Latest News
M365 portal buckling as demand for Copilot refunds soar
DVA trials ChatGPT-based tool with 300 staff
Microsoft launches 'superintelligence' team
In pictures: The 2025 iTnews Benchmark Security Awards winners
NAB hits milestone with tech role insourcing
LOG IN
SUBSCRIBE
NEWS
GOVERNMENT
SECURITY
AI
DIGITAL NATION
RESOURCES
PODCAST
EVENTS
ADVERTISE
Search
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
Tech Partner Views
Tech Data IT Summit
Data&AI Breakfast
SECURITY AWARDS
DIGITAL NATION AWARDS
BENCHMARK AWARDS
Digital As Usual
NEWS
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
GOVERNMENT
SECURITY
AI
DIGITAL NATION
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
RESOURCES
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
Tech Partner Views
PODCAST
EVENTS
Tech Data IT Summit
Data&AI Breakfast
SECURITY AWARDS
DIGITAL NATION AWARDS
BENCHMARK AWARDS
Digital As Usual
ADVERTISE
Log In
Email:
Password:
Remember me
|
Forgot password?
Don't have an account? Register now!
Home
from
from
Authentication: From Passwords to Public Keys
An exciting book on authentication, of all things?
Anton Chuvakin
Jan 16 2004 11:01AM
Security
New Security Perspectives: What U.S. Firms Can Learn From Overseas
In today's climate of increasing security concerns, companies are seeking out new policy and practice concepts in addition to new technology upgrades to address vulnerabilities.
Steve Crutchley
Jan 16 2004 10:44AM
Security
Summer’s Long Days: Bouncing from Thought to Thought
Good old reliable time, not the Internet kind, does some flying.
Illena Armstrong
Jan 16 2004 10:36AM
Security
Monitoring Security from the Inside Out: Intrusion Detection at the Configuration Level
Today’s intrusion detection (ID) technology is, for the most part, network-centric.
Andy Evans
Jan 15 2004 11:45AM
Security
From Business Policy to Network Policy
At the core of decisions about Internet access, monitoring and content filtering are business policies that specify where, when and how users will access web content.
Steve House
Jan 14 2004 3:40PM
Security
How do you stop the threat from within?
The biggest threat to security is not from outside, it is from the company employee. Julie Jervis asked security experts throughout the U.S. how they are educating these end-users
Julie Jervis
Jan 13 2004 5:15PM
Security
For Your Eyes Only: Securing Sensitive Data from Rogue Staff
Defining what constitutes intellectual property can lead to differences of opinion.
Vanessa Chandrasekaran
Jan 12 2004 10:21AM
Security
Coping with security risks from all angles
Because of our increased reliance on IT, the effects of downtime, security breaches or deliberate attacks on a company’s IT system can cause serious, sometimes irreparable, damage.
Keith Tilley
Jan 12 2004 9:58AM
Security
Security Devices Don’t Always Save Companies from Hackers
On May 29, 2003, the Computer Security Institute (CSI) and the FBI published the results of their most recent Computer Crime and Security Survey, now in its eighth year.
Staff Writers
Jan 9 2004 4:16PM
Security
Questions from the security zone: Are all VPNs created equal?
Given today’s ever tighter IT budgets and emphasis on cost savings, many organizations are planning to replace their wide area network (WAN) connections, looking for a reliable and more cost effective alternative that doesn’t compromise security.
Staff Writers
Jan 9 2004 3:06PM
Security
Get Dutch data from Anyware
Melbourne-based peripherals distributor Anyware Computer Accessories has signed an exclusive deal to distribute a Dutch range of data gear to resellers in Australia and New Zealand.
Staff Writers
Oct 20 2003 12:00AM
Hardware
ERG ejects from ECard
Staff Writers
Nov 14 2002 12:00AM
Hardware
De Castro decamps from AOL
Staff Writers
Nov 13 2002 12:00AM
Software
From Zip to NAS
Rob Irwin
Jun 18 2002 12:00AM
Storage
Previous
Most popular tech stories
ABC drops Salesforce for Braze
Westpac Intelligence Layer breaks cover
Suncorp creates a "clear execution roadmap" for agentic AI
Qantas' digital and customer head steps down
Uniting uses GenAI to cut admin burden for frontline care workers
HamiltonJet partners with digital services provider Fortude
SentinelOne signs distribution agreement with Sektor
Rapid7’s new SIEM combines exposure management with threat detection
The techpartner.news podcast, episode 3: Why security consultancy founder Kat McCrabb started with the hard stuff
Bluechip Infotech enters final stage of Goodson Imports acquisition
Blackberry celebrates "giant step forward"
Photos: Australian industry explores data for net zero
Telstra Purple acquires IoT specialists Alliance Automation, Aqura Technologies
'Touch-free' smartphone controlled with head movements
We look back at moments in IoT that were important in Australia
Log In
Don't have an account? Register now!
Email:
Password:
Remember me
|
Forgot your password?