Latest News
Hack at UnitedHealth's tech unit impacted 192.7 million people
ATO considers AI coding assistance for 800 core developers
Suncorp deploys Duck Creek at AAMI
"BitUnlocker" full-volume encryption bypass found by Microsoft researchers
Orro: Hyper connected consumers drive intelligent network investments
LOG IN
SUBSCRIBE
NEWS
GOVERNMENT
SECURITY
AI
DIGITAL NATION
RESOURCES
PODCAST
EVENTS
ADVERTISE
Search
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
Data&AI Breakfast
SECURITY AWARDS
DIGITAL NATION AWARDS
BENCHMARK AWARDS
Digital As Usual
NEWS
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
GOVERNMENT
SECURITY
AI
DIGITAL NATION
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
RESOURCES
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
PODCAST
EVENTS
Data&AI Breakfast
SECURITY AWARDS
DIGITAL NATION AWARDS
BENCHMARK AWARDS
Digital As Usual
ADVERTISE
Log In
Email:
Password:
Remember me
|
Forgot password?
Don't have an account? Register now!
Home
Blogs
Blogs
An operating system on end of life is ripe for attack
[Blog post] Windows Server 2003 users could be in a world of hurt.
Tony Campbell
May 26 2015 2:10PM
Security
Could infosec give Australia a competitive advantage?
[Blog post] Review hears cyber security is an economic enabler.
Tony Campbell
May 19 2015 2:05PM
Security
Beware of gamed research
[Blog post] Chinese security vendors fudge results.
Tony Campbell
May 12 2015 1:05PM
Security
Why the Govt can't simply go opt-out for e-health
[Blog post] Security, privacy safeguards not up to scratch.
Steve Wilson
May 11 2015 12:39PM
Security
Six things CIOs can learn from bikram yoga
The yogi’s guide to business transformation.
David Gee
May 8 2015 12:16PM
Strategy
Don’t let big data get you into big trouble
[Blog post] Think before you download unsigned, unauthenticated code.
Juha Saarinen
May 5 2015 2:32PM
Security
Clever design can save you money on cloud interconnect
[Blog post] Data charges for complex clouds add up.
Justin Warren
May 5 2015 6:16AM
Strategy
Security is doomed
[Blog post] It’s official – (ISC)2 says so.
Tony Campbell
Apr 28 2015 2:20PM
Security
Acquiring your digital DNA
[Blog post] Is your digital transformation just window dressing?
William Confalonieri
Apr 24 2015 6:36AM
Strategy
Know what will leak before the breach
[Blog post] Your archival policy could be a line of defence.
Juha Saarinen
Apr 22 2015 2:29PM
Security
CIOs need to build their machine learning strategy today
[Blog post] Practical tips to begin.
Jeff Jacobs
Apr 17 2015 11:46AM
Strategy
The clock ticks for Abbott's cyber review
[Blog post] Comms Alliance weighs in.
Tony Campbell
Apr 14 2015 2:02PM
Security
Questioning the effectiveness of sanctions
[Blog post] Attack attribution and motive are key.
Tony Campbell
Apr 7 2015 2:57PM
Security
China weaponises its internet
[Blog post] Latest escalation of threat posture is bad news indeed.
Juha Saarinen
Mar 31 2015 1:21PM
Security
Are passwords becoming passe?
[Blog post] One step forward, two steps back.
Tony Campbell
Mar 24 2015 2:30PM
Security
The value of a joined-up approach
[Blog post] STIX and stones.
Tony Campbell
Mar 17 2015 2:09PM
Security
Pointing the finger at digital forensics
[Blog post] Cross examining the expert witness.
Tony Campbell
Mar 10 2015 2:26PM
Security
Eating digital soup with a fork
[Blog post] Are you really ready for digital disruption?
William Confalonieri
Mar 10 2015 11:57AM
Strategy
Recognising the toughest job in enterprise security
[Blog post] Introducing the Secure Computing Benchmark Awards.
Juha Saarinen
Mar 3 2015 3:55PM
Security
Transformation for SMARTIES
[Blog post] Steps to avoid being a dummy.
David Gee
Feb 27 2015 11:54AM
Strategy
Previous
Next
Most popular tech stories
CBA's leaders are keeping a close watch on AI metrics
Coles Group to test agentic AI on staff leave booking
NBN Co weaves AI and automation into its operational "fabric"
OVIC sets limits on GenAI tool use in external meetings
Guzman y Gomez continues to deploy Workday as core people platform
HamiltonJet partners with digital services provider Fortude
SentinelOne signs distribution agreement with Sektor
Rapid7’s new SIEM combines exposure management with threat detection
The techpartner.news podcast, episode 3: Why security consultancy founder Kat McCrabb started with the hard stuff
Bluechip Infotech enters final stage of Goodson Imports acquisition
ParKam's smart parking project at Curtin University will be a world-first
Blackberry celebrates "giant step forward"
Photos: Australian industry explores data for net zero
How Jemena uses IoT to push the boundaries of customer innovation in the gas sector
Govt launches consumer tech label program for smart devices
Log In
Don't have an account? Register now!
Email:
Password:
Remember me
|
Forgot your password?