Latest News
Researchers demo AI-crippling GPUHammer attack
CISA adds serious Wing FTP Server vulnerability to must-fix list
Chemist Warehouse builds data maturity to underpin AI goals
AGD sets end-of-year deadline for Microsoft 365 rollout
Supply chain attack with malware hits Gravity Forms for WordPress
LOG IN
SUBSCRIBE
NEWS
GOVERNMENT
SECURITY
AI
DIGITAL NATION
RESOURCES
PODCAST
EVENTS
ADVERTISE
Search
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
Data&AI Breakfast
SECURITY AWARDS
DIGITAL NATION AWARDS
BENCHMARK AWARDS
Digital As Usual
NEWS
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
GOVERNMENT
SECURITY
AI
DIGITAL NATION
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
RESOURCES
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
PODCAST
EVENTS
Data&AI Breakfast
SECURITY AWARDS
DIGITAL NATION AWARDS
BENCHMARK AWARDS
Digital As Usual
ADVERTISE
Log In
Email:
Password:
Remember me
|
Forgot password?
Don't have an account? Register now!
Home
Authors
Stephen Wilson
Send a message to Stephen
Recent articles by Stephen Wilson
Identity management and the iPhone 5s
Opinion: Why NFC trumps biometrics.
Stephen Wilson
Sep 20 2013 6:36AM
Security
iPhone 5s : Does the 's' stand for security?
Opinion: Why NFC trumps biometrics.
Stephen Wilson
Sep 19 2013 9:00AM
Security
Feds try to elevate 'social log-on' for payments
Why you should accept the Document Verification Service.
Stephen Wilson
Nov 12 2012 9:48AM
Security
A new theory of digital identity
The final instalment of a two-part feature series explores the troubled practice of federated identity.
Stephen Wilson
Mar 14 2012 6:49AM
Security
A new theory of digital identity
Stephen Wilson
puts digital identity under the microscope.
Stephen Wilson
Nov 30 2011 2:09PM
Security
Most popular tech stories
Chemist Warehouse builds data maturity to underpin AI goals
Viva Energy completes greenfield HR setup in time for Coles cutover
Woolworths Group consolidates 30,000 marketing assets into Adobe platform
Powercor to tap into agentic AI across the organisation
NSW gov employers 'should not' use AI for hiring decisions
NEXTGEN "realigns" structure, announces senior promotions, plans vendor consolidation
Ingram Micro "grateful" for customers' support during cybersecurity incident
Support Fusion launches, rolls out integration platform for MSPs and SIs
The techpartner.news podcast, episode 1: Why OxygenIT dropped 80 percent of its customers
Macquarie Technology Group secures option to buy Sydney land for data centre campus
Blackberry celebrates "giant step forward"
Govt launches consumer tech label program for smart devices
Water, energy sector sustainability to take centre stage at IoT Impact
Major Australian produce supplier will use AI to predict berry yield
Laing O'Rourke brings IoT to hard hats
Log In
Don't have an account? Register now!
Email:
Password:
Remember me
|
Forgot your password?