Lia Timson

Send feedback to Lia Timson



Recent articles for Lia Timson

CIO role now a stepping stone to top job 
Sep 8, 2011 | Comment Now 
Business skills still needed.
 
Why users should be wary of BYO Computing 
Jun 21, 2011 | Comment Now 
IT admins, lawyers may need to access your machine.
 
Trust under scrutiny as ethical hacking goes legit 
May 12, 2011 | Comment Now 
What value should CIOs place in ethical hacking accreditation?
 
Telstra in BYO Computing trials 
May 10, 2011 | Comment Now 
Looks to open corporate apps to staff-owned devices.
 
Why Big Australia is gaga for BYO Computing 
May 10, 2011 | Comment Now 
Analysis: Telstra, Jetstar and Norton Rose discuss their BYO Projects.
 
Flash exploit found in spate of new phishing attacks 
Apr 12, 2011 | Comment Now 
Exploit carried via Microsoft Word attachments.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  69%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  10%
 
Denial of service attacks
  6%
 
Insider threats
  11%
TOTAL VOTES: 1154

Vote