Latest News
CBA looks to AI for workforce planning
PsiQuantum to build computer at Moreton Bay
US to invest in IBM, other quantum computing firms
Singtel open to selling "meaningful minority stake" in Optus
Fears of unfettered hacking spurred by Anthropic's Mythos AI model likely 'overstated'
LOG IN
SUBSCRIBE
NEWS
GOVERNMENT
SECURITY
AI
DIGITAL NATION
RESOURCES
PODCAST
EVENTS
ADVERTISE
Search
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
State of Security 2026
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
Tech Partner Views
iTnews TV
Cloud Covered
Security Breakfast
Executive Retreat
NEWS
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
GOVERNMENT
SECURITY
AI
DIGITAL NATION
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
RESOURCES
State of Security 2026
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
Tech Partner Views
iTnews TV
PODCAST
EVENTS
Cloud Covered
Security Breakfast
Executive Retreat
ADVERTISE
Log In
Email:
Password:
Remember me
|
Forgot password?
Don't have an account? Register now!
Home
Features
Features
Review: MXI Security Stealth Key M700 Bio
More than just a USB flash drive with a fingerprint reader.
Peter Stephenson
Mar 7 2011 11:26AM
Security
Swinging the gavel in the 21st century
Cybercrime is a matter of national interest but legal eagles need to understand the new rules and tools.
Nigel Phair
Mar 2 2011 4:45PM
Security
Review: Core Security Technologies Core Impact Professional
Not a cheap penetration testing tool, but given its performance it can be excellent value.
Peter Stephenson
Mar 2 2011 4:17PM
Security
Review: CounterSnipe APS v4.0.3
A combination of intrusion prevention software, host/application discovery, vulnerability detection and intelligent alert management.
Michael Lipinski
Mar 2 2011 3:52PM
Security
Exclusive: Trend Micro aims for cloud top spot
Trend founder reveals to her four-point plan for domination.
Negar Salek
Mar 2 2011 12:04PM
Security
Review: Panasonic Toughbook CF-C1
Ultra-durable laptop/tablet hybrid reviewed.
John Gillooly
Mar 1 2011 12:51PM
Hardware
Review: Samsung Omnia 7
Big, bulky and beams brilliantly.
Jonathan Bray
Feb 25 2011 12:00PM
Hardware
Review: MacBook Air 11-inch
Apple's ultraportable squeezes just enough power and longevity from the skinniest of chassis.
David Bayon
Feb 24 2011 4:28PM
Hardware
Review: Dell Inspiron M101z
Pint-sized beauty combines great build, good looks and a keen price.
Sasha Muller
Feb 7 2011 10:40AM
Hardware
Review: Asus Lamborghini VX6 notebook
Fast and furious 12.1 inch notebook
Zara Baxter
Feb 2 2011 4:37PM
Hardware
Review: HTC's HD7 with Windows Phone 7
Software sets the HD7 apart from the year-old HD2.
Staff Writers
Jan 24 2011 3:11PM
Hardware
Review: Google Nexus S
Read the verdict on the Google Nexus S - the first Android 2.3 smartphone.
Jonathan Bray
Dec 31 2010 8:17AM
Hardware
Why you should automate your next IT security audit
By implementing a solution that automates the auditing process, IT security professionals can be freed up to perform more valuable tasks says NetIQ's Patrick Eijkenboom.
Staff Writers
Dec 15 2010 11:09AM
Security
Time for SMBs to look at SANs
SMBs need to avoid getting lost in complex solutions and look at storage area networks for their security, according to Huawei Symantec's Scott Tam.
Scott Tam
Oct 26 2010 9:43AM
Security
Protecting data against modern threats
Comprehensive data security is multi-faceted, addresses the entire flow of data, and must consider various factors requiring simple and unified management, according to Websense's Adam Bradley.
Sep 24 2010 5:07PM
Security
Review: RIM BlackBerry Pearl 3G 9105, super-slim smartphone
Aimed successfully at a younger audience, but also with strong enterprise credentials.
Paul Ockenden
Sep 22 2010 7:24AM
Hardware
Close encounters with ancient history
West Coast Labs' Lysa Myers says that you can't create a filter to screen out human gullibility.
Lysa Myers
Sep 16 2010 10:11AM
Security
How to avoid flaws in identity management
IT managers need a secure and cost-effective approach to identity and access management, as NetIQ's David Bell explains.
David Bell
Sep 13 2010 4:57PM
Security
Review: iPhone 4
A new design and super-sharp display, but is Apple's new smartphone good enough to pick up where the 3GS left off?
Jonathan Bray
Sep 9 2010 8:17AM
Hardware
Coping with insider fraud
Attachmate's Colin Barnetson looks at the growing risk of insider fraud, and outlines the steps businesses can take to prevent it occurring in their operations.
Staff Writers
Sep 1 2010 5:08PM
Security
Previous
Next
Most popular tech stories
Rio Tinto brings automation, Copilot to its finance function
ABC drops Salesforce for Braze
AustralianSuper hires its first head of AI and automation
Chemist Warehouse's AI tool for HR becoming a "standard pattern"
CBA looks to AI for workforce planning
HamiltonJet partners with digital services provider Fortude
SentinelOne signs distribution agreement with Sektor
Rapid7’s new SIEM combines exposure management with threat detection
The techpartner.news podcast, episode 3: Why security consultancy founder Kat McCrabb started with the hard stuff
Bluechip Infotech enters final stage of Goodson Imports acquisition
Blackberry celebrates "giant step forward"
'Touch-free' smartphone controlled with head movements
Photos: Australian industry explores data for net zero
Telstra Purple acquires IoT specialists Alliance Automation, Aqura Technologies
Govt launches consumer tech label program for smart devices
Log In
Don't have an account? Register now!
Email:
Password:
Remember me
|
Forgot your password?