Latest News
Concerns over Westpac Unite as tech chiefs depart
Wesfarmers to deploy agentic AI groupwide
Sydney Metro quietly abandoned M1 5G network hopes
Pentagon pushing AI companies to expand on classified networks
Fibre now the "dominant" tech in NBN Co's network mix
LOG IN
SUBSCRIBE
NEWS
GOVERNMENT
SECURITY
AI
DIGITAL NATION
RESOURCES
PODCAST
EVENTS
ADVERTISE
Search
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
Tech Partner Views
Cloud Covered
Executive Retreat
BENCHMARK AWARDS
NEWS
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
GOVERNMENT
SECURITY
AI
DIGITAL NATION
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
RESOURCES
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
Tech Partner Views
PODCAST
EVENTS
Cloud Covered
Executive Retreat
BENCHMARK AWARDS
ADVERTISE
Log In
Email:
Password:
Remember me
|
Forgot password?
Don't have an account? Register now!
Home
Features
Features
JavaScript hijacking - a new vulnerability
A new vulnerability, termed JavaScript hijacking, was recently identified that specifically affects the rich, interactive interfaces typically associated with Ajax and Web 2.0 applications.
Jacob West,
Sep 13 2007 7:19AM
Security
How the IT department can prep for the courtroom
There has been a steady increase in corporate litigation over the past decade, and those legal proceedings are having an unforeseen impact on IT managers. This trend has been accelerated by the recent changes in the Federal Rules of Civil Procedure (FRCP).
Greg Lawn,
Sep 12 2007 3:39PM
Security
Hot or not: The Forum of Incident Response and Security Teams (FIRST) unveils updated common vulnerability scoring system
The new scoring system promises to make it easier for security managers and the IT industry to better measure the real-world risks associated with software flaws.
Amol Sarwate,
Sep 11 2007 3:03PM
Security
Weighing the options for securing back-up data
With the looming threats of publicly exposed personal data breaches, mishandled confidential partner information and lost intellectual property assets, an increasing number of enterprises are investigating options for securing data stored on both tape- and disk-based media.
Greg Farris,
Sep 10 2007 3:03PM
Security
How many errors are OK?
Intel's latest processor has triggered a debate about the reliability of hardware. Where do you stand?
Nick Barron,
Sep 4 2007 1:07PM
Security
Network administrator: Between a rock and a hard place
As a Network or Systems Administrator, you must feel lately that you're between a rock and a hard place.
Staff Writers
Sep 3 2007 7:33AM
Security
Let’s recognise the value of lifetime skills
It doesn't make sense to have technology experts driving taxis.
Sheryle Moon
Sep 1 2007 4:40PM
Training & Development
Corporations must protect data wherever it goes
When it comes to data security, enterprises have historically taken a "stop them at the gates" approach, similar to the purchase of a home security system.
Cliff Pollan,
Aug 31 2007 10:43AM
Security
A lesson from the PCI
A benchmark that provides a checklist to tell you if your security meets requirements is just what we need.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol
Aug 30 2007 1:57PM
Security
Global trends point to rise in messaging abuse
"It's the economy, stupid." It worked for spammers now, and it will work for spammers in the future.
Dave Champine,
Aug 29 2007 11:06AM
Security
Market your security competencies
Historically, IT security has been a business cost centre.
Jay Barbour,
Aug 28 2007 9:21AM
Security
Review: AppDetective
AppDetective primarily looks for security holes inside of a number of popular database servers. The user interface makes it easy to determine which steps of the scan should be performed next.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol
Aug 27 2007 1:57PM
Security
Anatomy of a data breach from the inside out
It's a sunny day somewhere thousands of miles away from your data centre. A savvy hacker sits in front of his monitor.
Prat Moghe,
Aug 22 2007 7:53AM
Security
Copiers are also a compliance issue
To properly discuss security issues related to multi-function peripheral (MFPs) - devices that copy, print, scan and fax - it's helpful to first have some background on the underlying technology in the machines that have raised so much concern as a possible data security risk.
Chris Bilello,
Aug 21 2007 9:18AM
Security
Review: Source Code Analysis Suite
The Fortify offering is a software-based solution which is also a CASE (computer aided software engineering) utility.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol
Aug 20 2007 8:00AM
Security
Managing outbound email security threats
When the subject of email security is mentioned, the first thought that comes to mind is "spam" or more appropriately "anti-spam."
Carsten Dietrich,
Aug 17 2007 11:17AM
Security
The battle for e-commerce: Convenience vs. security
The convenience of doing business on the web has embedded itself into consumers' everyday routines to the point where the ability to quickly complete a multitude of tasks online has come to be expected.
Andy Rolfe,
Aug 16 2007 12:16PM
Security
The advent of Access Management 2.0
Everyone loves milestone birthdays and this year - depending on who you believe - web access management (WAM) turns ten. Or 11. Or maybe it's 12. Kids grow up so fast.
Eric Leach
Aug 15 2007 7:46AM
Security
Review: UTM-1 2050
The Checkpoint UTM-1 appliance features the standard UTM capabilities, such as firewall, IPS, anti-virus and anti-spyware.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol
Aug 15 2007 7:43AM
Security
Review: eToken TMS
The Aladdin eToken TMS (Token Management System) is software-based and includes the ability to use two-factor authentication, as well as digital signature using the Aladdin tokens.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol
Aug 14 2007 8:56AM
Security
Previous
Next
Most popular tech stories
Wesfarmers to deploy agentic AI groupwide
Service NSW launches Digital ID pilot
AMP deploys over 400 AI agents across organisation
ABC drops Salesforce for Braze
ANZ deploys Agentforce to supercharge new CRM system
HamiltonJet partners with digital services provider Fortude
SentinelOne signs distribution agreement with Sektor
Rapid7’s new SIEM combines exposure management with threat detection
The techpartner.news podcast, episode 3: Why security consultancy founder Kat McCrabb started with the hard stuff
Bluechip Infotech enters final stage of Goodson Imports acquisition
Blackberry celebrates "giant step forward"
Telstra Purple acquires IoT specialists Alliance Automation, Aqura Technologies
'Touch-free' smartphone controlled with head movements
Photos: Australian industry explores data for net zero
Photos: The 2024 IoT Awards winners
Log In
Don't have an account? Register now!
Email:
Password:
Remember me
|
Forgot your password?