Latest News
Defence to bring on trainee software engineers from Microsoft-supported program
Qantas builds digital and AI centre in Adelaide
Telstra, Optus, TPG build new list of devices causing trouble for triple zero
State of HR Tech 2025
State of HR Tech 2025: Workplace
LOG IN
SUBSCRIBE
NEWS
GOVERNMENT
SECURITY
AI
DIGITAL NATION
RESOURCES
PODCAST
EVENTS
ADVERTISE
Search
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
Tech Partner Views
Tech Data IT Summit
Data&AI Breakfast
SECURITY AWARDS
DIGITAL NATION AWARDS
BENCHMARK AWARDS
Digital As Usual
NEWS
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
GOVERNMENT
SECURITY
AI
DIGITAL NATION
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
RESOURCES
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
Tech Partner Views
PODCAST
EVENTS
Tech Data IT Summit
Data&AI Breakfast
SECURITY AWARDS
DIGITAL NATION AWARDS
BENCHMARK AWARDS
Digital As Usual
ADVERTISE
Log In
Email:
Password:
Remember me
|
Forgot password?
Don't have an account? Register now!
Home
Features
Features
Before a Fall
A breaking up of old habits typically happens with a characteristic slowness.
Illena Armstrong
Jan 15 2004 3:02PM
Security
Interpol Tracks Information and Communication Technology Crime
“IT crime constitutes an ‘enormous’ threat to our society!”
Interpol European
Jan 15 2004 2:42PM
Security
Addressing the Internet’s ‘Human Factor’
Since the late 1980s, corporations have invested heavily in network and information systems technology to create network-based applications that can be used by employees, partners and clients regardless of their physical location.
Malcolm Rieke
Jan 15 2004 2:40PM
Security
Lessons Learned in Global IDS Deployment
Intrusion detection systems (IDS) have been the subject of endless articles, conferences, and discussions.
Jason Reed
Jan 15 2004 2:38PM
Security
SECURITY CAMERA: Who Said Crime Doesn’t Pay?
I was sitting thinking about some of the crazy sayings people have, some of which are true, such as, “Never put your eggs in one basket” or “A stitch in time saves nine.”
Jayne Parkhouse
Jan 15 2004 2:35PM
Security
Lessons of the Honeypot II: Expect the Unexpected
Observation and monitoring of computer intruders have long been performed in a haphazard fashion, if at all.
Anton Chuvakin
Jan 15 2004 2:31PM
Security
Coping with ISP failure
The general malaise and recession in the telecommunications sector seems to claim new victims every month.
Tony Anscombe
Jan 15 2004 2:29PM
Security
Computer Seizures
Recently, a patron was purchasing a pair of sunglasses at a shopping mall kiosk.
Alan B.
Jan 15 2004 2:27PM
Security
PINs, Signatures and Countering Fraud
Trotting through the shiny new airport terminal in Brussels recently, I was surprised to be asked to verify my credit card purchases in the duty-free shop with a PIN instead of a signature.
Steve Gold
Jan 15 2004 2:25PM
Security
Where In the World Did I Put That File?
As I get older each minute, my short-term memory doesn't seem to remember a lot about yesterday, much less last month.
Jack Wiles
Jan 15 2004 2:14PM
Security
Money Alone Won't Solve Network Security Issues
The combination of terrorism fears and high-profile virus, worm and denial-of-service attacks, along with ongoing break-in revelations, has given new urgency to network and application security issues.
Taher Elgamal
Jan 15 2004 2:12PM
Security
Why Application Security is the New Threat
As the use and exploitation of the Internet matures, so does its need for security.
Dan Cuthbert
Jan 15 2004 2:10PM
Security
Fighting the Good Fight
A couple of weeks ago I had the opportunity to sit in on a class on computer forensics, courtesy of Guidance Software.
Jon Tullett
Jan 15 2004 2:07PM
Security
Business Issues Relating to the Patriot Act
Since its passage in October last year, everyone (in the U.S. at least) has heard of the Patriot Act (USAPA). It is 342 pages of reform extending the powers of international intelligence agencies and law enforcement organizations.
Thresa Lang
Jan 15 2004 1:55PM
Security
Planning for a disaster is half the work - Can you recover?
Increasingly, companies are implementing business continuity plans to ensure the constant availability and support of the company infrastructure and business processes.
Phil Carter
Jan 15 2004 1:43PM
Security
Protecting Documents and Data Shouldn’t Stop at the Server
There are two types of companies.
Bob Brennan
Jan 15 2004 1:38PM
Security
There’s no escaping the dentist and cyber planning
Infosecurity is kind of like visiting the dentist: we all know we have to do it, but we seem to put it off for as long as humanly possible.
Illena Armstrong
Jan 15 2004 1:36PM
Security
Roller-Coaster MSS Industry: An Update
For those participants and investors in the managed security services (MSS) space, the last two years has seemed more like two lifetimes.
Sean Jackson
Jan 15 2004 1:31PM
Security
Managed Security Service Providers Are Dead - Long Live MSSPs
Managed security services providers (MSSPs) are dead.
Robert Lonadier
Jan 15 2004 1:29PM
Security
Do It Yourself Security: Cutting Our Umbilical Dependence on the Consultant Community
A long while ago I had a business card identity that branded me as a Security Export Consultant.
Melisa LaBancz-Bleasdale
Jan 15 2004 1:26PM
Security
Previous
Next
Most popular tech stories
Endeavour Group taps Qantas, Catch execs in digital leadership shake-up
Kmart Group tests AI in its finance operations
ABC drops Salesforce for Braze
HCF chases near real-time intelligence on members' digital experience
Qantas builds digital and AI centre in Adelaide
HamiltonJet partners with digital services provider Fortude
SentinelOne signs distribution agreement with Sektor
Rapid7’s new SIEM combines exposure management with threat detection
The techpartner.news podcast, episode 3: Why security consultancy founder Kat McCrabb started with the hard stuff
Bluechip Infotech enters final stage of Goodson Imports acquisition
Blackberry celebrates "giant step forward"
Govt launches consumer tech label program for smart devices
'Touch-free' smartphone controlled with head movements
Perth IoT vendor Digital Matter names new chief executive
Real-time information comes to Sydney bus stops
Log In
Don't have an account? Register now!
Email:
Password:
Remember me
|
Forgot your password?