Latest News
Defence to bring on trainee software engineers from Microsoft-supported program
Qantas builds digital and AI centre in Adelaide
Telstra, Optus, TPG build new list of devices causing trouble for triple zero
State of HR Tech 2025
State of HR Tech 2025: Workplace
LOG IN
SUBSCRIBE
NEWS
GOVERNMENT
SECURITY
AI
DIGITAL NATION
RESOURCES
PODCAST
EVENTS
ADVERTISE
Search
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
Tech Partner Views
Tech Data IT Summit
Data&AI Breakfast
SECURITY AWARDS
DIGITAL NATION AWARDS
BENCHMARK AWARDS
Digital As Usual
NEWS
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
GOVERNMENT
SECURITY
AI
DIGITAL NATION
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
RESOURCES
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
Tech Partner Views
PODCAST
EVENTS
Tech Data IT Summit
Data&AI Breakfast
SECURITY AWARDS
DIGITAL NATION AWARDS
BENCHMARK AWARDS
Digital As Usual
ADVERTISE
Log In
Email:
Password:
Remember me
|
Forgot password?
Don't have an account? Register now!
Home
Features
Features
Very Unique Product Will Transform Your Life!
My hype-meter has been jumping in recent weeks, illuminating a rocky road for the security market that will produce some corporate casualties in the near future.
Jon Tullett
Jan 16 2004 10:15AM
Security
Communications Security in the 21st Century
We are all aware that the ‘electronic age’ in which we exist is in reality an increasingly complex combination of interacting applications.
Staff Writers
Jan 16 2004 10:14AM
Security
(ISC)²’s Common Body of Knowledge and the HIPAA Security and Privacy Rules
It is no surprise that the security rules of the U.S. 1996 Health Portability and Accountability Act (HIPAA) appear closely modeled after existing generally accepted information security best practices.
Micki Krause
Jan 16 2004 10:13AM
Security
Take Back Your Security Infrastructure
Imagine you work for one of those companies where information security is taken seriously, senior management support is for granted, the appropriate IT defenses are deployed and users are educated on the security policy.
Anton Chuvakin
Jan 16 2004 10:08AM
Security
Chasing Infosec Budgets and the Loch Ness Monster
Trying to get an accurate, unbiased reading of today’s Internet security arena is like trying to get a non-fuzzy, close-up and genuine photograph of the Loch Ness Monster.
Illena Armstrong
Jan 16 2004 10:07AM
Security
Security Training - The Essentials
The Four Basics
Peter Curran
Jan 16 2004 10:04AM
Security
Smart Move
Over the last few years, corporate facilities management has started to come of age.
Nigel Hope
Jan 16 2004 10:01AM
Security
The Privacy of Data in Motion
The recent draft on employee monitoring, released earlier this year by the U.K. Information Commissioner, has caused a stir among employees and employers.
Staff Writers
Jan 16 2004 10:00AM
Security
SECURITY CAMERA Propagating Viruses - Who Me?
My last opinion piece (Winning the Virus War - But When? July 31, www.infosecnews.com/opinion/2002/07/31_01.htm) resulted in some (positive) responses, for which I’m grateful.
Jayne Parkhouse
Jan 16 2004 9:58AM
Security
Open File Solutions: Optimization for ‘Now’
It’s no secret that in today’s information age, data integrity and redundancy are critical success factors for businesses.
April Nelson
Jan 16 2004 9:57AM
Security
For Mid-Sized Organizations, High Security Can Be Low Cost
In a tight economy, it’s easy to believe that postponing investments is fiscally responsible.
Steve Schlesinger
Jan 16 2004 9:55AM
Security
Self Help for the Invincible
I was listening to a lively debate the other day on the radio.
Adam Holder
Jan 16 2004 9:54AM
Security
Taking a Realistic Approach to Remote Authentication
Just under a decade ago, I was asked to write a white paper on the future of telecommunications and networking for a major telecom company who shall remain nameless.
Steve Gold
Jan 16 2004 9:53AM
Security
Is Every Crime Becoming a Cybercrime?
At first glance, it seems obvious that crime extends well beyond the boundaries of technology and computers.
Thresa Lang
Jan 16 2004 9:52AM
Security
Securing the Network Edge
In the evolution of communications networks, the lines between computing and networking have become less than clear.
Dan Taylor
Jan 16 2004 9:49AM
Security
Mobile Security: New Needs on New Devices
As personal digital assistants become more powerful and merge with wireless technology, new means are necessary to ensure the security of such devices as well as the enterprise network they are participating in.
Richard Aufreiter
Jan 16 2004 9:47AM
Security
The Art of War
It’s not uncommon to hear wisdom such as “if an attacker has physical access to a PC, you’ve lost the battle,” or, “if a Trojan makes it past the defenses, it’s all over.”
Jon Tullett
Jan 16 2004 9:44AM
Security
Fire and Brimstone in 21st Century Security
It is increasingly disturbing to me that individuals of a certain prominence use their vexing ability to understand complex computations to scare the living heck out of the rest of us humble folks.
Melisa LaBancz-Bleasdale
Jan 15 2004 3:07PM
Security
Expect the Unexpected
It's hard to believe that it's been a year since the Code Red worm was making its way across the globe.
Robert Lonadier
Jan 15 2004 3:06PM
Security
ROI Strategies for Reducing Risk
The current state of application security practice is grim.
Bob Ayers
Jan 15 2004 3:04PM
Security
Previous
Next
Most popular tech stories
Endeavour Group taps Qantas, Catch execs in digital leadership shake-up
Kmart Group tests AI in its finance operations
ABC drops Salesforce for Braze
HCF chases near real-time intelligence on members' digital experience
Qantas builds digital and AI centre in Adelaide
HamiltonJet partners with digital services provider Fortude
SentinelOne signs distribution agreement with Sektor
Rapid7’s new SIEM combines exposure management with threat detection
The techpartner.news podcast, episode 3: Why security consultancy founder Kat McCrabb started with the hard stuff
Bluechip Infotech enters final stage of Goodson Imports acquisition
Blackberry celebrates "giant step forward"
Govt launches consumer tech label program for smart devices
'Touch-free' smartphone controlled with head movements
Telstra Purple acquires IoT specialists Alliance Automation, Aqura Technologies
Perth IoT vendor Digital Matter names new chief executive
Log In
Don't have an account? Register now!
Email:
Password:
Remember me
|
Forgot your password?