SigInt

iTnews' Juha Saarinen lifts the lid on the dark and often bizarre world of IT and network security.
The real security threat of the 2016 Census

The real security threat of the 2016 Census

[Blog post] Data is not de-identified forever.
Aug 16 2016 2:30PM
Fear our dumb new world

Fear our dumb new world

[Blog post] Stop the idiocracy taking over before it's too late.
Aug 1 2016 3:00PM
Goodbye, PCs. You just can't be secured

Goodbye, PCs. You just can't be secured

[Blog post] Time to rethink enterprise users' computing platform.
Jul 5 2016 2:30PM
Respect my Certificate Authority!

Respect my Certificate Authority!

[Blog post] You should decide who to trust.
May 31 2016 2:30PM
Australia's new cyber security policy must consider past mistakes

Australia's new cyber security policy must consider past mistakes

[Blog post] Cyberspace won't be secure until legacy problems are sorted out.
Apr 26 2016 2:30PM
Why you should incentivise your users to combat threats

Why you should incentivise your users to combat threats

[Blog post] Make staff and customers part of the solution.
Apr 5 2016 2:24PM
Beware the fog of IoT

Beware the fog of IoT

[Blog post] Don't fall off the edge of the network.
Mar 1 2016 2:30PM
When you can't trust your security vendor

When you can't trust your security vendor

[Blog post] The watchmen also need to be watched.
Jan 19 2016 2:57PM
Facing up to stupidity and laziness

Facing up to stupidity and laziness

[Blog post] Why you shouldn't wait until afterwards to fix mistakes.
Dec 1 2015 2:30PM
Slew of snafus threaten integrity of SSL/TLS

Slew of snafus threaten integrity of SSL/TLS

[Blog post] Digital certificate system too fragile.
Nov 17 2015 2:13PM
Can you trust your telco?

Can you trust your telco?

[Blog post] Dumb pipes are safest.
Sep 22 2015 2:30PM
Hacking the hacking problem

Hacking the hacking problem

[Blog post] Putting kids in prison for internet crimes isn't working.
Sep 1 2015 2:50PM
Know where your traffic actually goes

Know where your traffic actually goes

[Blog post] Plan on dealing with BGP hijacks.
Aug 4 2015 2:30PM
When spyware merchants get hacked

When spyware merchants get hacked

Hacking Team attack points to bad business practices all round.
Jul 7 2015 2:30PM
Don’t be doomed to repeat the past

Don’t be doomed to repeat the past

[Blog post] Open standards help with past mistakes.
Jun 2 2015 2:30PM
Don’t let big data get you into big trouble

Don’t let big data get you into big trouble

[Blog post] Think before you download unsigned, unauthenticated code.
May 5 2015 2:32PM
Know what will leak before the breach

Know what will leak before the breach

[Blog post] Your archival policy could be a line of defence.
Apr 22 2015 2:29PM
China weaponises its internet

China weaponises its internet

[Blog post] Latest escalation of threat posture is bad news indeed.
Mar 31 2015 1:21PM
Recognising the toughest job in enterprise security

Recognising the toughest job in enterprise security

[Blog post] Introducing the Secure Computing Benchmark Awards.
Mar 3 2015 3:55PM
Will the Project Zero bell toll for Google?

Will the Project Zero bell toll for Google?

[Blog post] The difficulty with disclosure deadlines.
Feb 17 2015 2:15PM

Log In

Username:
Password:
|  Forgot your password?