SigInt

iTnews' Juha Saarinen lifts the lid on the dark and often bizarre world of IT and network security.
Cloudbleed: When security means living with complexity

Cloudbleed: When security means living with complexity

[Blog post] It's difficult trying to do the right thing.
Feb 28 2017 10:00AM
It's time to put SMS 2FA out to pasture

It's time to put SMS 2FA out to pasture

[Blog post] Telstra fire reminds us there are better ways to authenticate.
Feb 7 2017 2:30PM
Here's to 2016 - and make it a stiff one

Here's to 2016 - and make it a stiff one

[Blog post] You thought this year was bad, just wait until next.
Dec 20 2016 2:00PM
Don't do the crime, but learn from those who did

Don't do the crime, but learn from those who did

[Blog post] Avalanche offers a few choice lessons.
Dec 6 2016 3:00PM
'Sorry' isn't good enough when sensitive data is compromised

'Sorry' isn't good enough when sensitive data is compromised

[Blog post] Lack of responsibility means Red Cross won't be the last.
Nov 2 2016 2:30PM
Brandis' cyber security redemption

Brandis' cyber security redemption

[Blog post] How the govt could address its tattered infosec law reputation.
Oct 4 2016 3:00PM
The real security threat of the 2016 Census

The real security threat of the 2016 Census

[Blog post] Data is not de-identified forever.
Aug 16 2016 2:30PM
Fear our dumb new world

Fear our dumb new world

[Blog post] Stop the idiocracy taking over before it's too late.
Aug 1 2016 3:00PM
Goodbye, PCs. You just can't be secured

Goodbye, PCs. You just can't be secured

[Blog post] Time to rethink enterprise users' computing platform.
Jul 5 2016 2:30PM
Respect my Certificate Authority!

Respect my Certificate Authority!

[Blog post] You should decide who to trust.
May 31 2016 2:30PM
Australia's new cyber security policy must consider past mistakes

Australia's new cyber security policy must consider past mistakes

[Blog post] Cyberspace won't be secure until legacy problems are sorted out.
Apr 26 2016 2:30PM
Why you should incentivise your users to combat threats

Why you should incentivise your users to combat threats

[Blog post] Make staff and customers part of the solution.
Apr 5 2016 2:24PM
Beware the fog of IoT

Beware the fog of IoT

[Blog post] Don't fall off the edge of the network.
Mar 1 2016 2:30PM
When you can't trust your security vendor

When you can't trust your security vendor

[Blog post] The watchmen also need to be watched.
Jan 19 2016 2:57PM
Facing up to stupidity and laziness

Facing up to stupidity and laziness

[Blog post] Why you shouldn't wait until afterwards to fix mistakes.
Dec 1 2015 2:30PM
Slew of snafus threaten integrity of SSL/TLS

Slew of snafus threaten integrity of SSL/TLS

[Blog post] Digital certificate system too fragile.
Nov 17 2015 2:13PM
Can you trust your telco?

Can you trust your telco?

[Blog post] Dumb pipes are safest.
Sep 22 2015 2:30PM
Hacking the hacking problem

Hacking the hacking problem

[Blog post] Putting kids in prison for internet crimes isn't working.
Sep 1 2015 2:50PM
Know where your traffic actually goes

Know where your traffic actually goes

[Blog post] Plan on dealing with BGP hijacks.
Aug 4 2015 2:30PM
When spyware merchants get hacked

When spyware merchants get hacked

Hacking Team attack points to bad business practices all round.
Jul 7 2015 2:30PM

Log In

Username:
Password:
|  Forgot your password?