Latest News
Orro: Hyper connected consumers drive intelligent network investments
Coles Group to test agentic AI on staff leave booking
Telstra sells 75 percent Versent stake to Infosys for $233m
US embeds trackers in AI chip shipments
Microsoft fixes "BadSuccessor" zero-day authentication bug
LOG IN
SUBSCRIBE
NEWS
GOVERNMENT
SECURITY
AI
DIGITAL NATION
RESOURCES
PODCAST
EVENTS
ADVERTISE
Search
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
Data&AI Breakfast
SECURITY AWARDS
DIGITAL NATION AWARDS
BENCHMARK AWARDS
Digital As Usual
NEWS
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
GOVERNMENT
SECURITY
AI
DIGITAL NATION
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
RESOURCES
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
PODCAST
EVENTS
Data&AI Breakfast
SECURITY AWARDS
DIGITAL NATION AWARDS
BENCHMARK AWARDS
Digital As Usual
ADVERTISE
Log In
Email:
Password:
Remember me
|
Forgot password?
Don't have an account? Register now!
Home
Blogs
Blogs
What could Microsoft's data sovereignty fight mean for Australia?
Would a 'yes' ruling require new ASD cloud guidelines?
Allie Coyne
Sep 11 2015 1:53PM
Software
Bridging Australia's infosec skills gap
[Blog post] High noon for local IT security students.
Tony Campbell
Sep 8 2015 2:45PM
Security
Hacking the hacking problem
[Blog post] Putting kids in prison for internet crimes isn't working.
Juha Saarinen
Sep 1 2015 2:50PM
Security
Life is short. Shorter if your affair data lands in enemy hands
[Blog post] Full impact of Ashley Madison hack still to come.
Tony Campbell
Aug 25 2015 2:25PM
Security
Security research: Obama’s new Prohibition
[Blog post] Let's learn from past mistakes.
Tony Campbell
Aug 18 2015 2:30PM
Security
iTnews Benchmark Awards 2016 are now open
[Blog post] The search for Australia's next CIO of the year begins.
Penny Wolf
Aug 13 2015 6:31AM
Strategy
Fingerprints: the new frontier for hackers
[Blog post] Biometrics easy pickings for Android hackers.
Tony Campbell
Aug 11 2015 2:20PM
Security
Know where your traffic actually goes
[Blog post] Plan on dealing with BGP hijacks.
Juha Saarinen
Aug 4 2015 2:30PM
Security
The danger of infosec ignorance in IoT
[Blog post] Jeep hack demonstrates problems with new market.
Tony Campbell
Jul 28 2015 2:30PM
Security
When Australia's telco sector says enough is enough
[Blog post] Don't poke the bear.
Allie Coyne
Jul 28 2015 11:59AM
Software
Security trumps comfort when it comes to old software
[Blog post] Taking the leap isn't always popular, but it's important.
Tony Campbell
Jul 21 2015 2:30PM
Security
Starved of funding, resources, OAIC is left to shrivel
[Blog post] Pilgrim becomes one-stop interim shop.
Allie Coyne
Jul 17 2015 7:00AM
Software
Symantec's Morpho misstep
[Blog post] What's in a name?
Tony Campbell
Jul 14 2015 2:00PM
Security
When spyware merchants get hacked
Hacking Team attack points to bad business practices all round.
Juha Saarinen
Jul 7 2015 2:30PM
Security
How vulnerable is air travel to cyber attack?
[Blog post] Airways NZ and Poland's LOT expose weak spots.
Tony Campbell
Jun 30 2015 2:16PM
Security
Last post for LastPass?
[Blog post] Weighing up risk versus convenience.
Tony Campbell
Jun 23 2015 3:00PM
Security
SaaS password managers are a self-contradictory absurdity
[Blog post] Don't be so careless with your online keys.
Anthony May
Jun 17 2015 10:35AM
Hardware
Einstein alone can't keep you safe from cyber attack
[Blog post] Brains plus brawn necessary for protection.
Tony Campbell
Jun 16 2015 2:40PM
Security
Security is no reason to avoid cloud services
[Blog post] Is owning and operating really any safer?
Tony Campbell
Jun 9 2015 2:12PM
Security
Don’t be doomed to repeat the past
[Blog post] Open standards help with past mistakes.
Juha Saarinen
Jun 2 2015 2:30PM
Security
Previous
Next
Most popular tech stories
NBN Co weaves AI and automation into its operational "fabric"
CBA's leaders are keeping a close watch on AI metrics
Coles Group to test agentic AI on staff leave booking
OVIC sets limits on GenAI tool use in external meetings
Guzman y Gomez continues to deploy Workday as core people platform
HamiltonJet partners with digital services provider Fortude
SentinelOne signs distribution agreement with Sektor
Rapid7’s new SIEM combines exposure management with threat detection
The techpartner.news podcast, episode 3: Why security consultancy founder Kat McCrabb started with the hard stuff
Bluechip Infotech enters final stage of Goodson Imports acquisition
ParKam's smart parking project at Curtin University will be a world-first
Blackberry celebrates "giant step forward"
Photos: Australian industry explores data for net zero
Govt launches consumer tech label program for smart devices
Axis Communications opens experience centre in Sydney tech hub
Log In
Don't have an account? Register now!
Email:
Password:
Remember me
|
Forgot your password?