Latest News
Why WA organisations are rethinking cloud strategy in 2026
US plans online portal to bypass content bans in Europe and elsewhere
Microsoft says it does not think US ICE uses firm's tech for mass surveillance of civilians
Fair Work Commission bogged down by AI filings
Qantas changes its tech leadership
LOG IN
SUBSCRIBE
NEWS
GOVERNMENT
SECURITY
AI
DIGITAL NATION
RESOURCES
PODCAST
EVENTS
ADVERTISE
Search
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
Tech Partner Views
Cloud Covered
Executive Retreat
BENCHMARK AWARDS
NEWS
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
GOVERNMENT
SECURITY
AI
DIGITAL NATION
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
RESOURCES
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
Tech Partner Views
PODCAST
EVENTS
Cloud Covered
Executive Retreat
BENCHMARK AWARDS
ADVERTISE
Log In
Email:
Password:
Remember me
|
Forgot password?
Don't have an account? Register now!
Home
Features
Features
Monitoring Security from the Inside Out: Intrusion Detection at the Configuration Level
Today’s intrusion detection (ID) technology is, for the most part, network-centric.
Andy Evans
Jan 15 2004 11:45AM
Security
Of Votes and Cyberspace
With the mid-term elections come and gone, it’s time for the Bush Administration to re-focus its attention on protecting cyberspace.
Bob Lonadier
Jan 15 2004 11:41AM
Security
Centrally Managed Network Security: Hope or Reality?
Ask any IT professional to predict the future of computer networking and you will get different answers.
Dan Thomsen
Jan 15 2004 11:40AM
Security
Rules or Signatures?
As the industry increasingly moves towards the adoption of new preventative security products, an interesting debate has arisen as a consequence.
Iain Franklin
Jan 15 2004 11:38AM
Security
Making Sense of “Homeland Security”
As the Homeland Security Act makes its way through the United States Congress, the topic of homeland security has become a relevant discussion in the information security marketplace.
Dan Taylor
Jan 15 2004 11:27AM
Security
Intrusion Detection: Let’s Make Some Real Progress, Today!
It would be nice if most intrusions were detected, but they are not.
Brad C.
Jan 15 2004 11:26AM
Security
Secure Computing - Blended Viruses: A New Era in Anti-Virus Protection
We live in a new era of blended threats, worm viruses and a host of new breeds of malicious mobile code that are more dangerous than ever.
Dean Coza
Jan 15 2004 11:22AM
Security
Real-World IT Security - The Social Engineering Perils of Commuting
The morning commute from my suburban town of residence to London, where I presently work, and back is an opportunity to catch up on some reading and the news.
Stuart King
Jan 15 2004 11:16AM
Security
Dedication is what you need?
In an ideal world, every company would have a dedicated recovery center to ensure information availability 24/7/365. It is the ultimate defense against unforeseen circumstances impacting on critical business functions.
Andrew Waterston
Jan 15 2004 11:14AM
Security
Smart ID Cards to Protect Citizen Privacy
Secure identification of individuals within a country’s population is a fundamental and critical function for any population’s economic and moral well-being.
Bruno Lassus
Jan 15 2004 11:12AM
Security
It Could Never Happen to Us…
Simply by operating on a day-to-day basis, companies are risking their reputations.
Graham Peat
Jan 15 2004 11:11AM
Security
Super! Ultra! Jumbo! Privacy as the New Multi-Purpose Word
I am becoming more convinced that there are way too many interpretations of the word “privacy.”
Melisa LaBancz-Bleasdale
Jan 15 2004 11:10AM
Security
Trusted Information Awareness - Another Name for Domestic Spying?
Co-incident with the news about the formation of the U.S. Department of Homeland Defense is the breaking of a story about a Defense Advanced Research Projects Agency (DARPA) ‘research project’ exploring the viability of sifting through huge amounts of transaction data looking for possible terrorist activities.
Bob Lonadier
Jan 15 2004 10:57AM
Security
Redefining Email Security Policies
Corporations the world over are beginning to see email in a whole new light: not just as a revolutionary business tool, but also as a major potential liability if not controlled.
Tanya Candia
Jan 15 2004 10:55AM
Security
Securing and Managing Electronic Messaging in the Enterprise
The threats and problems posed by email in large and complex organizations are of a different type and scale of magnitude from the email problems that such organizations first solved with an email ‘point product’ some years previously.
Staff Writers
Jan 15 2004 10:53AM
Security
White Hat v. Black Hat
Stereotyping is very dangerous in investigations, particularly in the field of information security.
Interpol European
Jan 15 2004 10:51AM
Security
For Your Eyes Only - Maximizing Security in a Closed Environment
Fingerprint, retinal or even voice identification have traditionally existed only in James Bond-style blockbuster movies.
Jackie Groves
Jan 15 2004 10:48AM
Security
PKI - Why Go Through the Hassle?
As email increasingly substitutes for the use of letters and faxes, even in government departments, and as commercial transactions on the web get more and more important, the need for secure communications grows.
Guy Vancollie
Jan 15 2004 10:46AM
Security
Businesses Should Not Fear Teleworking Security Issues
In November 2002 SonicWALL published the results of an independent survey into the attitudes of British businesses towards teleworking and the steps most commonly taken to ensure home workers connect to the office securely.
Harry Gostling
Jan 15 2004 10:42AM
Security
Networks Risk Grounding Without Airport-Level Security
It is one of the old security adages that the nature of the threats to networks are ever-changing.
Nigel Hawthorn
Jan 15 2004 10:40AM
Security
Previous
Next
Most popular tech stories
Wesfarmers to deploy agentic AI groupwide
ABC drops Salesforce for Braze
Australia Post launches non-tradeable cryptostamps
AMP deploys over 400 AI agents across organisation
Westpac Intelligence Layer breaks cover
HamiltonJet partners with digital services provider Fortude
SentinelOne signs distribution agreement with Sektor
Rapid7’s new SIEM combines exposure management with threat detection
The techpartner.news podcast, episode 3: Why security consultancy founder Kat McCrabb started with the hard stuff
Bluechip Infotech enters final stage of Goodson Imports acquisition
Blackberry celebrates "giant step forward"
'Touch-free' smartphone controlled with head movements
Telstra Purple acquires IoT specialists Alliance Automation, Aqura Technologies
Photos: Australian industry explores data for net zero
Photos: The 2024 IoT Awards winners
Log In
Don't have an account? Register now!
Email:
Password:
Remember me
|
Forgot your password?