Latest News
M365 portal buckling as demand for Copilot refunds soar
DVA trials ChatGPT-based tool with 300 staff
Microsoft launches 'superintelligence' team
In pictures: The 2025 iTnews Benchmark Security Awards winners
NAB hits milestone with tech role insourcing
LOG IN
SUBSCRIBE
NEWS
GOVERNMENT
SECURITY
AI
DIGITAL NATION
RESOURCES
PODCAST
EVENTS
ADVERTISE
Search
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
Tech Partner Views
Tech Data IT Summit
Data&AI Breakfast
SECURITY AWARDS
DIGITAL NATION AWARDS
BENCHMARK AWARDS
Digital As Usual
NEWS
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
GOVERNMENT
SECURITY
AI
DIGITAL NATION
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
RESOURCES
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
Tech Partner Views
PODCAST
EVENTS
Tech Data IT Summit
Data&AI Breakfast
SECURITY AWARDS
DIGITAL NATION AWARDS
BENCHMARK AWARDS
Digital As Usual
ADVERTISE
Log In
Email:
Password:
Remember me
|
Forgot password?
Don't have an account? Register now!
Home
Features
Features
Avoiding the security pitfalls of cloud computing
Cloud computing has all the hallmarks of becoming a prevalent and valuable innovation that IT professionals should use to their advantage.
Steve Moyle
Oct 9 2008 3:27PM
Security
Case study: The Leading Edge calls Proofpoint to disable Botnet attack
Consultancy firm, The Leading Edge called Proofpoint to restore its email when a Botnet attack took the company’s internet link down.
Jenny Eagle
Oct 9 2008 3:13PM
Security
Interview: Brian NeSmith, CEO of Blue Coat Systems
The Blue Coat Systems CEO gazed into the dotcom abyss and survived. He thinks he has the measure of the downturn. Paul Fisher reports
Paul Fisher
Oct 9 2008 10:49AM
Security
Review: GuardianEdge Device Control
GuardianEdge Device Control is a component of the more robust GuardianEdge Data Protection Platform.
Justin Peltier
Oct 8 2008 3:39PM
Security
Q & A: DLP for the rest of us
Richard Turner, CEO of Clearswift speaks about the security industry’s most hyped concepts: Data Loss Prevention (DLP).
Staff Writers
Oct 8 2008 2:41PM
Security
Review: ASUS M51Va, killer value Centrino 2 notebook
Despite some odd feature choices, this is an affordable powerhouse of a laptop. A great value mid-range Centrino 2 laptop, as long as you're not worried about battery life.
Zara Baxter
Oct 8 2008 2:37PM
Hardware
Review: Lumension SAC and SDC
Lumension offers a pair of products, Sanctuary Application Control and Sanctuary Device Control, that work in tandem to provide protection of devices.
Justin Peltier
Oct 7 2008 3:02PM
Security
Safe browsing with Google Chrome?
Security experts give mixed reviews about Google’s inaugural web browser, Chrome.
Negar Salek
Oct 3 2008 7:00AM
Security
Review: Novell ZENworks ESM
First, it is important to note that unlike previous versions of ZENworks, Novell ZENworks Endpoint Security Management (ESM) does not require anything else from Novell to operate.
Justin Peltier
Oct 3 2008 7:00AM
Security
Review: Linksys WRT610N, dual-n band networking is here
The arrival of dual-n band networking with 5GHz promises an end to crowded home wireless networks. Speed, range and technology is great, but the price is steep
Zara Baxter
Oct 1 2008 5:06PM
Networking
Review: SkyRecon StormShield
StormShield Security Suite offers integrated system and data protection in a single product.
Justin Peltier
Oct 1 2008 3:44PM
Security
Review: Panda Security Security for Enterprise
Panda Security for Enterprise is another suite of products designed to protect the endpoint.
Justin Peltier
Sep 30 2008 2:28PM
Security
Eugene Kaspersky on the cybercrime arms race
While it is unlikely we will ever abolish cybercrime, I do believe that we can make the internet a safer place.
Eugene Kaspersky
Sep 30 2008 11:25AM
Security
Website developers can protect users from internet-borne threats
Protecting users from internet-borne threats falls on trusted websites, says Overstock's Sam Peterson. Dan Kaplan reports.
Dan Kaplan
Sep 26 2008 12:22PM
Security
Review: Sophos Endpoint Security and Control
The Sophos Endpoint Security and Control is a subset of the Sophos Network Access Control Advanced.
Justin Peltier
Sep 26 2008 11:35AM
Security
Review: Trend Micro OfficeScan Client/Server Edition
OfficeScan Client/Server Edition is a well-rounded network security product for the network endpoints. It has several security features.
Justin Peltier
Sep 25 2008 3:47PM
Security
Palin email "hack" underscores need for stronger authentication
User names and passwords aren't secure, and momentum continues to build across the industry to solve this problem in a manageable way.
Steven K, CEO, Wave Systems
Sep 25 2008 10:30AM
Security
Review: AppGate Security Server (AGSS) and Device Firewall (DFW)
AppGate Security Server (AGSS) and Device Firewall (DFW) is an offering of multiple utilities tied into one package.
Justin Peltier
Sep 24 2008 4:20PM
Security
Review: Bioscrypt V-Station
The V-Station is much like the V-Pass (left), but on steroids.
Peter Stephenson,
Sep 22 2008 4:56PM
Security
What you need to know to keep Mac OS X secure
Just a few years ago, Apple commanded only a small fraction of the computer market.
Amol Sarwate,
Sep 22 2008 4:12PM
Security
Previous
Next
Most popular tech stories
ABC drops Salesforce for Braze
Westpac Intelligence Layer breaks cover
Suncorp creates a "clear execution roadmap" for agentic AI
Uniting uses GenAI to cut admin burden for frontline care workers
Qantas' digital and customer head steps down
HamiltonJet partners with digital services provider Fortude
SentinelOne signs distribution agreement with Sektor
Rapid7’s new SIEM combines exposure management with threat detection
The techpartner.news podcast, episode 3: Why security consultancy founder Kat McCrabb started with the hard stuff
Bluechip Infotech enters final stage of Goodson Imports acquisition
Blackberry celebrates "giant step forward"
Photos: Australian industry explores data for net zero
Telstra Purple acquires IoT specialists Alliance Automation, Aqura Technologies
'Touch-free' smartphone controlled with head movements
Photos: The 2024 IoT Awards winners
Log In
Don't have an account? Register now!
Email:
Password:
Remember me
|
Forgot your password?