Latest News
University of New England finds permanent CIDO
Security firm strikes telemetry jackpot as cybercrim self-monitors
"VoidProxy" PhishKit targets Google and Microsoft users
Less complexity. More confidence. True security requires real clarity.
India's IT sector nervous as US proposes outsourcing tax
LOG IN
SUBSCRIBE
NEWS
GOVERNMENT
SECURITY
AI
DIGITAL NATION
RESOURCES
PODCAST
EVENTS
ADVERTISE
Search
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
Data&AI Breakfast
SECURITY AWARDS
DIGITAL NATION AWARDS
BENCHMARK AWARDS
Digital As Usual
NEWS
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
GOVERNMENT
SECURITY
AI
DIGITAL NATION
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
RESOURCES
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
PODCAST
EVENTS
Data&AI Breakfast
SECURITY AWARDS
DIGITAL NATION AWARDS
BENCHMARK AWARDS
Digital As Usual
ADVERTISE
Log In
Email:
Password:
Remember me
|
Forgot password?
Don't have an account? Register now!
Home
Blogs
Identity Engineering
Verifying identity in a digital world.
Why the Govt can't simply go opt-out for e-health
[Blog post] Security, privacy safeguards not up to scratch.
Steve Wilson
May 11 2015 12:39PM
Security
CISOs' mojo lies in the metadata
[Blog post] Information surfaced has strategic advantage.
Steve Wilson
Oct 28 2014 9:52AM
Security
Who'd have picked a BlackBerry for the Internet of Things?
[Blog] BlackBerry has a more secure future in the physical world.
Steve Wilson
Aug 26 2014 2:37PM
Security
Can 'info-nopolies' be trusted with our personal data?
[Blog post] Citizens reduced to lab rats.
Steve Wilson
Jul 8 2014 7:06AM
Security
What does Heartbleed say about the craft of software?
[Blog post] We're clearly getting it wrong.
Steve Wilson
Apr 15 2014 4:35PM
Security
Stop confusing privacy for secrecy
[Blog post] The danger of the ‘encrypt everything’ mindset.
Steve Wilson
Mar 12 2014 10:53AM
Security
Most popular tech stories
Lendi Group unveils agentic AI-powered home loan 'guardian'
State of MarTech
NSW Education turns to Deloitte for HCM program delivery
Lion migrates staff onboarding process from SAP into ServiceNow
mecwacare sizes its digital transformation
HamiltonJet partners with digital services provider Fortude
SentinelOne signs distribution agreement with Sektor
Rapid7’s new SIEM combines exposure management with threat detection
The techpartner.news podcast, episode 3: Why security consultancy founder Kat McCrabb started with the hard stuff
Bluechip Infotech enters final stage of Goodson Imports acquisition
Blackberry celebrates "giant step forward"
Photos: Australian industry comes together to explore IoT opportunities
Australian firm wins global Cisco AI award for rail safety solution
Govt launches consumer tech label program for smart devices
How Meshed used IoT to help NSW Parks & Wildlife Service improve bushfire risk mitigation
Log In
Don't have an account? Register now!
Email:
Password:
Remember me
|
Forgot your password?