Latest News
Hack at UnitedHealth's tech unit impacted 192.7 million people
ATO considers AI coding assistance for 800 core developers
Suncorp deploys Duck Creek at AAMI
"BitUnlocker" full-volume encryption bypass found by Microsoft researchers
Orro: Hyper connected consumers drive intelligent network investments
LOG IN
SUBSCRIBE
NEWS
GOVERNMENT
SECURITY
AI
DIGITAL NATION
RESOURCES
PODCAST
EVENTS
ADVERTISE
Search
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
Data&AI Breakfast
SECURITY AWARDS
DIGITAL NATION AWARDS
BENCHMARK AWARDS
Digital As Usual
NEWS
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
GOVERNMENT
SECURITY
AI
DIGITAL NATION
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
RESOURCES
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
PODCAST
EVENTS
Data&AI Breakfast
SECURITY AWARDS
DIGITAL NATION AWARDS
BENCHMARK AWARDS
Digital As Usual
ADVERTISE
Log In
Email:
Password:
Remember me
|
Forgot password?
Don't have an account? Register now!
Home
Authors
Dan Taylor
Send a message to Dan
Recent articles by Dan Taylor
Taking the 'N' Out of VPN
Recently, we've been listening to security managers reminisce about the 'good old days' of mainframe computing in which the physical security of the computer room was pretty much all that was needed in order to secure the data on the computer.
Dan Taylor
Jan 16 2004 3:00PM
Security
Is Information Security Crossing the Proverbial You Know What?
Information security is a hot topic these days, something that often gets credited to an increased awareness of terrorism.
Dan Taylor
Jan 16 2004 11:37AM
Security
Economic Models for Information Security
Security managers are under increasing pressure from corporate management to justify investments in information security technologies.
Dan Taylor
Jan 16 2004 10:23AM
Security
Securing the Network Edge
In the evolution of communications networks, the lines between computing and networking have become less than clear.
Dan Taylor
Jan 16 2004 9:49AM
Security
A Proper Diet of Information Security
Earlier this year, researchers in Sweden announced that during a research study, they discovered that bread, potato chips, French fries and even cereal contain high levels of the carcinogen acrylamide.
Dan Taylor
Jan 15 2004 12:05PM
Security
Making Sense of “Homeland Security”
As the Homeland Security Act makes its way through the United States Congress, the topic of homeland security has become a relevant discussion in the information security marketplace.
Dan Taylor
Jan 15 2004 11:27AM
Security
Putting Information Security into Focus
In the past several months, it has become painfully clear that C-level executives are getting tired of buying information security for its own purposes.
Dan Taylor
Jan 12 2004 3:54PM
Security
Most popular tech stories
CBA's leaders are keeping a close watch on AI metrics
Coles Group to test agentic AI on staff leave booking
NBN Co weaves AI and automation into its operational "fabric"
OVIC sets limits on GenAI tool use in external meetings
Guzman y Gomez continues to deploy Workday as core people platform
HamiltonJet partners with digital services provider Fortude
SentinelOne signs distribution agreement with Sektor
Rapid7’s new SIEM combines exposure management with threat detection
The techpartner.news podcast, episode 3: Why security consultancy founder Kat McCrabb started with the hard stuff
Bluechip Infotech enters final stage of Goodson Imports acquisition
ParKam's smart parking project at Curtin University will be a world-first
Blackberry celebrates "giant step forward"
Photos: Australian industry explores data for net zero
How Jemena uses IoT to push the boundaries of customer innovation in the gas sector
Govt launches consumer tech label program for smart devices
Log In
Don't have an account? Register now!
Email:
Password:
Remember me
|
Forgot your password?