO alone doesn’t adequately address their security requirements, nor does it address issues of compliance with Sarbanes-Oxley, the European Privacy Directives, HIPAA and other regulations. Though implementing SSO can be part of a good security infrastructure, it is only one aspect. Companies that don’t understand this can spend millions without accomplishing their goals.
Glenn Choquette Aug 10 2004 4:47PM Security
Review: Security Expressions

Review: Security Expressions

This is a very interesting application which enables you to monitor compliance with policies via audits against your IT infrastructure. This alone would represent valuable functionality, but Security Expressions does not stop there.

Julian Ashbourn Aug 3 2004 12:00AM Security
Enterprises need to boost web application security

Enterprises need to boost web application security

Web application security - or lack of security because companies don't pay enough attention to protecting their internet applications -was a topic of debate at the Black Hat Briefings Thursday in Las Vegas.
Marcia Savage Jul 29 2004 10:07PM Security
CipherTrust teams with Voltage Security

CipherTrust teams with Voltage Security

CipherTrust and Voltage Security Tuesday unveiled a partnership to provide enterprise policy-driven email encryption by including Voltage IBE Server in CipherTrust's IronMail Privacy Architecture (IPA).
Marcia Savage Jul 20 2004 9:20PM Security
Aladdin shines up LAN Systems security gap

Aladdin shines up LAN Systems security gap

Distributor LAN Systems has plugged a final gap in its security portfolio, signing Israeli vendor Aladdin to fulfil the wishes of Australian authentication customers.
Fleur Doidge Jul 20 2004 12:00AM Security
Security is no.1 priority, say executives

Security is no.1 priority, say executives

Research from AT&T and the Economist Intelligence Unit has shown that 78 per cent of executives think that computer security is the most important area for their networks.
Dan Ilett Jul 15 2004 3:28PM Security
Microsoft unveils endpoint security technology

Microsoft unveils endpoint security technology

Microsoft on Tuesday announced Network Access Protection, a technology that will check the security status of a computer before it's allowed to access the network.
Marcia Savage Jul 13 2004 11:07PM Security
Biometric security: more bottom-line benefits, less James Bond

Biometric security: more bottom-line benefits, less James Bond

NEC’s Gohringer cuts through the misconceptions that surround biometrics and puts forward the business case for the integration of biometric technologies into a company’s security strategy.
Carl Gohringer Jul 13 2004 11:38AM Security
Wi-Fi hotspots pose corporate security risk

Wi-Fi hotspots pose corporate security risk

Wi-fi has exploded across Britain this year, and is set to continue growing. The capability to improve mobile working means that wireless technology is allowing networked enterprises to tap into the true potential of their employees. But mobile users accessing the internet from corporate machines in Wi-fi hotspots are often doing so with little or no security controls in place. This could lead to network infection, which can have dramatic financial and operating consequences. With the average corporate enterprise infection costing an estimated £33,000 to repair, preventing infection at Wi-fi hotspots is a critical concern for many organisations.
Ian Schenkel Jul 13 2004 11:17AM Security

Log In

  |  Forgot your password?