Latest News
Quorum using AI to achieve “huge” cyber time savings for Australian businesses
Lanrex identifies “big gaps” in Australian businesses' cybersecurity
Why GRC is now crucial to prioritising security budgets
DevSecOps success leads to better ROI and happier customers
ANZ consolidates operational risk into ServiceNow
LOG IN
SUBSCRIBE
NEWS
GOVERNMENT
SECURITY
AI
DIGITAL NATION
RESOURCES
PODCAST
EVENTS
ADVERTISE
Search
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
Data&AI Breakfast
SECURITY AWARDS
DIGITAL NATION AWARDS
BENCHMARK AWARDS
Digital As Usual
NEWS
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
GOVERNMENT
SECURITY
AI
DIGITAL NATION
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
RESOURCES
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
PODCAST
EVENTS
Data&AI Breakfast
SECURITY AWARDS
DIGITAL NATION AWARDS
BENCHMARK AWARDS
Digital As Usual
ADVERTISE
Log In
Email:
Password:
Remember me
|
Forgot password?
Don't have an account? Register now!
Home
Blogs
SigInt
iTnews' Juha Saarinen lifts the lid on the dark and often bizarre world of IT and network security.
When spyware merchants get hacked
Hacking Team attack points to bad business practices all round.
Juha Saarinen
Jul 7 2015 2:30PM
Security
Don’t be doomed to repeat the past
[Blog post] Open standards help with past mistakes.
Juha Saarinen
Jun 2 2015 2:30PM
Security
Don’t let big data get you into big trouble
[Blog post] Think before you download unsigned, unauthenticated code.
Juha Saarinen
May 5 2015 2:32PM
Security
Know what will leak before the breach
[Blog post] Your archival policy could be a line of defence.
Juha Saarinen
Apr 22 2015 2:29PM
Security
China weaponises its internet
[Blog post] Latest escalation of threat posture is bad news indeed.
Juha Saarinen
Mar 31 2015 1:21PM
Security
Recognising the toughest job in enterprise security
[Blog post] Introducing the Secure Computing Benchmark Awards.
Juha Saarinen
Mar 3 2015 3:55PM
Security
Will the Project Zero bell toll for Google?
[Blog post] The difficulty with disclosure deadlines.
Juha Saarinen
Feb 17 2015 2:15PM
Security
Providing CERTainty
[Blog post] AusCERT boss walks tightrope.
Juha Saarinen
Feb 3 2015 2:15PM
Security
Bulk data collection doesn't work without trust
[Blog post] No safe hands, no support.
Juha Saarinen
Jan 21 2015 12:39PM
Security
Censorship isn't the answer
Eroded privacy doesn't guarantee safety.
Juha Saarinen
Jan 13 2015 1:45PM
Security
In defence of automatic updating
[Blog Post] Auto Windows updates are a necessary evil.
Juha Saarinen
Dec 16 2014 12:41PM
Security
Sony hack: it's big, bad, and we need to know what happened
[Blog post] Breach illustrates the need for mandatory disclosure.
Juha Saarinen
Dec 10 2014 10:44AM
Security
Let's do the Heartbleed... again
[Blog post] Eight months on and many systems remain unpatched.
Juha Saarinen
Dec 2 2014 2:45PM
Security
The failure of the antivirus industry
[Blog post] Insights from AVAR 2014.
Juha Saarinen
Nov 26 2014 10:37AM
Security
Getting tricked into playing social roulette
[Blog post] Defences against social engineering are failing.
Juha Saarinen
Nov 12 2014 1:09PM
Security
Stop the patches
[Blog post] The situation has got out of hand.
Juha Saarinen
Nov 5 2014 12:14PM
Security
Router rooting is shooting fish in a barrel
[Blog post] Don't rely on broadband or wireless router vendors to protect you.
Juha Saarinen
Oct 14 2014 3:05PM
Security
Being a script kiddie easier than ever
[Blog post] Skills and effort barely required.
Juha Saarinen
Oct 10 2014 12:14PM
Security
Foiling hackers with a virtual perimeter
[Blog post] Security defined perimeters show promise.
Juha Saarinen
Oct 8 2014 11:20AM
Security
A tick symbol for tech
Risk management through regulation.
Juha Saarinen
Oct 1 2014 10:06AM
Security
Previous
Next
Most popular tech stories
Digital Nation announces finalists for its inaugural Digital Nation Awards
Afterpay rebuilds marketing ops with new CDP and data stack
Lawyers face sanctions for citing fake cases with AI
The Northern Beaches Women's Shelter hones focus on tech-enabled abuse
Ingenia optimises payroll and rostering with HR uplift
Announcing the 2025 Impact Awards partner project finalists
Dicker Data announces telco division, Vocus partnership
Evergreen acquires 100th MSP, Brisbane-based REDD
The Australian Cyber Network closing its doors
Amazon investing $20 billion in local data centre infrastructure
‘Iron Dome’ intelligence aims to smarten power grid
Blackberry celebrates "giant step forward"
Photos: The 2024 IoT Awards winners
AgriFood Connect deploys private 5G platform
The three steps to industrial IoT success
Log In
Don't have an account? Register now!
Email:
Password:
Remember me
|
Forgot your password?