Latest News
Researchers poke further holes in TETRA encrypted wireless comms
"Shade BIOS" stealth malware hides below operating system
NBN Co weaves AI and automation into its operational "fabric"
ATO trials multimodal AI models for auditing work-related expenses
Serious path traversal bug found in Microsoft's NLWeb "Agentic Web" tool
LOG IN
SUBSCRIBE
NEWS
GOVERNMENT
SECURITY
AI
DIGITAL NATION
RESOURCES
PODCAST
EVENTS
ADVERTISE
Search
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
Data&AI Breakfast
SECURITY AWARDS
DIGITAL NATION AWARDS
BENCHMARK AWARDS
Digital As Usual
NEWS
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
GOVERNMENT
SECURITY
AI
DIGITAL NATION
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
RESOURCES
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
PODCAST
EVENTS
Data&AI Breakfast
SECURITY AWARDS
DIGITAL NATION AWARDS
BENCHMARK AWARDS
Digital As Usual
ADVERTISE
Log In
Email:
Password:
Remember me
|
Forgot password?
Don't have an account? Register now!
Home
Features
Features
Promoted Content
Security through visibility: supporting Essential Eight cyber mitigation strategies
How can you secure what you cannot see?
Ariane Paguia, Riverbed
May 3 2022 11:40AM
Promoted Content
Promoted Content
Tick off the ransomware bandits
Using a checklist to reappraise your security.
Barracuda
Apr 29 2022 4:54PM
Promoted Content
Promoted Content
How a 'micro data centre' enables your business, your way
Australian decision-makers reassess location of compute infrastructure and workloads.
Rittal
Apr 26 2022 12:40PM
Promoted Content
Promoted Content
Vast majority of surveyed firms still rely on password authentication
Despite well-documented security risks.
Okta
Apr 26 2022 10:44AM
Promoted Content
Partner Content
Promoted Content
Adobe Workfront delivers compelling gains for CMOs
Marketing system of record.
Adobe
Apr 13 2022 12:23PM
Partner Content
Promoted Content
Top 5 Benefits of Managed IT Services
When you're setting up a company, the technology considerations that will be required to operate it typically take a back seat. Few people initially think about managed IT services.
Nicholas Ross
Apr 12 2022 1:49PM
Strategy
Promoted Content
Getting your hybrid right, from the edge to cloud
Considering the best fit for each workload.
Equinix
Apr 11 2022 4:47PM
Promoted Content
Promoted Content
Harnessing the power of omnichannel communications
Listen to our interview with Twilio’s principal Developer Evangelist Phil Nash.
Staff Writer
Apr 11 2022 4:24PM
Promoted Content
Promoted Content
How organisations are using 'customisable messaging' to bridge distances
Improving connections between patients and healthcare providers, and students and educators.
Twilio
Apr 11 2022 4:00PM
Promoted Content
Promoted Content
Responsible Technology, Sustainable Future: How technology will help companies become carbon neutral by 2030
Learn how and why Alibaba will become carbon neutral by 2030.
Alibaba
Apr 4 2022 12:13PM
Promoted Content
Promoted Content
Ransomware attacks drive ZTNA adoption: learning from those who learned the hard way
Ransomware victims are adopting ZTNA at a much higher rate, reports Sophos.
Aaron Bugal, Global Solutions Engineer, Sophos
Mar 30 2022 1:11PM
Promoted Content
Partner Content
How La Trobe University re-platformed for a data-driven future
Work with KPMG underpins ten-year digital strategy.
Brad Howarth
Mar 29 2022 2:39PM
Partner Content
Promoted Content
Coca-Cola steps closer to becoming the world's most digitised bottling operation with CyberArk
Australian, Pacific and Indonesian operation (CCEP API) rolls out CyberArk Privileged Access Manager Self-Hosted.
CyberArk
Mar 29 2022 2:11PM
Promoted Content
Promoted Content
Most critical infrastructure operators likely won't meet coming security obligations, predicts Claroty
Many will struggle to develop a functional risk management program, according to the cyber-physical systems firm.
Claroty
Mar 15 2022 5:00AM
Promoted Content
Promoted Content
How Seagate bolstered Aerometrex's data storage
Just one of its projects generated 300 terabytes of raw data.
Seagate
Mar 8 2022 2:37PM
Promoted Content
Promoted Content
Why your business's high-performance computing future may not be in the cloud
Businesses turning to high-density data centres.
Interactive
Mar 8 2022 1:20PM
Promoted Content
Promoted Content
Service SA and Service Tas select Knosys knowledge management solution
Cloud solution to support high-volume contact and service centres.
Knosys
Mar 7 2022 12:06PM
Promoted Content
Promoted Content
3 ways companies are getting more from intelligent automation
Simple steps to improve employee experience and speed up business.
Michael Evans, Vice President ANZ at Pegasystems
Mar 2 2022 11:39AM
Promoted Content
Promoted Content
How a leading Australian hydraulics provider streamlined its move to SaaS
Cross Hydraulics streamlined and secured data flows between six offices.
Barracuda
Mar 1 2022 11:13AM
Promoted Content
Promoted Content
MinterEllison is using low-code to save lawyers thousands of hours of work
Expects to save 42,000 hours of legal teams' time.
MinterEllison
Feb 28 2022 12:20PM
Promoted Content
Previous
Next
Most popular tech stories
Guzman y Gomez continues to deploy Workday as core people platform
OVIC sets limits on GenAI tool use in external meetings
Bunnings pilots AI for its 55,000-strong workforce
NBN Co weaves AI and automation into its operational "fabric"
CBA AI 'voice bot' deployment linked to review of 45 roles
HamiltonJet partners with digital services provider Fortude
SentinelOne signs distribution agreement with Sektor
Rapid7’s new SIEM combines exposure management with threat detection
The techpartner.news podcast, episode 3: Why security consultancy founder Kat McCrabb started with the hard stuff
Bluechip Infotech enters final stage of Goodson Imports acquisition
ParKam's smart parking project at Curtin University will be a world-first
Blackberry celebrates "giant step forward"
Govt launches consumer tech label program for smart devices
Photos: Australian industry explores data for net zero
Photos: IoT Impact 2023 brings together data-enabled productivity, sustainability and trust opportunities
Log In
Don't have an account? Register now!
Email:
Password:
Remember me
|
Forgot your password?