Latest News
In Pictures: Sumo Logic roundtable on the evolving SIEM
In Pictures: Saviynt securing non-human identities Sydney roundtable
TPG Telecom hopes 'digital twin' can predict network, service disaster impacts
Monash University pilots graph database tech to map research ecosystem
AI providers plug metadata leak that exposed encrypted chat topics
LOG IN
SUBSCRIBE
NEWS
GOVERNMENT
SECURITY
AI
DIGITAL NATION
RESOURCES
PODCAST
EVENTS
ADVERTISE
Search
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
Tech Partner Views
Tech Data IT Summit
Data&AI Breakfast
SECURITY AWARDS
DIGITAL NATION AWARDS
BENCHMARK AWARDS
Digital As Usual
NEWS
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
GOVERNMENT
SECURITY
AI
DIGITAL NATION
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
RESOURCES
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
Tech Partner Views
PODCAST
EVENTS
Tech Data IT Summit
Data&AI Breakfast
SECURITY AWARDS
DIGITAL NATION AWARDS
BENCHMARK AWARDS
Digital As Usual
ADVERTISE
Log In
Email:
Password:
Remember me
|
Forgot password?
Don't have an account? Register now!
Home
Features
Features
Review: A10 Networks IDsentrie 1000
The IDsentrie identity management appliance brings together several forms of secure user management into one device. This appliance focuses on two main areas of identity management, the first being network authentication.
Peter Stephenson
,CeRNS,
Feb 22 2008 12:00AM
Security
Superbotnets: Mega-D vs Storm, an in-depth look
Mega-D, set off a firestorm of speculation,
recently.
What family of malware was behind this previously unknown botnet? How had it emerged to challenge Storm with hardly a mention in any research articles or press?
Joe Stewart, Senior Security Researcher, SecureWorks
Feb 21 2008 10:52AM
Security
Review: AirDefence Enterprise v7.3
AirDefense Enterprise provides protection against wireless threats, policy compliance and performance monitoring, troubleshooting and location tracking in an appliance that is scalable for most size organisations.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol
Feb 20 2008 3:25PM
Security
Building security into your software-development lifecycle
You have probably heard by now that the root cause of most security vulnerabilities is in the software we run, and that these vulnerabilities are introduced into the software during the development process. That much has been well understood for several years. What hasn't been well understood is the solution to the problem.
Chris Wysopal
Feb 18 2008 4:08PM
Security
Review: Trust Digital Smartphone Security v7.3
This product is almost like identity management for mobile devices. With Smartphone Security, an administrator can manage mobile users, provision policies, secure data, provide support and run audits.
Peter Stephenson,
Feb 18 2008 4:07PM
Security
Guest column: Security Web 2.0 - Open Season for the Attackers?
The Web is now a participatory medium -- users contributing, communing, and building. The downside of this ubiquitous connectivity and user participation is a new slew of security threats many IT professionals have yet to fully grasp.
Wayne Neich
Feb 18 2008 12:11PM
Security
Data breaches in 2007, will bring action in 2008
After last year's big breaches, new laws on handling confidential data won't be far off, so get ready now.
Ian Castle
Feb 15 2008 12:07PM
Security
Awareness combats profit-driven attacks
There's no question about it: the malware industry is booming. Every day, computer users are bombarded with news of severe data breaches, the rapid growth of online fraud and identity theft, and spyware that invades privacy and compromises security.
Jason King
Feb 14 2008 4:06PM
Security
New government, new year, new promises
Why government Internet filtering raises more questions than it answers.
Mitchell Bingemann
Feb 14 2008 10:48AM
Software
Guest column: Proving the value of your iInvestment with ROI
In life, as in business, you continually make decisions about purchases by considering the value you’ll get from your investment. Whether you are evaluating which stock or mutual fund to add to your retirement portfolio, considering different real estate options, or contemplating what kind of car to buy, you most likely begin by comparing several possible choices. Then you might try to project the value that each option will deliver for your investment.
