Latest News
CBA builds two AI agents to boost cyber defences
Microsoft rejigs Copilot teams
Stryker contains cyber attack on its Microsoft environment
How Optus brings your mobile-first security strategy to life
UK's Companies House apologises for access and data breach
LOG IN
SUBSCRIBE
NEWS
GOVERNMENT
SECURITY
AI
DIGITAL NATION
RESOURCES
PODCAST
EVENTS
ADVERTISE
Search
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
Tech Partner Views
Cloud Covered
Executive Retreat
BENCHMARK AWARDS
NEWS
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
GOVERNMENT
SECURITY
AI
DIGITAL NATION
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
RESOURCES
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
Tech Partner Views
PODCAST
EVENTS
Cloud Covered
Executive Retreat
BENCHMARK AWARDS
ADVERTISE
Log In
Email:
Password:
Remember me
|
Forgot password?
Don't have an account? Register now!
Home
Authors
Adam Lipson
Send a message to Adam
Recent articles by Adam Lipson
Perimeter Defense Model for Security
There has to be a better way!
Adam Lipson
Jan 14 2004 3:38PM
Security
Holistic paths to security
Security tools are important for protecting company systems, but, says Adam Lipson, focusing on people can yield better results
Adam Lipson
Jan 13 2004 4:36PM
Security
A Balanced Approach to Performing a Security Assessment
Fundamentally, there exist just two basic approaches to performing security assessments: vulnerability priority and asset priority.
Adam Lipson
Jan 9 2004 4:38PM
Security
Placing Strategic Security on the Front Burner
Given a choice between spending money on enterprise resource planning (ERP) or information security, organizations typically choose the former.
Adam Lipson
Jan 9 2004 4:09PM
Security
Security Awareness for Software Developers
“An Ounce of Prevention” or “A Pound of Cure?”
Adam Lipson
Jan 9 2004 2:19PM
Security
Most popular tech stories
Premier's Department NSW CDIO of four-and-a-half years leaves
Meta acquires AI agent social network Moltbook
ABC drops Salesforce for Braze
Griffith University takes control of its student recruitment
Craveable Brands has one eye on AI, and the other on the project failure rate
HamiltonJet partners with digital services provider Fortude
SentinelOne signs distribution agreement with Sektor
Rapid7’s new SIEM combines exposure management with threat detection
The techpartner.news podcast, episode 3: Why security consultancy founder Kat McCrabb started with the hard stuff
Bluechip Infotech enters final stage of Goodson Imports acquisition
'Touch-free' smartphone controlled with head movements
Blackberry celebrates "giant step forward"
Govt launches consumer tech label program for smart devices
Photos: Australian industry explores data for net zero
Telstra Purple acquires IoT specialists Alliance Automation, Aqura Technologies
Log In
Don't have an account? Register now!
Email:
Password:
Remember me
|
Forgot your password?