IT Security - News, Features, and Slideshows

News

  • Victorian Auditor-General warns about poor ICT security

    Nearly 12 months after security gaps were first flagged across Victorian agencies’ ICT systems, little progress has been made, the state’s Auditor-General, John Doyle, has warned.

    Written by Shahida Sweeney16 Oct. 14 10:29
  • Trusted insider a security threat, warns Brandis

    Security planners are racing to close gaps across networks and ICT infrastructure. But they have overlooked a Trojan horse already inside the gate, Attorney-General, George Brandis has warned.

    Written by Shahida Sweeney03 Sept. 14 10:47
  • IT security needs to market itself to the business: Woolworths

    CISOs and CSOs need to start marketing IT security as a “brand” to the business or risk getting left out of business decisions, according to Woolworths group information risk manager Peter Cooper.

    Written by Hamish Barwick26 Aug. 14 15:45
  • Bitcoin: Addressing concerns over a 51% attack

    Although a mining pool last month managed to briefly control the majority of the computing power used to generate the Bitcoin crypto-currency, a so-called '51 per cent attack' remains unlikely.

    Written by Rebecca Merrett25 July 14 09:00
  • 6 IT Security Innovations to Keep You Ahead of Attackers

    Hardly a day goes by without a new security threat emerging. Traditional security tools aren't always up to the task of keeping sensitive business information in safe hands. These six innovations will help you stay a step ahead.

    Written by John Brandon26 March 13 14:16
  • Startup NetCitadel aims to orchestrate security management controls in virtualized nets

    Startup NetCitadel today launched with a product called OneControl intended to automate what might otherwise be manual research and changes related to configuring firewalls, switches or other gear when virtual-machine (VM) workloads are spun up or down in enterprise data centers or cloud environments.

    Written by Ellen Messmer29 Jan. 13 12:05
  • New standard/tool address security dependencies

    There's a need to rely and trust forces outside our direct control for security -- and that awareness spurred the United Kingdom's national infrastructure protection authority to push for a standard way to model the implications of relying on technology, services, people and more.

    Written by Ellen Messmer14 Dec. 12 17:04
  • Trustworthy systems, trustworthy vendors, and how to identify them

    It's sad but true that some of the world's best minds in computing have dedicated themselves to creating new ways to attack information technology infrastructures. The assaults have resulted in a significant cost factor in enterprise computing, influencing the purchasing decisions both for general-purpose processing, storage and networking products and for specialized security hardware, software and services.

    Written by John Stewart, senior vice president and chief security officer, Cisco13 Dec. 12 19:58
  • Why risk management can succeed in IT

    Earlier this week Richard Stiennon published an article that questions the value of risk management in IT, and I would argue that, although risk management presents challenges to IT, best practice-driven approaches leveraging aspects of risk management are essential to good security.

    Written by Steve Schlarman, eGRC solutions architect, RSA22 Oct. 12 19:48
  • 8 questions to ask prospective Cloud vendors

    When you're on an airliner and fly through layers of clouds, you see first-hand that they come in many forms - sometimes hazy, sometimes translucent and sometimes so dense that you can't see through them. In many ways, Cloud computing is similar - there are lots of grey areas, and it's hard to know exactly what you might get from each Cloud offering.

    Written by Todd R. Weiss23 June 11 08:56
[]