Latest News
In Pictures: State of Data & AI report launch breakfast
CBA using facial recognition logins to verify disputed payments
Australia takes another step toward a central bank digital currency
UK police arrest four over cyberattacks on M&S, Co-op and Harrods
Viva Energy completes greenfield HR setup in time for Coles cutover
LOG IN
SUBSCRIBE
NEWS
GOVERNMENT
SECURITY
AI
DIGITAL NATION
RESOURCES
PODCAST
EVENTS
ADVERTISE
Search
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
Data&AI Breakfast
SECURITY AWARDS
DIGITAL NATION AWARDS
BENCHMARK AWARDS
Digital As Usual
NEWS
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
GOVERNMENT
SECURITY
AI
DIGITAL NATION
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
RESOURCES
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
PODCAST
EVENTS
Data&AI Breakfast
SECURITY AWARDS
DIGITAL NATION AWARDS
BENCHMARK AWARDS
Digital As Usual
ADVERTISE
Log In
Email:
Password:
Remember me
|
Forgot password?
Don't have an account? Register now!
Home
Blogs
SigInt
iTnews' Juha Saarinen lifts the lid on the dark and often bizarre world of IT and network security.
When spyware merchants get hacked
Hacking Team attack points to bad business practices all round.
Juha Saarinen
Jul 7 2015 2:30PM
Security
Don’t be doomed to repeat the past
[Blog post] Open standards help with past mistakes.
Juha Saarinen
Jun 2 2015 2:30PM
Security
Don’t let big data get you into big trouble
[Blog post] Think before you download unsigned, unauthenticated code.
Juha Saarinen
May 5 2015 2:32PM
Security
Know what will leak before the breach
[Blog post] Your archival policy could be a line of defence.
Juha Saarinen
Apr 22 2015 2:29PM
Security
China weaponises its internet
[Blog post] Latest escalation of threat posture is bad news indeed.
Juha Saarinen
Mar 31 2015 1:21PM
Security
Recognising the toughest job in enterprise security
[Blog post] Introducing the Secure Computing Benchmark Awards.
Juha Saarinen
Mar 3 2015 3:55PM
Security
Will the Project Zero bell toll for Google?
[Blog post] The difficulty with disclosure deadlines.
Juha Saarinen
Feb 17 2015 2:15PM
Security
Providing CERTainty
[Blog post] AusCERT boss walks tightrope.
Juha Saarinen
Feb 3 2015 2:15PM
Security
Bulk data collection doesn't work without trust
[Blog post] No safe hands, no support.
Juha Saarinen
Jan 21 2015 12:39PM
Security
Censorship isn't the answer
Eroded privacy doesn't guarantee safety.
Juha Saarinen
Jan 13 2015 1:45PM
Security
In defence of automatic updating
[Blog Post] Auto Windows updates are a necessary evil.
Juha Saarinen
Dec 16 2014 12:41PM
Security
Sony hack: it's big, bad, and we need to know what happened
[Blog post] Breach illustrates the need for mandatory disclosure.
Juha Saarinen
Dec 10 2014 10:44AM
Security
Let's do the Heartbleed... again
[Blog post] Eight months on and many systems remain unpatched.
Juha Saarinen
Dec 2 2014 2:45PM
Security
The failure of the antivirus industry
[Blog post] Insights from AVAR 2014.
Juha Saarinen
Nov 26 2014 10:37AM
Security
Getting tricked into playing social roulette
[Blog post] Defences against social engineering are failing.
Juha Saarinen
Nov 12 2014 1:09PM
Security
Stop the patches
[Blog post] The situation has got out of hand.
Juha Saarinen
Nov 5 2014 12:14PM
Security
Router rooting is shooting fish in a barrel
[Blog post] Don't rely on broadband or wireless router vendors to protect you.
Juha Saarinen
Oct 14 2014 3:05PM
Security
Being a script kiddie easier than ever
[Blog post] Skills and effort barely required.
Juha Saarinen
Oct 10 2014 12:14PM
Security
Foiling hackers with a virtual perimeter
[Blog post] Security defined perimeters show promise.
Juha Saarinen
Oct 8 2014 11:20AM
Security
A tick symbol for tech
Risk management through regulation.
Juha Saarinen
Oct 1 2014 10:06AM
Security
Previous
Next
Most popular tech stories
Woolworths Group consolidates 30,000 marketing assets into Adobe platform
El Jannah backs Salesforce martech stack to support store expansion
NSW gov employers 'should not' use AI for hiring decisions
Optus' first AI chief Samantha Lawson exits
Viva Energy completes greenfield HR setup in time for Coles cutover
Ingram Micro hit by ransomware
PHOTOS: The M&A Session - Sydney
The techpartner.news podcast, episode 1: Why OxygenIT dropped 80 percent of its customers
Announcing the 2025 Impact Awards Partner Leadership finalists
Dell’s new platform wants to end HCI vendor lock-in
Blackberry celebrates "giant step forward"
Laing O'Rourke brings IoT to hard hats
Co-founder of IoT telco Thinxtra Loïc Barancourt departs
Telstra to host IoT State of the Nation event on November 14
Aldi supplier trials RFID tags on bananas
Log In
Don't have an account? Register now!
Email:
Password:
Remember me
|
Forgot your password?