Spotlight on Cyber Security Spotlight on Cyber Security

Most infosec leaders agree that traditional security methods, on their own, are no longer enough to combat advanced new threats. But what new techniques and strategies are they using? What lessons have they learnt from breaches?

iTnews will provide some answers to these questions in our Spotlight on Cyber Security, coinciding with the Australian Information Security Association’s national conference on 10-12 October.

Lawyers Draft IT Security Professionals for Litigation Support Duty

Lawyers Draft IT Security Professionals for Litigation Support Duty

The process of litigation discovery - where parties to a lawsuit seek documents, depositions and other information from their foes and third-party witnesses prior to trial - is seeing a dramatic transition with the advent of the 'paperless office.'
John Patzakis Jan 19 2004 10:58AM Security
Sharing Infosec Information

Sharing Infosec Information

Infosecurity is hitting the mainstream.
Illena Armstrong Jan 19 2004 10:52AM Security
Information Security Outlook for Asia Pacific

Information Security Outlook for Asia Pacific

Just five years ago, information security in the Asia Pacific region was simply another job function to most IT people.
Chester Soong Jan 19 2004 10:50AM Security
Security: State of the Enterprise

Security: State of the Enterprise

Last month's column, "IDS: Alarms, not Walls," incited some interesting responses.
Bart Taylor Jan 19 2004 10:43AM Security
Security Awareness Training - It's Time To Get Serious

Security Awareness Training - It's Time To Get Serious

This is one of a series of articles where I will try to encourage everyone who reads them to finally get serious about establishing an employee awareness training program.
Jack Wiles Jan 19 2004 10:42AM Security
Managing Your Security Risks: Ten Questions to Ask Before the Next Product Demo

Managing Your Security Risks: Ten Questions to Ask Before the Next Product Demo

The year is still relatively young, which usually means that at some point, we all sit down either alone or with a group of trusted friends and colleagues, and make up lists of issues we intend to resolve over the course of the next 12 months.
Drew Williams Jan 19 2004 10:18AM Security
SECURITY CAMERA We Have the Technology - Don't We?

SECURITY CAMERA We Have the Technology - Don't We?

With recent events fresh in everyone's mind, it isn't that surprising that security has been thrust into the forefront, or that access control and authentication have become key issues.
Jayne Parkhouse Jan 19 2004 10:08AM Security
SECURITY LIBRARY: Know Your Enemy

SECURITY LIBRARY: Know Your Enemy

For over two years a group of very talented folks have been collecting attack information on a honeynet and analyzing the activities of blackhats attacking an exposed and unprotected suite of computers of different types.
Peter Stephenson Jan 19 2004 10:06AM Security
Accelerating Security Policies thru Middleware

Accelerating Security Policies thru Middleware

As the lines dividing intranets and extranets continue to blur, companies like yours are rushing to expose private network applications and information assets to customers, business partners and employees.
Robert Lendvai Jan 19 2004 10:01AM Security
SECURITY LIBRARY: Hacker's Challenge

SECURITY LIBRARY: Hacker's Challenge

Technical books of more than 350 pages are not meant to be read in one helping, like mystery novels.
Anton Chuvakin Jan 19 2004 9:58AM Security
Security Demands Action

Security Demands Action

Security has never been given such attention as it is given today.
Illena Armstrong Jan 19 2004 9:53AM Security
Is Microsoft at Odds with Best Security Practices?

Is Microsoft at Odds with Best Security Practices?

Microsoft has announced the release of a new security tool aimed at improving the security of home and enterprise systems.
David Thomason Jan 19 2004 9:52AM Security
PDA Security Policy - Worth Its Weight in Gold

PDA Security Policy - Worth Its Weight in Gold

Nowadays, it seems like everybody has a PDA. However, as an inevitable corollary, it seems like everyone is eventually bound to misplace their PDA.
Oba McMillan Jan 19 2004 9:50AM Security
Thinking About Security as you Build Your Architecture

Thinking About Security as you Build Your Architecture

The security of an environment is often won or lost at the architecture level.
Brad Johnson, Jan 19 2004 9:47AM Security
Security Threats of Pervasive Computing

Security Threats of Pervasive Computing

Remember when we had telephone booths on every street corner?
Dave Lang Jan 19 2004 9:41AM Security
Network Security: A New Virtual Foot Soldier Against Cyberterrorism

Network Security: A New Virtual Foot Soldier Against Cyberterrorism

Internet usage is growing at an accelerating pace.
Joseph Vaughn-Perling Jan 16 2004 5:18PM Security
Of 'Zombie' Computers and DDoS Attacks: The Security Liability

Of 'Zombie' Computers and DDoS Attacks: The Security Liability

Two years ago, Internet security in the United States changed dramatically when Amazon.com, CNN, Yahoo, E*TRADE, ZDNet and others fell victim to what has come to be known as a distributed denial-of-service (DDoS) attack.
Dorsey Morrow Jan 16 2004 5:13PM Security
W-LAN security issues revealed

W-LAN security issues revealed

The stupidity of companies when it comes to securing their networks seems to know no bounds.
Steve Gold Jan 16 2004 4:45PM Security
SECURITY CAMERA: Storage, Where's the SANs in That?

SECURITY CAMERA: Storage, Where's the SANs in That?

Maybe it's the current global climate that has made many aware of the need for better storage, backup and disaster recovery capabilities.
Jayne Parkhouse Jan 16 2004 2:55PM Security
Outsourcing IT Security

Outsourcing IT Security

In today's lean, just-in-time business environment, many companies are looking to outsourcing as an alternative to in-house support.
Dave Lang Jan 16 2004 2:54PM Security

Log In

  |  Forgot your password?