Latest News
Suntory Oceania’s $30 million IT transformation powers carbon-neutral multi beverage facility
Defence to bring on trainee software engineers from Microsoft-supported program
Qantas builds digital and AI centre in Adelaide
Telstra, Optus, TPG build new list of devices causing trouble for triple zero
State of HR Tech 2025
LOG IN
SUBSCRIBE
NEWS
GOVERNMENT
SECURITY
AI
DIGITAL NATION
RESOURCES
PODCAST
EVENTS
ADVERTISE
Search
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
Tech Partner Views
Tech Data IT Summit
Data&AI Breakfast
SECURITY AWARDS
DIGITAL NATION AWARDS
BENCHMARK AWARDS
Digital As Usual
NEWS
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
GOVERNMENT
SECURITY
AI
DIGITAL NATION
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
RESOURCES
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
Tech Partner Views
PODCAST
EVENTS
Tech Data IT Summit
Data&AI Breakfast
SECURITY AWARDS
DIGITAL NATION AWARDS
BENCHMARK AWARDS
Digital As Usual
ADVERTISE
Log In
Email:
Password:
Remember me
|
Forgot password?
Don't have an account? Register now!
Home
Features
Features
Centrally Managed Network Security: Hope or Reality?
Ask any IT professional to predict the future of computer networking and you will get different answers.
Dan Thomsen
Jan 15 2004 11:40AM
Security
Rules or Signatures?
As the industry increasingly moves towards the adoption of new preventative security products, an interesting debate has arisen as a consequence.
Iain Franklin
Jan 15 2004 11:38AM
Security
Making Sense of “Homeland Security”
As the Homeland Security Act makes its way through the United States Congress, the topic of homeland security has become a relevant discussion in the information security marketplace.
Dan Taylor
Jan 15 2004 11:27AM
Security
Intrusion Detection: Let’s Make Some Real Progress, Today!
It would be nice if most intrusions were detected, but they are not.
Brad C.
Jan 15 2004 11:26AM
Security
Secure Computing - Blended Viruses: A New Era in Anti-Virus Protection
We live in a new era of blended threats, worm viruses and a host of new breeds of malicious mobile code that are more dangerous than ever.
Dean Coza
Jan 15 2004 11:22AM
Security
Real-World IT Security - The Social Engineering Perils of Commuting
The morning commute from my suburban town of residence to London, where I presently work, and back is an opportunity to catch up on some reading and the news.
Stuart King
Jan 15 2004 11:16AM
Security
Dedication is what you need?
In an ideal world, every company would have a dedicated recovery center to ensure information availability 24/7/365. It is the ultimate defense against unforeseen circumstances impacting on critical business functions.
Andrew Waterston
Jan 15 2004 11:14AM
Security
Smart ID Cards to Protect Citizen Privacy
Secure identification of individuals within a country’s population is a fundamental and critical function for any population’s economic and moral well-being.
Bruno Lassus
Jan 15 2004 11:12AM
Security
It Could Never Happen to Us…
Simply by operating on a day-to-day basis, companies are risking their reputations.
Graham Peat
Jan 15 2004 11:11AM
Security
Super! Ultra! Jumbo! Privacy as the New Multi-Purpose Word
I am becoming more convinced that there are way too many interpretations of the word “privacy.”
Melisa LaBancz-Bleasdale
Jan 15 2004 11:10AM
Security
Trusted Information Awareness - Another Name for Domestic Spying?
Co-incident with the news about the formation of the U.S. Department of Homeland Defense is the breaking of a story about a Defense Advanced Research Projects Agency (DARPA) ‘research project’ exploring the viability of sifting through huge amounts of transaction data looking for possible terrorist activities.
Bob Lonadier
Jan 15 2004 10:57AM
Security
Redefining Email Security Policies
Corporations the world over are beginning to see email in a whole new light: not just as a revolutionary business tool, but also as a major potential liability if not controlled.
Tanya Candia
Jan 15 2004 10:55AM
Security
Securing and Managing Electronic Messaging in the Enterprise
The threats and problems posed by email in large and complex organizations are of a different type and scale of magnitude from the email problems that such organizations first solved with an email ‘point product’ some years previously.
Staff Writers
Jan 15 2004 10:53AM
Security
White Hat v. Black Hat
Stereotyping is very dangerous in investigations, particularly in the field of information security.
Interpol European
Jan 15 2004 10:51AM
Security
For Your Eyes Only - Maximizing Security in a Closed Environment
Fingerprint, retinal or even voice identification have traditionally existed only in James Bond-style blockbuster movies.
Jackie Groves
Jan 15 2004 10:48AM
Security
PKI - Why Go Through the Hassle?
As email increasingly substitutes for the use of letters and faxes, even in government departments, and as commercial transactions on the web get more and more important, the need for secure communications grows.
Guy Vancollie
Jan 15 2004 10:46AM
Security
Businesses Should Not Fear Teleworking Security Issues
In November 2002 SonicWALL published the results of an independent survey into the attitudes of British businesses towards teleworking and the steps most commonly taken to ensure home workers connect to the office securely.
Harry Gostling
Jan 15 2004 10:42AM
Security
Networks Risk Grounding Without Airport-Level Security
It is one of the old security adages that the nature of the threats to networks are ever-changing.
Nigel Hawthorn
Jan 15 2004 10:40AM
Security
Network vulnerabilities
Basic network security issues have changed very little over the past decade.
Peter Crowcombe
Jan 15 2004 10:23AM
Security
Security Issues for Remote IT Delivery
Colin Wells, chairman of JBS Computer Services, examines what SMEs should look for from suppliers when choosing the remote route for software delivery
Colin Wells
Jan 15 2004 10:17AM
Security
Previous
Next
Most popular tech stories
Endeavour Group taps Qantas, Catch execs in digital leadership shake-up
Kmart Group tests AI in its finance operations
ABC drops Salesforce for Braze
HCF chases near real-time intelligence on members' digital experience
Qantas builds digital and AI centre in Adelaide
HamiltonJet partners with digital services provider Fortude
SentinelOne signs distribution agreement with Sektor
Rapid7’s new SIEM combines exposure management with threat detection
The techpartner.news podcast, episode 3: Why security consultancy founder Kat McCrabb started with the hard stuff
Bluechip Infotech enters final stage of Goodson Imports acquisition
Blackberry celebrates "giant step forward"
Govt launches consumer tech label program for smart devices
'Touch-free' smartphone controlled with head movements
Perth IoT vendor Digital Matter names new chief executive
Real-time information comes to Sydney bus stops
Log In
Don't have an account? Register now!
Email:
Password:
Remember me
|
Forgot your password?