Spotlight on Cyber Security Spotlight on Cyber Security

Most infosec leaders agree that traditional security methods, on their own, are no longer enough to combat advanced new threats. But what new techniques and strategies are they using? What lessons have they learnt from breaches?

iTnews will provide some answers to these questions in our Spotlight on Cyber Security, coinciding with the Australian Information Security Association’s national conference on 10-12 October.

Department of Homeland Security to pay up to $10bn for biometrics

Department of Homeland Security to pay up to $10bn for biometrics

The Department of Homeland Security is to pay up to $10 billion for biometrics to screen foreigners entering America.
Dan Ilett Jun 3 2004 3:54PM Security
F5 buys web security company

F5 buys web security company

Israeli venture capital firm JVP announced Tuesday that it sold its portfolio company, MagniFire Websystems, to F5 Networks for $29 million in cash.
Marcia Savage Jun 2 2004 12:37PM Security
Security is more than tools – it is a total plan

Security is more than tools – it is a total plan

Spam is more than a simple time and bandwidth drain. It is a problem that many organizations are having a tough time eradicating.
Illena Armstrong Jun 1 2004 3:17PM Security
Security through compartmentalisation

Security through compartmentalisation

Whether you call it layered perimeter defences, virtual teams, secure compartments, secure enclaves, or even virtual LANs, the concepts share the same goals: isolate and protect information assets from unauthorised access using more than single perimeter protection.
James Janisse Jun 1 2004 12:23PM Security
Managing information security in modern commercial environments

Managing information security in modern commercial environments

The previous article in this series described an overall approach to securing information and provided a high-level description of the consolidation period and the strategic planning cycle. We continue this development by taking a more detailed look at the consolidation period.
Steve Purser Jun 1 2004 12:01PM Security
Review: Sunbelt Network Security Inspector

Review: Sunbelt Network Security Inspector

This is a vulnerability scanner for Microsoft operating systems and applications.
Julian Ashbourn Jun 1 2004 12:00AM Security
AO Fox Memorial Hospital tightens email security

AO Fox Memorial Hospital tightens email security

A New York hospital has implemented an email security solution for its users.
Dan Ilett May 28 2004 4:22PM Security
Microsoft describes internal security efforts

Microsoft describes internal security efforts

Microsoft's newly appointed CIO Ron Markezich talked about the vendor's internal IT security in a presentation Thursday at Microsoft's campus in Mountain View, Calif.
Marcia Savage May 28 2004 1:15AM Security
Microsoft demos security features in Windows XP Service Pack 2

Microsoft demos security features in Windows XP Service Pack 2

Microsoft demonstrated the security features of its upcoming Windows XP Service Pack 2 during a presentation on the company's security efforts held Thursday at its Mountain View, Calif., campus.
Marcia Savage May 28 2004 12:06AM Security
Deloitte survey shows rise in attacks but flat security budgets

Deloitte survey shows rise in attacks but flat security budgets

A survey of top financial services firms by Deloitte & Touche showed that a majority of financial institutions have suffered external attacks within the past year but many don't expect their security budgets to grow.
Marcia Savage May 26 2004 11:26PM Security
AusCERT: Microsoft’s security journey

AusCERT: Microsoft’s security journey

Siobhan Chapman May 26 2004 12:00AM Security
AusCERT: Corporates need mature security

AusCERT: Corporates need mature security

While security risk management is no longer a dark science, Australian corporates still lack maturity around the model, delegates at a major security conference heard.
Siobhan Chapman May 26 2004 12:00AM Security
AusCERT: Security arms race

AusCERT: Security arms race

Siobhan Chapman May 25 2004 12:00AM Security
University gets tough on wireless security

University gets tough on wireless security

A US university is using management software to tighten security on its 4,000 user wireless network.
Dan Ilett May 24 2004 11:22PM Security
UHS pilots wireless security management

UHS pilots wireless security management

One of the largest healthcare firms in the U.S. is piloting a wireless security management tool for 4,000 users.
Dan Ilett May 24 2004 9:18PM Security
Managing Information Security in Modern Commercial Environments, Part 2 – A Pro-Active Approach

Managing Information Security in Modern Commercial Environments, Part 2 – A Pro-Active Approach

In the first article of this series, we identified and provided examples of the types of issues that need to be resolved if organisations are to correctly manage risk in the area of information security. If we combine the impact of these trends and issues with the fact that most enterprises are being forced to cut costs in order to remain competitive the true magnitude of the problem becomes apparent. Simply put, information security managers have to secure more complex environments, faster and using less resources.
Steve Purser May 24 2004 5:37PM Security
Security costs CNII more

Security costs CNII more

Siobhan Chapman May 24 2004 12:00AM Security
Roundtable pushes CEOs for better security

Roundtable pushes CEOs for better security

CEOs and board members need to be more attentive to IT security, a US trade association has warned.
Dan Ilett May 20 2004 1:59PM Security
Energis staff to work for security accreditation

Energis staff to work for security accreditation

Telecoms and solutions firm Energis is embarking on an a campaign to train 80 of its security staff to international standards.
Dan Ilett May 18 2004 4:58PM Security
Farmers reap the profit of security

Farmers reap the profit of security

British agricultural supplier Countrywide Farmers is renewing its network security.
Dan Ilett May 18 2004 1:58PM Security

Log In

  |  Forgot your password?