Latest News
ACMA secures pledges from major online retailers to block "dodgy" mobile sales
Vic energy department seeks CIO
Defence gives $84m IT support contract to Unisys
NBN Co puts a longer predictive lens on its digital twin ambitions
Cochlear pilots voice-to-text Salesforce integration for lead management
LOG IN
SUBSCRIBE
NEWS
GOVERNMENT
SECURITY
AI
DIGITAL NATION
RESOURCES
PODCAST
EVENTS
ADVERTISE
Search
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
Tech Partner Views
BENCHMARK AWARDS
NEWS
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
GOVERNMENT
SECURITY
AI
DIGITAL NATION
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
RESOURCES
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
Tech Partner Views
PODCAST
EVENTS
BENCHMARK AWARDS
ADVERTISE
Log In
Email:
Password:
Remember me
|
Forgot password?
Don't have an account? Register now!
Home
Blogs
Blogs
Foiling hackers with a virtual perimeter
[Blog post] Security defined perimeters show promise.
Juha Saarinen
Oct 8 2014 11:20AM
Security
ANZ, Deakin to feed Watson a lean diet
[Blog post] Why IBM will need to bring the service to Australia.
Brett Winterford
Oct 8 2014 11:08AM
Software
Could machine learning replace the CIO function?
[Blog post] A far out tech that isn’t so far off.
David Gee
Oct 7 2014 12:36PM
Strategy
IT security: a top five priority for the CIO
[Blog Post] How do you manage security programs without a CSO?
David Gee
Oct 1 2014 11:15AM
Strategy
A tick symbol for tech
Risk management through regulation.
Juha Saarinen
Oct 1 2014 10:06AM
Security
The ethics of security
[Blog post] Where did that zero-day go?
Juha Saarinen
Sep 23 2014 2:31PM
Security
Time management tips for CIOs
[Blog post] How to get to the genba.
David Gee
Sep 22 2014 6:24AM
Strategy
Making a case for collaboration
[Blog post] Tap into your company’s people power.
Jeff Jacobs
Sep 18 2014 6:27AM
Strategy
There's no coke and hookers in the cloud
[Blog post] Where did the love go?
Brett Winterford
Sep 17 2014 6:23AM
Software
How hard do you hack back?
[Blog post] Taking the offensive could have unintended consequences.
Juha Saarinen
Sep 16 2014 2:39PM
Security
Tracking the year of CIO churn
[Blog post] Who shone through in 12 months of disruption?
Brett Winterford
,
Penny Wolf
Sep 11 2014 1:01PM
Strategy
Unravelling Apple’s mobile Pay play
[Blog post] Why is the time right for NFC, but not iBeacon?
Brett Winterford
Sep 10 2014 12:10PM
Software
What to say when things go wrong
[Blog post] Is crisis comms part of your disaster recovery plan?
Juha Saarinen
Sep 9 2014 11:07AM
Security
iTnews Benchmark Awards now open
[Blog post] Time to start preparing your submissions.
Brett Winterford
Sep 8 2014 12:09PM
Strategy
Want an Internet of Things? Fix the internet first
[Blog post] What if the physical world inherits the bugs of the virtual one?
Anthony May
Sep 3 2014 9:30AM
Hardware
Will the new iPhone break the hearts of bankers?
[Blog post] Could spell the death of tags and sleeves.
Brett Winterford
Sep 2 2014 3:43PM
Software
Hacking scandal threatens to upend NZ election
[Blog post] Rawshark keeps country on edge.
Juha Saarinen
Sep 2 2014 2:09PM
Security
Who'd have picked a BlackBerry for the Internet of Things?
[Blog] BlackBerry has a more secure future in the physical world.
Steve Wilson
Aug 26 2014 2:37PM
Security
The [digital] natives are restless
[Blog post] And not interested in what you and I call a 'career'.
v f
Aug 22 2014 2:30PM
Strategy
Clear-text must die
[Blog Post] Network injection makes encryption mandatory.
Juha Saarinen
Aug 19 2014 3:26PM
Security
Previous
Next
Most popular tech stories
Audit Office of NSW and Data61 explore AI for gov auditing
Accenture to train 30,000 staff on Anthropic's Claude
Cochlear pilots voice-to-text Salesforce integration for lead management
Virgin Australia, Wesfarmers strike OpenAI agreements
CBA finds its first chief AI officer
HamiltonJet partners with digital services provider Fortude
SentinelOne signs distribution agreement with Sektor
Rapid7’s new SIEM combines exposure management with threat detection
The techpartner.news podcast, episode 3: Why security consultancy founder Kat McCrabb started with the hard stuff
Bluechip Infotech enters final stage of Goodson Imports acquisition
Blackberry celebrates "giant step forward"
'Touch-free' smartphone controlled with head movements
Photos: Australian industry explores data for net zero
Axis Communications opens experience centre in Sydney tech hub
Photos: The 2024 IoT Awards winners
Log In
Don't have an account? Register now!
Email:
Password:
Remember me
|
Forgot your password?