Mary Nugent and Marina Yesakova
Feb 14 2008 10:47AM
Strategy
The key to USB security
USB devices are getting smaller. That also makes them easier to lose, yet most still have no decent encryption.
Nick Barron
Feb 13 2008 4:04PM
Security
Review: ZENworks Endpoint Security
ZENworks Endpoint Security Management (ESM) v3.5 provides a centrally managed endpoint security product that controls and manages wireless connectivity. The ESM offers complete control over all wireless connectivity within an organisation.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol
Feb 12 2008 2:50PM
Security
Get ahead of new web applications
Consumer peer-to-peer (p2p) internet applications are growing at a blistering pace. Evidence is everywhere: worldwide, users send more than 10 billion instant messages every day (J.D. Powers and Associates); Skype's 136 million users account for 7 percent of international long-distance traffic (Morgan Stanley); video file sharing may account for up to 60 percent of all internet traffic (CacheLogic).
John Yun, Juniper Networks and Jon Oltsik, Enterprise S
Feb 12 2008 2:33PM
Security
Linux, we have a PR problem
A few weeks ago a former boss and mentor of mine made my jaw drop by asking me, "Why has open source failed?".
Sarah Stokely
Feb 11 2008 12:26PM
Software
Review: Power Logon
Power LogOn offers a somewhat different take to identity management. In the IT industry, when a user is given a secure password it is usually something other than their dog’s name or favourite football team.
Peter Stephenson
,CeRNS,
Feb 5 2008 11:13AM
Security
Surviving the Age of Consolidation
IT security vendors are acquiring companies that make point products. But what you really need are integrated security solutions. Here’s how to choose your suppliers wisely. By all measures, we live in an age of consolidation.
John McNulty, Chairman and CEO of Secure Computing Corp
Feb 4 2008 7:47AM
Security
Bruce Schneier on fighting security FUD
Security expert Bruce Schneier has long been critical of so-called security ‘theatre' - policies and products tailored to provide the perception of security rather than tackling actual security risks.
Feb 1 2008 2:00PM
Security
Guest column: The Saas Trap - What you need to consider before moving to SAAS
Adoption of the software-as-a-service (SaaS) sales model is accelerating at a phenomenal rate in the region, changing the way vendors do business and the way organisations use software.
Paul K. Berger
Jan 31 2008 3:11PM
Software
Review: AVATIER ID MANAGEMENT SUITE
When Avatier calls this an identity management suite, it’s not kidding. This product contains all the tools to manage users through their entire lifecycle. The company has split identity management into six phases.
Peter Stephenson
,CeRNS,
Jan 31 2008 8:00AM
Security
Angels give wings to Australian start-ups
As a nation that is home to a well-developed education system and world-class research institutions, Australia is often lauded as fertile grounds for innovation. But the outlook for young entrepreneurs may not be so rosy.
Liz Tay
Jan 30 2008 4:13PM
Financial Services
Previous
Next
Most popular tech stories
ABC drops Salesforce for Braze
Westpac Intelligence Layer breaks cover
Suncorp creates a "clear execution roadmap" for agentic AI
Uniting uses GenAI to cut admin burden for frontline care workers
Qantas' digital and customer head steps down
HamiltonJet partners with digital services provider Fortude
SentinelOne signs distribution agreement with Sektor
Rapid7’s new SIEM combines exposure management with threat detection
The techpartner.news podcast, episode 3: Why security consultancy founder Kat McCrabb started with the hard stuff
Bluechip Infotech enters final stage of Goodson Imports acquisition
Blackberry celebrates "giant step forward"
Telstra Purple acquires IoT specialists Alliance Automation, Aqura Technologies
Photos: Australian industry explores data for net zero
'Touch-free' smartphone controlled with head movements
Photos: The 2024 IoT Awards winners
Log In
Don't have an account? Register now!
Email:
Password:
Remember me
|
Forgot your password?