Latest News
Grant Thornton consolidates 60TB of Microsoft 365 data into Veeam
Veterans' Affairs trials AI-enabled search
ANZ's technology division to be impacted by planned cuts
Phishing attack nets enormous npm supply chain compromise
Most pandemic-era ransomware raids conducted by two gangs
LOG IN
SUBSCRIBE
NEWS
GOVERNMENT
SECURITY
AI
DIGITAL NATION
RESOURCES
PODCAST
EVENTS
ADVERTISE
Search
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
Data&AI Breakfast
SECURITY AWARDS
DIGITAL NATION AWARDS
BENCHMARK AWARDS
Digital As Usual
NEWS
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
GOVERNMENT
SECURITY
AI
DIGITAL NATION
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
RESOURCES
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
PODCAST
EVENTS
Data&AI Breakfast
SECURITY AWARDS
DIGITAL NATION AWARDS
BENCHMARK AWARDS
Digital As Usual
ADVERTISE
Log In
Email:
Password:
Remember me
|
Forgot password?
Don't have an account? Register now!
Home
from
from
Authentication: From Passwords to Public Keys
An exciting book on authentication, of all things?
Anton Chuvakin
Jan 16 2004 11:01AM
Security
New Security Perspectives: What U.S. Firms Can Learn From Overseas
In today's climate of increasing security concerns, companies are seeking out new policy and practice concepts in addition to new technology upgrades to address vulnerabilities.
Steve Crutchley
Jan 16 2004 10:44AM
Security
Summer’s Long Days: Bouncing from Thought to Thought
Good old reliable time, not the Internet kind, does some flying.
Illena Armstrong
Jan 16 2004 10:36AM
Security
Monitoring Security from the Inside Out: Intrusion Detection at the Configuration Level
Today’s intrusion detection (ID) technology is, for the most part, network-centric.
Andy Evans
Jan 15 2004 11:45AM
Security
From Business Policy to Network Policy
At the core of decisions about Internet access, monitoring and content filtering are business policies that specify where, when and how users will access web content.
Steve House
Jan 14 2004 3:40PM
Security
How do you stop the threat from within?
The biggest threat to security is not from outside, it is from the company employee. Julie Jervis asked security experts throughout the U.S. how they are educating these end-users
Julie Jervis
Jan 13 2004 5:15PM
Security
For Your Eyes Only: Securing Sensitive Data from Rogue Staff
Defining what constitutes intellectual property can lead to differences of opinion.
Vanessa Chandrasekaran
Jan 12 2004 10:21AM
Security
Coping with security risks from all angles
Because of our increased reliance on IT, the effects of downtime, security breaches or deliberate attacks on a company’s IT system can cause serious, sometimes irreparable, damage.
Keith Tilley
Jan 12 2004 9:58AM
Security
Security Devices Don’t Always Save Companies from Hackers
On May 29, 2003, the Computer Security Institute (CSI) and the FBI published the results of their most recent Computer Crime and Security Survey, now in its eighth year.
Staff Writers
Jan 9 2004 4:16PM
Security
Questions from the security zone: Are all VPNs created equal?
Given today’s ever tighter IT budgets and emphasis on cost savings, many organizations are planning to replace their wide area network (WAN) connections, looking for a reliable and more cost effective alternative that doesn’t compromise security.
Staff Writers
Jan 9 2004 3:06PM
Security
Get Dutch data from Anyware
Melbourne-based peripherals distributor Anyware Computer Accessories has signed an exclusive deal to distribute a Dutch range of data gear to resellers in Australia and New Zealand.
Staff Writers
Oct 20 2003 12:00AM
Hardware
ERG ejects from ECard
Staff Writers
Nov 14 2002 12:00AM
Hardware
De Castro decamps from AOL
Staff Writers
Nov 13 2002 12:00AM
Software
From Zip to NAS
Rob Irwin
Jun 18 2002 12:00AM
Storage
Previous
Most popular tech stories
NSW Education turns to Deloitte for HCM program delivery
Lion migrates staff onboarding process from SAP into ServiceNow
State of MarTech
David Jones invites all parts of its business to embrace data
mecwacare sizes its digital transformation
HamiltonJet partners with digital services provider Fortude
SentinelOne signs distribution agreement with Sektor
Rapid7’s new SIEM combines exposure management with threat detection
The techpartner.news podcast, episode 3: Why security consultancy founder Kat McCrabb started with the hard stuff
Bluechip Infotech enters final stage of Goodson Imports acquisition
Blackberry celebrates "giant step forward"
Photos: Australian industry explores data for net zero
Govt launches consumer tech label program for smart devices
Photos: The 2024 IoT Awards winners
UTS launches Australian Artificial Intelligence Institute
Log In
Don't have an account? Register now!
Email:
Password:
Remember me
|
Forgot your password?