Latest News
From records to real-time: why systems of engagement matter
Rolling Stone, Billboard owner Penske sues Google over AI overviews
Westpac stands up Copilot Studio for Gen AI agent development
Parent company of Gucci, Balenciaga hit by cyber attack
Domain Group builds 'listing assistant' to help staff find property metrics
LOG IN
SUBSCRIBE
NEWS
GOVERNMENT
SECURITY
AI
DIGITAL NATION
RESOURCES
PODCAST
EVENTS
ADVERTISE
Search
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
Data&AI Breakfast
SECURITY AWARDS
DIGITAL NATION AWARDS
BENCHMARK AWARDS
Digital As Usual
NEWS
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
GOVERNMENT
SECURITY
AI
DIGITAL NATION
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
RESOURCES
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
PODCAST
EVENTS
Data&AI Breakfast
SECURITY AWARDS
DIGITAL NATION AWARDS
BENCHMARK AWARDS
Digital As Usual
ADVERTISE
Log In
Email:
Password:
Remember me
|
Forgot password?
Don't have an account? Register now!
Home
Blogs
SigInt
iTnews' Juha Saarinen lifts the lid on the dark and often bizarre world of IT and network security.
When spyware merchants get hacked
Hacking Team attack points to bad business practices all round.
Juha Saarinen
Jul 7 2015 2:30PM
Security
Don’t be doomed to repeat the past
[Blog post] Open standards help with past mistakes.
Juha Saarinen
Jun 2 2015 2:30PM
Security
Don’t let big data get you into big trouble
[Blog post] Think before you download unsigned, unauthenticated code.
Juha Saarinen
May 5 2015 2:32PM
Security
Know what will leak before the breach
[Blog post] Your archival policy could be a line of defence.
Juha Saarinen
Apr 22 2015 2:29PM
Security
China weaponises its internet
[Blog post] Latest escalation of threat posture is bad news indeed.
Juha Saarinen
Mar 31 2015 1:21PM
Security
Recognising the toughest job in enterprise security
[Blog post] Introducing the Secure Computing Benchmark Awards.
Juha Saarinen
Mar 3 2015 3:55PM
Security
Will the Project Zero bell toll for Google?
[Blog post] The difficulty with disclosure deadlines.
Juha Saarinen
Feb 17 2015 2:15PM
Security
Providing CERTainty
[Blog post] AusCERT boss walks tightrope.
Juha Saarinen
Feb 3 2015 2:15PM
Security
Bulk data collection doesn't work without trust
[Blog post] No safe hands, no support.
Juha Saarinen
Jan 21 2015 12:39PM
Security
Censorship isn't the answer
Eroded privacy doesn't guarantee safety.
Juha Saarinen
Jan 13 2015 1:45PM
Security
In defence of automatic updating
[Blog Post] Auto Windows updates are a necessary evil.
Juha Saarinen
Dec 16 2014 12:41PM
Security
Sony hack: it's big, bad, and we need to know what happened
[Blog post] Breach illustrates the need for mandatory disclosure.
Juha Saarinen
Dec 10 2014 10:44AM
Security
Let's do the Heartbleed... again
[Blog post] Eight months on and many systems remain unpatched.
Juha Saarinen
Dec 2 2014 2:45PM
Security
The failure of the antivirus industry
[Blog post] Insights from AVAR 2014.
Juha Saarinen
Nov 26 2014 10:37AM
Security
Getting tricked into playing social roulette
[Blog post] Defences against social engineering are failing.
Juha Saarinen
Nov 12 2014 1:09PM
Security
Stop the patches
[Blog post] The situation has got out of hand.
Juha Saarinen
Nov 5 2014 12:14PM
Security
Router rooting is shooting fish in a barrel
[Blog post] Don't rely on broadband or wireless router vendors to protect you.
Juha Saarinen
Oct 14 2014 3:05PM
Security
Being a script kiddie easier than ever
[Blog post] Skills and effort barely required.
Juha Saarinen
Oct 10 2014 12:14PM
Security
Foiling hackers with a virtual perimeter
[Blog post] Security defined perimeters show promise.
Juha Saarinen
Oct 8 2014 11:20AM
Security
A tick symbol for tech
Risk management through regulation.
Juha Saarinen
Oct 1 2014 10:06AM
Security
Previous
Next
Most popular tech stories
Lendi Group unveils agentic AI-powered home loan 'guardian'
Queensland Rail uses SuccessFactors to "put learning back on the map"
Cyber Security Roadshow: Digital As Usual 2025
mecwacare sizes its digital transformation
APT Travel Group grows online sales 175% with Contentful-powered digital transformation
HamiltonJet partners with digital services provider Fortude
SentinelOne signs distribution agreement with Sektor
Rapid7’s new SIEM combines exposure management with threat detection
The techpartner.news podcast, episode 3: Why security consultancy founder Kat McCrabb started with the hard stuff
Bluechip Infotech enters final stage of Goodson Imports acquisition
Blackberry celebrates "giant step forward"
Photos: Australian industry comes together to explore IoT opportunities
Australian firm wins global Cisco AI award for rail safety solution
Govt launches consumer tech label program for smart devices
Sydney and Melbourne rank highly for "citizen experience"
Log In
Don't have an account? Register now!
Email:
Password:
Remember me
|
Forgot your password?