Latest News
IAG reworks data ingestion for property underwriters
Federal chief AI officer roles set to go to existing APS staffers
Nvidia buys AI developer to expand open-source AI push
ASX to reset transformation after scathing review
The University of Sydney makes its interim CISO permanent
LOG IN
SUBSCRIBE
NEWS
GOVERNMENT
SECURITY
AI
DIGITAL NATION
RESOURCES
PODCAST
EVENTS
ADVERTISE
Search
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
Tech Partner Views
Executive Retreat
BENCHMARK AWARDS
NEWS
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
GOVERNMENT
SECURITY
AI
DIGITAL NATION
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
RESOURCES
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
Tech Partner Views
PODCAST
EVENTS
Executive Retreat
BENCHMARK AWARDS
ADVERTISE
Log In
Email:
Password:
Remember me
|
Forgot password?
Don't have an account? Register now!
Home
analysis:
analysis:
Analysis: Good passw0rd security
Entropy isn't everything.
Darren Pauli
Sep 5 2011 3:48PM
Security
Analysis: Seven items of note in Telstra's annual report
IT administrative costs down, software development rises.
Ry Crozier
Sep 2 2011 12:51PM
Telco/ISP
Analysis: HP dials 'M' for mayhem
Leader wins praise for dumping TouchPad... and not much else.
Poornima Gupta
Aug 23 2011 6:56AM
Hardware
Fair punishment for data breaches?
Stakeholders ponder penalties and mandatory notification laws.
Liz Tay
Aug 19 2011 4:35PM
Security
Analysis: Perimeter exploit exposure
Vulnerability and patch management is key.
Marcus Carey, researcher, Rapid7
Aug 18 2011 1:00PM
Security
Lessons from the Sony hack
Software flaws are easy to attack, so, fix them.
Joe Basirico
Jul 20 2011 4:07PM
Security
Analysis: Voices from a darknet
Each service exposed to the internet must be adequately protected.
Mike Caudill
Jul 15 2011 11:37AM
Security
Analysis: Carbon tax to define IT success
Winners and losers divided by data centre refresh.
Brett Winterford
Jul 12 2011 6:40AM
Financial Services
Analysis: Detecting LDAP injections
Centralised location for authentication is good, but there's problems in implementation.
Andres Riancho
Jul 5 2011 1:58PM
Security
Apple and the public cloud: new threats, new solutions
Apple's iCloud will bring cloud computing to the masses and with it, new security challenges.
Jason Hart
Jun 24 2011 10:56AM
Security
Analysis: LulzSec trackers say authorities are closing
Vigilantes claim hackers' identities have been passed to FBI.
Darren Pauli
Jun 22 2011 3:51AM
Security
War stories important to defence
Disclosure is a must so that the industry can learn from its mistakes.
Chris Mohan
Jun 20 2011 4:22PM
Security
Analysis: Secure your supply chain
The automotive industry supply chain relies heavily on communications and document exchanges.
Sean Martin, founder, imsmartin consulting
Jun 14 2011 8:28AM
Security
Apple Lion borrows from Vista but iCloud doubts linger
Layout randomisation and other features should make malicious hackers' lives more difficult.
Darren Pauli
Jun 7 2011 11:18AM
Security
Respect and security
Trying times for security
Lisa Myers
Jun 2 2011 10:24AM
Security
Analysis: Yahoo! security chief remodells risk
The ability to ascertain the risk tolerance of the business gets less political pushback than just guessing.
Justin Somaini, CISO, Yahoo!
Jun 2 2011 9:58AM
Security
Analysis: Can encryption bring banks to the cloud?
Regulation might drive the finance sector to lead cloud adoption.
Brett Winterford
May 31 2011 3:07PM
Security
Analysis: Why do SQL injection attacks still succeed?
Databases, web servers, middleware and WAFs are not properly secured.
Josh Shaul, chief technology officer, Application Secur
May 25 2011 6:33AM
Security
Analysis: Offensive action against botnets
Does a botnet takedown set questionable precedents or is it a viable way to cleanse compromised computers?
David LaMacchia and Jamie Tomasello, Cloudmark
May 20 2011 11:19AM
Security
Analysis: Why you should chew through VM bibles
It makes poor bed-time reading, but getting your head around virtualisation is vital.
Darren Pauli
May 11 2011 1:16PM
Security
Previous
Next
Most popular tech stories
Cochlear pilots voice-to-text Salesforce integration for lead management
Audit Office of NSW and Data61 explore AI for gov auditing
Accenture to train 30,000 staff on Anthropic's Claude
CBA finds its first chief AI officer
Charles Sturt University's new chatbot aims to be 'empathetic' 24/7
HamiltonJet partners with digital services provider Fortude
SentinelOne signs distribution agreement with Sektor
Rapid7’s new SIEM combines exposure management with threat detection
The techpartner.news podcast, episode 3: Why security consultancy founder Kat McCrabb started with the hard stuff
Bluechip Infotech enters final stage of Goodson Imports acquisition
Blackberry celebrates "giant step forward"
Photos: Australian industry explores data for net zero
'Touch-free' smartphone controlled with head movements
Axis Communications opens experience centre in Sydney tech hub
Photos: The 2024 IoT Awards winners
Log In
Don't have an account? Register now!
Email:
Password:
Remember me
|
Forgot your password?