Latest News
OVIC sets limits on GenAI tool use in external meetings
Google commits US$1 billion for AI training at US universities
Health expands cloud footprint with $32m Azure deal
Breaking Down Data Silos in the Age of AI: How Hitachi Vantara Sees The A/NZ Opportunity Evolving
"ReVault" firmware flaws allow persistent access in Dell laptops
LOG IN
SUBSCRIBE
NEWS
GOVERNMENT
SECURITY
AI
DIGITAL NATION
RESOURCES
PODCAST
EVENTS
ADVERTISE
Search
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
Data&AI Breakfast
SECURITY AWARDS
DIGITAL NATION AWARDS
BENCHMARK AWARDS
Digital As Usual
NEWS
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
GOVERNMENT
SECURITY
AI
DIGITAL NATION
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
RESOURCES
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
PODCAST
EVENTS
Data&AI Breakfast
SECURITY AWARDS
DIGITAL NATION AWARDS
BENCHMARK AWARDS
Digital As Usual
ADVERTISE
Log In
Email:
Password:
Remember me
|
Forgot password?
Don't have an account? Register now!
Home
control
control
IT departments losing control of remote workers
Study warns of 'risky online behaviour'.
Robert Jaques
Nov 7 2006 11:38AM
Strategy
Microsoft hands copyright control over to publishers
Software giant begins book digitisation, but side-steps copyright problems.
Tracey Caldwell
Jul 18 2006 12:45PM
Software
Traffic control
How do you spell trust? Not I-P-S — at least, not if you're an enterprise security manager deploying an intrusion prevention system (IPS) for the first time. Once heralded as the "smarter" cousin of the intrusion detection system (IDS) — destined to eventually kick its kin out of the data center because of its "intelligent" ability to block, not just identify, security threats — the IPS instead has reached a sort of détente with the IDS. Rather than supplanting the IDS with an IPS, many enterprises use the two devices in complementary fashion.
Jim Carr
Jul 10 2006 8:30PM
Security
Firms fail to control World Cup access
IT professionals are losing productivity because they are failing to control employee access to football on the internet, according to a security company.
Matt Chapman
Jul 3 2006 9:20AM
Security
Remote control wars
Monitoring an illicit Internet Relay Chat (IRC) channel recently, Nicholas Albright couldn’t believe what he was seeing. First, he observed a network operator sending commands to install keyloggers on thousands of compromised, remote-controlled computers. Then, all this private data started flying over the channel — HIPAA-protected medical information, financial account numbers, usernames and passwords.
Deb Radcliff
Jun 6 2006 7:47PM
Security
Review: BindView Control Compliance Suite
The BindView Compliance Control Suite includes bv-Control for Windows, bv-Control for Internet Security and Compliance Center. This is a very complex suite of products and is part of a complete compliance and assessment toolkit that offers virtually every view necessary of the security compliance status of an enterprise. This very strength makes configuration and use of the product difficult at first.
Peter Stephenson
,CeRNS,
Feb 1 2006 12:00AM
Security
Network Access Control market will soar to $3.9B by 2008
Global manufacturer revenue for Network Access Control (NAC) enforcement will grow 1,100 percent, from $323 million to $3.9 billion between 2005 and 2008, new research has predicted.
William Eazel
Jan 19 2006 10:01AM
Security
Risk is all about keeping control
Stuart Okin
Oct 21 2005 4:48PM
Security
U.S. air traffic control system 'open to hackers'
America's air traffic control systems are open to attack from hackers and cyber-terrorists according to a new GAO report.
René Millman
Sep 27 2005 12:31PM
Security
Debate: Two-factor authentication access control will not prevent fraud and identity theft
Bruce Schneier
May 13 2005 12:26PM
Security
Take control of your security
Let's face it, managing security policies can give you a headache. Coping with the rules and properties and policies affecting hundreds of devices - firewalls, intrusion prevention systems, and anti-virus servers - is hard enough, and that's before trying to manage them, or change their state.
Amit Tailor
Mar 21 2005 3:18PM
Security
So, friend or foe? ID management and access control
Companies need to rationalize their access policies if they are to comply with the new regulations, as Charles Hayhoe explains
Charles Hayhoe
Feb 21 2005 5:14PM
Security
Intel to offer new chip management control
Intel is taking out-of-band technology to the chip level.
Staff Writers
Dec 29 2004 9:59AM
Hardware
Control what you let in
Neglecting to watch what you allow into your network can create unnecessary threats, says Lance Braunstein
Lance Braunstein
Dec 2 2004 5:31PM
Security
Cisco boosts access control with Perfigo acquisition
Cisco Systems is preparing to acquire privately-held Perfigo, a developer of packaged network access control solutions that provide endpoint policy analysis, compliance, and access enforcement capabilities.
Robert Jaques
Oct 25 2004 2:33PM
Security
Chip-maker takes message control
California-based company Kingston Technology recognized the security problems caused by the increased use of IM by its employees, so it took positive action to allow them to utilise the tool securely. John Sterlicchi reports
John Sterlicchi
Sep 1 2004 5:01PM
Security
Who is in control of Sarbanes Oxley?
The deadline for compliance with Section 404 of the Sarbanes-Oxley requirements (SOX) will come into force at the close of this fiscal year. Companies disclosing their results must implement an internal control structure to assure the accuracy of financial reports, evaluate the control structure periodically and make sure that controls are tested at least annually by an independent audit firm.
Luke Brown
Aug 10 2004 4:52PM
Security
Take control of your passwords
The tight security at casinos needs to be extended to how the IT systems are used and accessed. John Sterlicchi reports on a case in point
John Sterlicchi
Aug 5 2004 12:42PM
Security
Top 10 techniques to control spam for the enterprise
Spam within the enterprise has undoubtedly evolved from an annoyance to a critical business problem. No approach to spam can work in isolation as unlike viruses, no single technology is able to stem the tide. I believe that by utilising the following top ten techniques an organisation can arm itself successfully against the menace of spam.
Colin Gray
Jul 13 2004 2:52PM
Security
SCM Microsystems moves into physical access control
SCM Microsystems, the Californian digital security specialist, says it plans to enter the physical access control market.
Steve Gold
Mar 23 2004 4:59PM
Security
Previous
Next
Most popular tech stories
Bunnings pilots AI for its 55,000-strong workforce
CBA AI 'voice bot' deployment linked to review of 45 roles
David Jones seeks '360-degree' customer view from unified data
Guzman y Gomez continues to deploy Workday as core people platform
Union calls for 'mandatory' employee consultations on AI programs
HamiltonJet partners with digital services provider Fortude
SentinelOne signs distribution agreement with Sektor
Rapid7’s new SIEM combines exposure management with threat detection
The techpartner.news podcast, episode 3: Why security consultancy founder Kat McCrabb started with the hard stuff
Bluechip Infotech enters final stage of Goodson Imports acquisition
Photos: IoT Impact 2023 brings together data-enabled productivity, sustainability and trust opportunities
Blackberry celebrates "giant step forward"
Lendlease lays out property-tech wish list
Govt launches consumer tech label program for smart devices
Tech and sustainability group calls for Australian climate data plan
Log In
Don't have an account? Register now!
Email:
Password:
Remember me
|
Forgot your password?