Latest News
Telstra to lead My Health Record data architecture overhaul
UGL digitised work order planning after winning electricity contract
ANZ eyes 'compound' gains from GenAI
Defence's ERP bill with IBM hits $575m
US to take 10 percent equity stake in Intel
LOG IN
SUBSCRIBE
NEWS
GOVERNMENT
SECURITY
AI
DIGITAL NATION
RESOURCES
PODCAST
EVENTS
ADVERTISE
Search
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
Data&AI Breakfast
SECURITY AWARDS
DIGITAL NATION AWARDS
BENCHMARK AWARDS
Digital As Usual
NEWS
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
GOVERNMENT
SECURITY
AI
DIGITAL NATION
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
RESOURCES
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
PODCAST
EVENTS
Data&AI Breakfast
SECURITY AWARDS
DIGITAL NATION AWARDS
BENCHMARK AWARDS
Digital As Usual
ADVERTISE
Log In
Email:
Password:
Remember me
|
Forgot password?
Don't have an account? Register now!
Home
analysis:
analysis:
Analysis: Good passw0rd security
Entropy isn't everything.
Darren Pauli
Sep 5 2011 3:48PM
Security
Analysis: Seven items of note in Telstra's annual report
IT administrative costs down, software development rises.
Ry Crozier
Sep 2 2011 12:51PM
Telco/ISP
Analysis: HP dials 'M' for mayhem
Leader wins praise for dumping TouchPad... and not much else.
Poornima Gupta
Aug 23 2011 6:56AM
Hardware
Fair punishment for data breaches?
Stakeholders ponder penalties and mandatory notification laws.
Liz Tay
Aug 19 2011 4:35PM
Security
Analysis: Perimeter exploit exposure
Vulnerability and patch management is key.
Marcus Carey, researcher, Rapid7
Aug 18 2011 1:00PM
Security
Lessons from the Sony hack
Software flaws are easy to attack, so, fix them.
Joe Basirico
Jul 20 2011 4:07PM
Security
Analysis: Voices from a darknet
Each service exposed to the internet must be adequately protected.
Mike Caudill
Jul 15 2011 11:37AM
Security
Analysis: Carbon tax to define IT success
Winners and losers divided by data centre refresh.
Brett Winterford
Jul 12 2011 6:40AM
Financial Services
Analysis: Detecting LDAP injections
Centralised location for authentication is good, but there's problems in implementation.
Andres Riancho
Jul 5 2011 1:58PM
Security
Apple and the public cloud: new threats, new solutions
Apple's iCloud will bring cloud computing to the masses and with it, new security challenges.
Jason Hart
Jun 24 2011 10:56AM
Security
Analysis: LulzSec trackers say authorities are closing
Vigilantes claim hackers' identities have been passed to FBI.
Darren Pauli
Jun 22 2011 3:51AM
Security
War stories important to defence
Disclosure is a must so that the industry can learn from its mistakes.
Chris Mohan
Jun 20 2011 4:22PM
Security
Analysis: Secure your supply chain
The automotive industry supply chain relies heavily on communications and document exchanges.
Sean Martin, founder, imsmartin consulting
Jun 14 2011 8:28AM
Security
Apple Lion borrows from Vista but iCloud doubts linger
Layout randomisation and other features should make malicious hackers' lives more difficult.
Darren Pauli
Jun 7 2011 11:18AM
Security
Respect and security
Trying times for security
Lisa Myers
Jun 2 2011 10:24AM
Security
Analysis: Yahoo! security chief remodells risk
The ability to ascertain the risk tolerance of the business gets less political pushback than just guessing.
Justin Somaini, CISO, Yahoo!
Jun 2 2011 9:58AM
Security
Analysis: Can encryption bring banks to the cloud?
Regulation might drive the finance sector to lead cloud adoption.
Brett Winterford
May 31 2011 3:07PM
Security
Analysis: Why do SQL injection attacks still succeed?
Databases, web servers, middleware and WAFs are not properly secured.
Josh Shaul, chief technology officer, Application Secur
May 25 2011 6:33AM
Security
Analysis: Offensive action against botnets
Does a botnet takedown set questionable precedents or is it a viable way to cleanse compromised computers?
David LaMacchia and Jamie Tomasello, Cloudmark
May 20 2011 11:19AM
Security
Analysis: Why you should chew through VM bibles
It makes poor bed-time reading, but getting your head around virtualisation is vital.
Darren Pauli
May 11 2011 1:16PM
Security
Previous
Next
Most popular tech stories
CBA keeps pushing limits of its Workday environment
Chemist Warehouse runs AI on HR shared inbox
CBA to keep roles it had reviewed after installing AI bot
Serco connects dispersed workforce through ServiceNow-backed platform
CBA's leaders are keeping a close watch on AI metrics
HamiltonJet partners with digital services provider Fortude
SentinelOne signs distribution agreement with Sektor
Rapid7’s new SIEM combines exposure management with threat detection
The techpartner.news podcast, episode 3: Why security consultancy founder Kat McCrabb started with the hard stuff
Bluechip Infotech enters final stage of Goodson Imports acquisition
Blackberry celebrates "giant step forward"
Rail operator Aurizon uses IoT to help save $380m
Govt launches consumer tech label program for smart devices
Digital displays come to Aussie taxis
Honeywell touts role in Sydney Opera House achieving 6 Star Green Star rating
Log In
Don't have an account? Register now!
Email:
Password:
Remember me
|
Forgot your password?