Latest News
TPG Telecom reports triple zero death linked to Samsung handset
Netflix leaves NBN Co wary about AI network impact
RBA to overhaul source-to-pay
UK Twitter hacker ordered to repay $8.3 million in Bitcoin
DTA: 'APS digital workforce needs to double by 2030'
LOG IN
SUBSCRIBE
NEWS
GOVERNMENT
SECURITY
AI
DIGITAL NATION
RESOURCES
PODCAST
EVENTS
ADVERTISE
Search
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
Tech Partner Views
Tech Data IT Summit
Data&AI Breakfast
SECURITY AWARDS
DIGITAL NATION AWARDS
BENCHMARK AWARDS
Digital As Usual
NEWS
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
GOVERNMENT
SECURITY
AI
DIGITAL NATION
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
RESOURCES
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
Tech Partner Views
PODCAST
EVENTS
Tech Data IT Summit
Data&AI Breakfast
SECURITY AWARDS
DIGITAL NATION AWARDS
BENCHMARK AWARDS
Digital As Usual
ADVERTISE
Log In
Email:
Password:
Remember me
|
Forgot password?
Don't have an account? Register now!
Home
Features
Features
Is Cyberterrorism a Serious Threat to Commercial Organizations?
This article appeared in a very abbreviated form in SC Magazine’s January 2003 issue and is presented here in full.
David Love
Jan 12 2004 2:46PM
Security
Communicating the Language of Information Security
“When I use a word,” Humpty Dumpty said, in a rather scornful tone, “it means just what I choose it to mean - neither more nor less.” Lewis Carroll, Through the Looking Glass
Dan Houser
Jan 12 2004 2:43PM
Security
Securing Online Payments
From the early days of the internet, credit and charge card companies recognized the enormous opportunities presented to them - but they also saw challenges ahead.
Richard Moulds
Jan 12 2004 2:38PM
Security
Crying Wolf on Cyberterrorism?
Terrorism (n): the systematic use of violence as a means to intimidate or coerce societies or governments.
Jon Tullett
Jan 12 2004 2:35PM
Security
Making Life Easier: Top 12 Things CSOs Need to Keep in Mind
1. Keep up with the latest technology -- the bad guys do!
Philip Conrod
Jan 12 2004 2:26PM
Security
Aligning IT Security with Business Needs
In any technology decision, having the IT and business aspects of the organization on the same side is critical to identifying the best solutions and addressing key needs.
Linda Hughes
Jan 12 2004 2:24PM
Security
Microsoft and the Return of PKI
Many businesses have written off public key infrastructure (PKI) as a dead technology.
Robert Lonadier
Jan 12 2004 2:21PM
Security
The Good and the Bad for Selecting Security Measures
The most important function IT security managers perform is the selection of IT security measures.
Robert V.
Jan 12 2004 2:20PM
Security
The Danger Inside Your Firewall
Who cares if British Gas customers can see each other’s invoice details?
Mark Altman
Jan 12 2004 2:17PM
Security
Unrealistic Pricing Degrades U.K. Business Security
U.K. business security is under attack.
Matt Tomlinson
Jan 12 2004 2:12PM
Security
Automated Vulnerability Assessment: How to Underpin Your Security Investment
Many organizations are now relying upon the vital support that vulnerability assessment can offer as the fourth pillar of security.
Amer Deeba
Jan 12 2004 2:10PM
Security
Highly Evolved?
The Organization for Economic Co-Operation and Development (OECD) notes in its 2002 guidelines for the security of information systems and networks that the technology environment has undergone dramatic change over the last decade.
Jack Clark
Jan 12 2004 2:08PM
Security
Waking Up to Reality: Security and Handheld Computing Devices
Handheld computing devices, like Palms and Pocket PCs, play an essential role in many people’s lives.
Dick Mackey
Jan 12 2004 2:04PM
Security
Securing a Complex Communications Environment: Ten Top Tips
The growth of e-security products and services is creating an administrative headache for enterprises.
Staff Writers
Jan 12 2004 2:00PM
Security
Change Management: What If it All Goes Wrong?
The U.K.’s Swanwick Air Traffic Control center is an unfortunate example of the problems that can occur with the continuity of a business while undergoing a period of change.
Staff Writers
Jan 12 2004 1:54PM
Security
The Five Critical Stages of Policy Management
A series of recent bloody court battles, well-documented in the press, have highlighted the importance of clear policies governing the use of an organization’s information systems.
Nathan Millard
Jan 12 2004 1:43PM
Security
Future Challenges in Pervasive Computing Environments
What is the pervasive computing paradigm?
Sadie Creese
Jan 12 2004 1:37PM
Security
Preventing Fraud Online: Digital Fingerprinting of PCs
Fraud is a serious problem in today’s online world.
Diana Kelley
Jan 12 2004 1:33PM
Security
Hints and Tips on Securing your Mobile Workforce
So you have a mobile workforce, you have invested in laptops, PDAs, mobiles and smartphones and your staff are out there chasing and winning business.
Kurt Lennartsson
Jan 12 2004 1:30PM
Security
On the Offensive over Identity Theft
Catch Me If You Can isn’t just a hit at the movies this winter.
Jeff Drake
Jan 12 2004 1:28PM
Security
Previous
Next
Most popular tech stories
Endeavour Group taps Qantas, Catch execs in digital leadership shake-up
Kmart Group tests AI in its finance operations
ABC drops Salesforce for Braze
HCF chases near real-time intelligence on members' digital experience
Qantas builds digital and AI centre in Adelaide
HamiltonJet partners with digital services provider Fortude
SentinelOne signs distribution agreement with Sektor
Rapid7’s new SIEM combines exposure management with threat detection
The techpartner.news podcast, episode 3: Why security consultancy founder Kat McCrabb started with the hard stuff
Bluechip Infotech enters final stage of Goodson Imports acquisition
Blackberry celebrates "giant step forward"
Govt launches consumer tech label program for smart devices
'Touch-free' smartphone controlled with head movements
Perth IoT vendor Digital Matter names new chief executive
Axis Communications opens experience centre in Sydney tech hub
Log In
Don't have an account? Register now!
Email:
Password:
Remember me
|
Forgot your password?