Latest News
In Pictures: State of Data & AI report launch breakfast
CBA using facial recognition logins to verify disputed payments
Australia takes another step toward a central bank digital currency
UK police arrest four over cyberattacks on M&S, Co-op and Harrods
Viva Energy completes greenfield HR setup in time for Coles cutover
LOG IN
SUBSCRIBE
NEWS
GOVERNMENT
SECURITY
AI
DIGITAL NATION
RESOURCES
PODCAST
EVENTS
ADVERTISE
Search
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
Data&AI Breakfast
SECURITY AWARDS
DIGITAL NATION AWARDS
BENCHMARK AWARDS
Digital As Usual
NEWS
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
GOVERNMENT
SECURITY
AI
DIGITAL NATION
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
RESOURCES
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
PODCAST
EVENTS
Data&AI Breakfast
SECURITY AWARDS
DIGITAL NATION AWARDS
BENCHMARK AWARDS
Digital As Usual
ADVERTISE
Log In
Email:
Password:
Remember me
|
Forgot password?
Don't have an account? Register now!
Home
and
and
A Practical and Realistic Approach for Testing the Performance of Firewalls: What Your Security Vendors Don't Want You to Know
While Internet security has always been important, only recently has it emerged as an important issue for almost all who use the Internet.
Johnson Wu,
Jan 14 2004 3:01PM
Security
Digital Signatures: What Can Businesses and Consumers Expect?
Laws giving digital signatures legal legitimacy have been enacted around the world.
Rett Summerville
Jan 14 2004 2:47PM
Security
Evaluating the Security Risk Between Business-to-Business and Business-to-Consumer
Today's security measures are not keeping up with today's security risks.
John Bernardi
Jan 14 2004 1:39PM
Security
Designing and Deploying Effective Defenses Against Denial-of-Service Attacks
Vince Liu
Jan 14 2004 1:32PM
Security
Signature-Based or Anomaly-Based Intrusion Detection: The Practice and Pitfalls
Intrusion detection has become big business on the Internet and, to be honest, it's not surprising.
Arnt Brox
Jan 14 2004 1:23PM
Security
Blackout blues ...and what you can do to avoid them
The recent power outage was a powerful reminder of the value of business continuity provisions. Ron Mobed reports.
Ron Mobed
Jan 13 2004 4:58PM
Security
Faster and more secure
SSL’s potential weaknesses can be overcome says David Hicks, creating flexibility for today’s online needs.
David Hicks
Jan 13 2004 4:07PM
Security
Talk time: Instant messaging and the enterprise
Instant messaging can bring both great business benefit and far greater risks to your network systems, says John Korsak
John Korsak
Jan 13 2004 2:32PM
Security
Protect the road warrior ...and deter the black hats
Security has become paramount on mobile devices as more employees work away from the office. Ron Condon investigates.
Ron Condon
Jan 13 2004 11:01AM
Security
Keeping out the intruders: Detecting and preventing
What is the future for intrusion detection and intrusion prevention systems? Illena Armstrong examines the conflicting claims.
Illena Armstrong
Jan 13 2004 10:52AM
Security
Defenses for the ‘click and hack’ age
Malicious attacks are evolving and, as Robert Clyde discovers, defenses to these attacks should evolve too
Robert Clyde
Jan 12 2004 5:08PM
Security
Security-Spending Winners and Losers for 2003
What do the impending war in Iraq, the Venezuelan oil strike, the threats by North Korea to “go nuclear,” and the Bush Administration economic proposal all have in common?
Robert Lonadier
Jan 12 2004 3:40PM
Security
Database security: protecting sensitive and critical information
Bankers would be considered negligent if they locked a bank’s outer doors and left the vault’s doors open at night.
Scott C.
Jan 12 2004 3:03PM
Security
Integration: The Only Way to Manage and Grow a Saturated E-security Industry
It was recently reported that the worldwide market for IT security and business continuity products and services is growing twice as fast as overall IT industry. By 2006, this market is expected to surpass $150 billion (IDC, 2002).
Russ Cummings
Jan 12 2004 2:55PM
Security
Microsoft and the Return of PKI
Many businesses have written off public key infrastructure (PKI) as a dead technology.
Robert Lonadier
Jan 12 2004 2:21PM
Security
The Good and the Bad for Selecting Security Measures
The most important function IT security managers perform is the selection of IT security measures.
Robert V.
Jan 12 2004 2:20PM
Security
Waking Up to Reality: Security and Handheld Computing Devices
Handheld computing devices, like Palms and Pocket PCs, play an essential role in many people’s lives.
Dick Mackey
Jan 12 2004 2:04PM
Security
Hints and Tips on Securing your Mobile Workforce
So you have a mobile workforce, you have invested in laptops, PDAs, mobiles and smartphones and your staff are out there chasing and winning business.
Kurt Lennartsson
Jan 12 2004 1:30PM
Security
Information Security: Regulation and Legislation
It’s not so many years ago that organizations (misguidedly) held the view that security was the province of the IT department.
Alan Lycett
Jan 12 2004 1:23PM
Security
Protecting Your Privacy and Identity
The ability to maintain a healthy balance between personal privacy and stringent enterprise security standards has been a sensitive and long-lasting struggle among security vendors and privacy advocate groups.
Oliver Tattan
Jan 12 2004 12:43PM
Security
Previous
Next
Most popular tech stories
Woolworths Group consolidates 30,000 marketing assets into Adobe platform
El Jannah backs Salesforce martech stack to support store expansion
NSW gov employers 'should not' use AI for hiring decisions
Optus' first AI chief Samantha Lawson exits
Viva Energy completes greenfield HR setup in time for Coles cutover
Ingram Micro hit by ransomware
PHOTOS: The M&A Session - Sydney
The techpartner.news podcast, episode 1: Why OxygenIT dropped 80 percent of its customers
Announcing the 2025 Impact Awards Partner Leadership finalists
Dell’s new platform wants to end HCI vendor lock-in
Blackberry celebrates "giant step forward"
Laing O'Rourke brings IoT to hard hats
Co-founder of IoT telco Thinxtra Loïc Barancourt departs
Telstra to host IoT State of the Nation event on November 14
365mesh launches updated Aussie-made vibration sensor
Log In
Don't have an account? Register now!
Email:
Password:
Remember me
|
Forgot your password?