Latest News
Why WA organisations are rethinking cloud strategy in 2026
US plans online portal to bypass content bans in Europe and elsewhere
Microsoft says it does not think US ICE uses firm's tech for mass surveillance of civilians
Fair Work Commission bogged down by AI filings
Qantas changes its tech leadership
LOG IN
SUBSCRIBE
NEWS
GOVERNMENT
SECURITY
AI
DIGITAL NATION
RESOURCES
PODCAST
EVENTS
ADVERTISE
Search
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
Tech Partner Views
Cloud Covered
Executive Retreat
BENCHMARK AWARDS
NEWS
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
GOVERNMENT
SECURITY
AI
DIGITAL NATION
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
RESOURCES
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
Tech Partner Views
PODCAST
EVENTS
Cloud Covered
Executive Retreat
BENCHMARK AWARDS
ADVERTISE
Log In
Email:
Password:
Remember me
|
Forgot password?
Don't have an account? Register now!
Home
Features
Features
Safe E-commerce?
E-commerce has always striven to be one of the driving forces behind internet use.
Fernando de
Jan 12 2004 2:53PM
Security
Breaking the Security Logjam
Log files are an important security resource containing a wealth of information.
Mark Searle
Jan 12 2004 2:51PM
Security
Is Cyberterrorism a Serious Threat to Commercial Organizations?
This article appeared in a very abbreviated form in SC Magazine’s January 2003 issue and is presented here in full.
David Love
Jan 12 2004 2:46PM
Security
Communicating the Language of Information Security
“When I use a word,” Humpty Dumpty said, in a rather scornful tone, “it means just what I choose it to mean - neither more nor less.” Lewis Carroll, Through the Looking Glass
Dan Houser
Jan 12 2004 2:43PM
Security
Securing Online Payments
From the early days of the internet, credit and charge card companies recognized the enormous opportunities presented to them - but they also saw challenges ahead.
Richard Moulds
Jan 12 2004 2:38PM
Security
Crying Wolf on Cyberterrorism?
Terrorism (n): the systematic use of violence as a means to intimidate or coerce societies or governments.
Jon Tullett
Jan 12 2004 2:35PM
Security
Making Life Easier: Top 12 Things CSOs Need to Keep in Mind
1. Keep up with the latest technology -- the bad guys do!
Philip Conrod
Jan 12 2004 2:26PM
Security
Aligning IT Security with Business Needs
In any technology decision, having the IT and business aspects of the organization on the same side is critical to identifying the best solutions and addressing key needs.
Linda Hughes
Jan 12 2004 2:24PM
Security
Microsoft and the Return of PKI
Many businesses have written off public key infrastructure (PKI) as a dead technology.
Robert Lonadier
Jan 12 2004 2:21PM
Security
The Good and the Bad for Selecting Security Measures
The most important function IT security managers perform is the selection of IT security measures.
Robert V.
Jan 12 2004 2:20PM
Security
The Danger Inside Your Firewall
Who cares if British Gas customers can see each other’s invoice details?
Mark Altman
Jan 12 2004 2:17PM
Security
Unrealistic Pricing Degrades U.K. Business Security
U.K. business security is under attack.
Matt Tomlinson
Jan 12 2004 2:12PM
Security
Automated Vulnerability Assessment: How to Underpin Your Security Investment
Many organizations are now relying upon the vital support that vulnerability assessment can offer as the fourth pillar of security.
Amer Deeba
Jan 12 2004 2:10PM
Security
Highly Evolved?
The Organization for Economic Co-Operation and Development (OECD) notes in its 2002 guidelines for the security of information systems and networks that the technology environment has undergone dramatic change over the last decade.
Jack Clark
Jan 12 2004 2:08PM
Security
Waking Up to Reality: Security and Handheld Computing Devices
Handheld computing devices, like Palms and Pocket PCs, play an essential role in many people’s lives.
Dick Mackey
Jan 12 2004 2:04PM
Security
Securing a Complex Communications Environment: Ten Top Tips
The growth of e-security products and services is creating an administrative headache for enterprises.
Staff Writers
Jan 12 2004 2:00PM
Security
Change Management: What If it All Goes Wrong?
The U.K.’s Swanwick Air Traffic Control center is an unfortunate example of the problems that can occur with the continuity of a business while undergoing a period of change.
Staff Writers
Jan 12 2004 1:54PM
Security
The Five Critical Stages of Policy Management
A series of recent bloody court battles, well-documented in the press, have highlighted the importance of clear policies governing the use of an organization’s information systems.
Nathan Millard
Jan 12 2004 1:43PM
Security
Future Challenges in Pervasive Computing Environments
What is the pervasive computing paradigm?
Sadie Creese
Jan 12 2004 1:37PM
Security
Preventing Fraud Online: Digital Fingerprinting of PCs
Fraud is a serious problem in today’s online world.
Diana Kelley
Jan 12 2004 1:33PM
Security
Previous
Next
Most popular tech stories
Wesfarmers to deploy agentic AI groupwide
ABC drops Salesforce for Braze
Australia Post launches non-tradeable cryptostamps
Fair Work Commission bogged down by AI filings
Westpac Intelligence Layer breaks cover
HamiltonJet partners with digital services provider Fortude
SentinelOne signs distribution agreement with Sektor
Rapid7’s new SIEM combines exposure management with threat detection
The techpartner.news podcast, episode 3: Why security consultancy founder Kat McCrabb started with the hard stuff
Bluechip Infotech enters final stage of Goodson Imports acquisition
Blackberry celebrates "giant step forward"
'Touch-free' smartphone controlled with head movements
Telstra Purple acquires IoT specialists Alliance Automation, Aqura Technologies
Photos: Australian industry explores data for net zero
Photos: The 2024 IoT Awards winners
Log In
Don't have an account? Register now!
Email:
Password:
Remember me
|
Forgot your password?