Latest News
M365 portal buckling as demand for Copilot refunds soar
DVA trials ChatGPT-based tool with 300 staff
Microsoft launches 'superintelligence' team
In pictures: The 2025 iTnews Benchmark Security Awards winners
NAB hits milestone with tech role insourcing
LOG IN
SUBSCRIBE
NEWS
GOVERNMENT
SECURITY
AI
DIGITAL NATION
RESOURCES
PODCAST
EVENTS
ADVERTISE
Search
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
Tech Partner Views
Tech Data IT Summit
Data&AI Breakfast
SECURITY AWARDS
DIGITAL NATION AWARDS
BENCHMARK AWARDS
Digital As Usual
NEWS
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
GOVERNMENT
SECURITY
AI
DIGITAL NATION
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
RESOURCES
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
Tech Partner Views
PODCAST
EVENTS
Tech Data IT Summit
Data&AI Breakfast
SECURITY AWARDS
DIGITAL NATION AWARDS
BENCHMARK AWARDS
Digital As Usual
ADVERTISE
Log In
Email:
Password:
Remember me
|
Forgot password?
Don't have an account? Register now!
Home
Features
Features
An eye on security for 2009
There were several fundamental challenges in the security field last year, and this year will be no different, according to Websense's Phil Vasic.
Phil Vasic
Feb 27 2009 12:14PM
Security
Virtual security is no less real
There are dramatic cost benefits to virtualisation, but they’re easily negated by poor security practices that result in breaches and downtime, as NetIQ's Rick Logan explains.
Rick Logan
Feb 23 2009 4:58PM
Security
Database security: protecting the crown jewels
As companies like Deutsche Telekom have learned, attackers are going after databases, reports Deb Radcliff.
Deb Radcliff
Feb 12 2009 4:45PM
Security
Lost smartphones pose significant corporate risk
Mislaid laptops have been much in the news, but the lost smartphone poses a significant and growing corporate risk, says Jessica Twentyman.
Jessica Twentyman
Feb 12 2009 4:34PM
Security
Review: RSA SecurID 3.0
If you have the staff and the time, this is a very nice solution.
Michael Lipinski
Feb 12 2009 3:52PM
Security
Why cybercriminals love a good Valentine’s Day
For cybercriminals, Valentine's Day is just another opportunity to draw in unsuspecting internet users, as Phil Vasic, A/NZ country manager for Websense, explains.
Phil Vasic
Feb 10 2009 2:55PM
Security
Review: Kaspersky Labs Total Space Security v6.0
Other products may boast more malware components, but this one is good at what it does.
Michael Lipinski
Feb 5 2009 3:05PM
Security
Review: F-Secure Client Security 8
This tool offers a large amount of protection, ease of use and management, all for a fair price.
Michael Lipinski
Feb 5 2009 1:24PM
Security
Social networking websites make recruiting spies difficult
A social networking world makes it harder for the UK intelligence services to recruit a spy without a profile, as Ken Munro explains.
Ken Munro
Feb 4 2009 2:53PM
Security
Review: Linksys N Ultra Rangeplus Simultaneous Dual-N Band Wireless Router WRT610N
Although it’s not a screamer at short range, the good long-range performance (at 5GHz at least) makes the Linksys WRT610N an attractive choice
Stephen Withers
Feb 3 2009 11:20PM
Networking
Review: Dell Precision Workstation M6400
If you don’t care about weight, this is what a laptop should be
Zara Baxter
Feb 2 2009 11:26PM
Hardware
Waiting out the storm
Peter Croft, managing director of Clearswift Asia-Pacific, says businesses should look at getting the most out of their existing IT security, as the global financial crisis forces inevitable cutbacks.
Peter Croft
Jan 29 2009 11:39AM
Security
Cyberwarfare: How secure are your communications?
Mike Simms, vice president of EADS Defence & Security Systems, looks at how carefully we handle information and data in the digital age.
Mike Simms
Jan 28 2009 4:08PM
Security
Enterprise key management deciphered
As encryption becomes more widely adopted, organisations are also experiencing an increasing concern about the management of a growing set of encryption keys. Effective management of these keys is essential to ensure both the availability and security of encrypted information.
Steve Pate
Jan 23 2009 1:34PM
Security
Review: ESET Smart Security v3.0
It provides a good range of malware protection at the endpoint, and the administration console did a nice job reporting, alerting, distributing and managing the endpoint software.
Michael Lipinski
Jan 21 2009 2:54PM
Security
Malware epidemic demands a united front
Cybercriminals have readily exploited the Web2.0 revolution, meaning that a new approach is needed to fight them, says Blue Coat Australia's Wayne Neich.
Wayne Neich
Jan 20 2009 11:44AM
Security
In the vault
When it comes to protecting financial info, IT security professionals can never rest on their laurels, reports Jean Thilmany.
Jean Thilmany
Jan 16 2009 2:32PM
Security
Review: BitDefender Corporate Security
BitDefender Corporate Security is a security and management solution which delivered proactive protection from viruses, spyware, rootkits, spam, phishing and other forms of malware.
Michael Lipinski
Jan 16 2009 2:11PM
Security
How new access control technologies can address insider threats
Open networks and fast-moving data allow errors and malfeasance by network insiders to create significant financial, public-relations and regulatory risks, says Juniper's Rich Campagna.
Rich Campagna
Jan 13 2009 5:09PM
Security
Review: AVG Technologies Internet Security Network
This product integrated most of the malware solutions while providing an efficient, streamlined user-friendly offering.
Michael Lipinski
Jan 13 2009 4:56PM
Security
Previous
Next
Most popular tech stories
ABC drops Salesforce for Braze
Westpac Intelligence Layer breaks cover
Suncorp creates a "clear execution roadmap" for agentic AI
Uniting uses GenAI to cut admin burden for frontline care workers
Qantas' digital and customer head steps down
HamiltonJet partners with digital services provider Fortude
SentinelOne signs distribution agreement with Sektor
Rapid7’s new SIEM combines exposure management with threat detection
The techpartner.news podcast, episode 3: Why security consultancy founder Kat McCrabb started with the hard stuff
Bluechip Infotech enters final stage of Goodson Imports acquisition
Blackberry celebrates "giant step forward"
Telstra Purple acquires IoT specialists Alliance Automation, Aqura Technologies
Photos: Australian industry explores data for net zero
'Touch-free' smartphone controlled with head movements
Photos: The 2024 IoT Awards winners
Log In
Don't have an account? Register now!
Email:
Password:
Remember me
|
Forgot your password?