Latest News
Why WA organisations are rethinking cloud strategy in 2026
US plans online portal to bypass content bans in Europe and elsewhere
Microsoft says it does not think US ICE uses firm's tech for mass surveillance of civilians
Fair Work Commission bogged down by AI filings
Qantas changes its tech leadership
LOG IN
SUBSCRIBE
NEWS
GOVERNMENT
SECURITY
AI
DIGITAL NATION
RESOURCES
PODCAST
EVENTS
ADVERTISE
Search
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
Tech Partner Views
Cloud Covered
Executive Retreat
BENCHMARK AWARDS
NEWS
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
GOVERNMENT
SECURITY
AI
DIGITAL NATION
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
RESOURCES
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
Tech Partner Views
PODCAST
EVENTS
Cloud Covered
Executive Retreat
BENCHMARK AWARDS
ADVERTISE
Log In
Email:
Password:
Remember me
|
Forgot password?
Don't have an account? Register now!
Home
Features
Features
How to Ensure Complete Web Transaction Privacy - Even After Your Data is Stored
Most forward-looking companies today leverage the internet as their primary business communications tool linking employees, customers, partners, and suppliers.
Franklyn Jones
Jan 12 2004 11:18AM
Security
Times Get Tough
How often have you played the ‘scruples game’ amongst your friends, to question how much they would they rob a bank for - £5 million, £10 million, £25 million?
Magnus Ahlberg
Jan 12 2004 11:16AM
Security
Nameless in Cyberspace: Protecting Online Privacy
Generally, that well-practiced tango between anonymity and disclosure goes on smoothly in the real world.
Arvind Krishna
Jan 12 2004 11:13AM
Security
Identity Management Case Example
A large food and general merchandise wholesaler in the United States had a strategic vision based on strengthening its relationships with the market’s largest retailers, and increasing its vertical penetration through the acquisition of niche channel wholesalers.
Jim Burns
Jan 12 2004 11:10AM
Security
How to Buy Security
Reviewing a security strategy is a major undertaking that will test a wide range of skills far beyond IT competencies.
Iain Franklin
Jan 12 2004 11:06AM
Security
Managing the Security of Data Flow
Customer relationship management (CRM) systems are cited as one of the major technology successes of the last decade.
Diane Seddon
Jan 12 2004 11:04AM
Security
Data-Secure Hard Drives?
All of a company’s technical assets will hold some amount of proprietary data, and it is a legal requirement that companies dispose of that data permanently before the asset is sold on from the company.
Kevin Riches
Jan 12 2004 11:02AM
Security
Web-Based Games: Playing to Lose
One common way of attracting visitors to a web site is to make it look attractive by incorporating animated graphics and interactive features written in Java, Flash and other common browser plug-in programs.
Steve Lord
Jan 12 2004 10:47AM
Security
The New Age of e-Commerce
Three billion dollars.
Bob Lonadier
Jan 12 2004 10:43AM
Security
Time to Own Up to Email Management
Here’s a question: how many non-work related emails do you send and receive every day from your office email address?
Staff Writers
Jan 12 2004 10:41AM
Security
Protecting Wireless LAN Access with Smartcard SIMs
The wireless LAN market is a niche market set to gain greater momentum.
Jerome Nadel
Jan 12 2004 10:39AM
Security
Are Remote Users Your Security Blind Spot?
More people than ever before are working from home - and it is no wonder.
Carole Theriault
Jan 12 2004 10:32AM
Security
Consolidation in the Security Solution Marketplace - How to be a Winner
Many industry experts say that the e-security market is heading towards consolidation, and that ultimately only a few dozen big vendors and niche players could remain worldwide.
Martin Gagen
Jan 12 2004 10:30AM
Security
Lock Up Your Data
With the growth in volume and sophistication of internal and external threats, information security is one of the most critical issues facing companies today.
Stu Vaeth
Jan 12 2004 10:27AM
Security
Touching a Raw Nerve: Medical Privacy Policy
Not surprisingly, the Bush Administration’s recent ‘final ruling’ on medical information privacy did not satisfy everyone.
Elizabeth J.
Jan 12 2004 10:26AM
Security
Selecting the Right PKI - Know What to Ask For
When companies search for a public key infrastructure (PKI) solution, most develop and distribute a ‘request for proposal’ to evaluate and select a particular vendor and product.
Kevin LeBlanc
Jan 12 2004 10:23AM
Security
For Your Eyes Only: Securing Sensitive Data from Rogue Staff
Defining what constitutes intellectual property can lead to differences of opinion.
Vanessa Chandrasekaran
Jan 12 2004 10:21AM
Security
Business Continuity: Planning for Many Levels
For a business continuity plan to be truly effective at the time of interruption or disaster, everyone within the company needs to pull together to make the plan work and turn interruption into continuation.
Robin Gaddum
Jan 12 2004 10:19AM
Security
Certification, Education and Experience
How well does certification demonstrate ability? As an information security instructor, I am often asked this question, particularly when it is raised in the media.
Lee Imrey
Jan 12 2004 10:17AM
Security
Business Continuity and Risk Management: Distant Cousins or Partners in Crime?
In a post 9/11 environment, the terms business continuity and risk management are becoming common parlance within a wide range organizations.
Dave Birch
Jan 12 2004 10:13AM
Security
Previous
Next
Most popular tech stories
Wesfarmers to deploy agentic AI groupwide
ABC drops Salesforce for Braze
Australia Post launches non-tradeable cryptostamps
Fair Work Commission bogged down by AI filings
Westpac Intelligence Layer breaks cover
HamiltonJet partners with digital services provider Fortude
SentinelOne signs distribution agreement with Sektor
Rapid7’s new SIEM combines exposure management with threat detection
The techpartner.news podcast, episode 3: Why security consultancy founder Kat McCrabb started with the hard stuff
Bluechip Infotech enters final stage of Goodson Imports acquisition
Blackberry celebrates "giant step forward"
'Touch-free' smartphone controlled with head movements
Telstra Purple acquires IoT specialists Alliance Automation, Aqura Technologies
Photos: Australian industry explores data for net zero
Photos: The 2024 IoT Awards winners
Log In
Don't have an account? Register now!
Email:
Password:
Remember me
|
Forgot your password?