Latest News
Superloop to buy rival Lynham for $165 million
Coalition names shadow comms, digital and cyber ministers
Macquarie brings agentic SRE to its digital bank
Russian official acknowledges Starlink systems down for two weeks
US Supreme Court adopts new technology to help identify conflicts of interest
LOG IN
SUBSCRIBE
NEWS
GOVERNMENT
SECURITY
AI
DIGITAL NATION
RESOURCES
PODCAST
EVENTS
ADVERTISE
Search
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
Tech Partner Views
Cloud Covered
Executive Retreat
BENCHMARK AWARDS
NEWS
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
GOVERNMENT
SECURITY
AI
DIGITAL NATION
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
RESOURCES
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
Tech Partner Views
PODCAST
EVENTS
Cloud Covered
Executive Retreat
BENCHMARK AWARDS
ADVERTISE
Log In
Email:
Password:
Remember me
|
Forgot password?
Don't have an account? Register now!
Home
Features
Features
How to clean up after Sumitomo Mitsui
When the truth finally comes out about the attempted theft of £220 million from Sumitomo Mitsui Bank in March, it's likely to have all the hallmarks of an inside job – certainly that the crime relied on having people on the inside to carry it out.
Ron Condon
May 13 2005 5:39PM
Security
Debate: Educating users is a waste of time – firms would be wiser to spend more on technology
Robert Schifreen
May 13 2005 5:35PM
Security
2 MINUTES ON… Indexing good behaviour
René Millman
May 13 2005 5:29PM
Security
Me and my job
Staff Writers
May 13 2005 5:23PM
Security
An institute is the next step
The industry needs a body to set and monitor standards and ensure the fitness of its practitioners
Prof. Fred
May 13 2005 5:18PM
Security
Blogs are not always bad news
Nick Barron,
May 13 2005 5:12PM
Security
To act, first you must learn to see
David Lacey,
May 13 2005 5:06PM
Security
Reading a different script
Hacking client-side scripting is a doddle, but it needn’t be a security hole, says Gunter Ollmann
Gunter Ollmann
May 13 2005 4:59PM
Security
Antivirus champion
When F-Secure’s Mikko Hypponen comes to town, people listen. David Quainton talks to the malware guru about the future of antivirus
David Quainton
May 13 2005 4:06PM
Security
Answering back
How good are government departments at IT security? David Quainton tried to use the
Freedom of Information Act
to get the facts and figures
David Quainton
May 13 2005 3:12PM
Security
Industry and the state must reconnect
Security professionals in IT seem to be disheartened by federal officials on several fronts. This is the running theme across a couple of our features this month.
Illena Armstrong
May 13 2005 12:37PM
Security
Debate: Two-factor authentication access control will not prevent fraud and identity theft
Bruce Schneier
May 13 2005 12:26PM
Security
2 MINUTES ON… DNS cache poisoning
Marcia Savage
May 13 2005 12:22PM
Security
Me and my job
Staff Writers
May 13 2005 12:16PM
Security
Make friends to win influence
The role of the CISO must be folded into the organization’s business lines
Marci McCarthy
,
May 13 2005 11:58AM
Security
Risk is the one constant
Peter Stephenson
,CeRNS,
May 13 2005 11:56AM
Security
Cut cybercriminals off at the pass
Sergio Pinon
,
May 13 2005 11:51AM
Security
Failure must be a part of the plan
The trick is to acknowledge the danger and plan for the inevitable, as former White House advisor Richard Clarke tells Illena Armstrong
Illena Armstrong
May 12 2005 5:26PM
Security
This is your early warning system
Pen testing and vulnerability assessments are essentials. But how often and when these checks are made varies from one company to the next, as Marcia Savage found out
Marcia Savage
May 12 2005 4:56PM
Security
You can’t stop IM so learn to love it
Instant messaging is the future, says Jim Carr, and there is a world of possibility waiting out there. But there is risk as well as benefit, and it must be faced
Jim Carr
May 12 2005 4:36PM
Security
Previous
Next
Most popular tech stories
Wesfarmers to deploy agentic AI groupwide
Service NSW launches Digital ID pilot
AMP deploys over 400 AI agents across organisation
ABC drops Salesforce for Braze
ASIC's most senior tech leader to leave in May
HamiltonJet partners with digital services provider Fortude
SentinelOne signs distribution agreement with Sektor
Rapid7’s new SIEM combines exposure management with threat detection
The techpartner.news podcast, episode 3: Why security consultancy founder Kat McCrabb started with the hard stuff
Bluechip Infotech enters final stage of Goodson Imports acquisition
Blackberry celebrates "giant step forward"
Telstra Purple acquires IoT specialists Alliance Automation, Aqura Technologies
'Touch-free' smartphone controlled with head movements
Photos: Australian industry explores data for net zero
Photos: The 2024 IoT Awards winners
Log In
Don't have an account? Register now!
Email:
Password:
Remember me
|
Forgot your password?