Latest News
EPA Victoria hones its strategic workforce planning
UNSW to offer ChatGPT Edu to 10,000 staff
First npm worm "Shai-Hulud" released in supply chain attack
Effective resilience requires more than just security tools
Woodside Energy sets up a unified enterprise data platform
LOG IN
SUBSCRIBE
NEWS
GOVERNMENT
SECURITY
AI
DIGITAL NATION
RESOURCES
PODCAST
EVENTS
ADVERTISE
Search
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
Data&AI Breakfast
SECURITY AWARDS
DIGITAL NATION AWARDS
BENCHMARK AWARDS
Digital As Usual
NEWS
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
GOVERNMENT
SECURITY
AI
DIGITAL NATION
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
RESOURCES
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
PODCAST
EVENTS
Data&AI Breakfast
SECURITY AWARDS
DIGITAL NATION AWARDS
BENCHMARK AWARDS
Digital As Usual
ADVERTISE
Log In
Email:
Password:
Remember me
|
Forgot password?
Don't have an account? Register now!
Home
identify
identify
Human fossils found with Google Earth
Pinpoints 500 new archaeology sites.
Iain Thomson
Apr 10 2010 12:22AM
Oddware
Current levels of identity theft are inexcusable
Any IT chief worth their salt knows how to combat data theft, so why is it still so common, asks Ian Schenkel.
Ian Schenkel
Nov 4 2008 12:10PM
Security
Opinion: Current levels of identity theft are inexcusable
Any IT chief worth their salt knows how to combat data theft, so why is it still so common, asks Ian Schenkel.
Ian Schenkel
Nov 1 2008 9:57AM
Security
SonicWALL: Users can't consistently identify phishing messages
A recent test showed that the majority of computer users were unable to distinguish fraudulent emails from legitimate messages when put to the test.
Ericka Chickowski
Sep 1 2006 12:24AM
Security
Police use technology to identify football hooligans
UK police are turning to innovative technology to help in the fight against hooliganism.
Tom
Jul 3 2006 9:20AM
Oddware
Audit shows IRS failed to adequately identify security weaknesses
The U.S. Internal Revenue Service used a flawed and ineffective process for monitoring system security weaknesses, according to a report recently released by the Treasury Inspector General for Tax Administration.
Marcia Savage
Jan 21 2005 9:57PM
Security
Most popular tech stories
Lendi Group unveils agentic AI-powered home loan 'guardian'
Queensland Rail uses SuccessFactors to "put learning back on the map"
Cyber Security Roadshow: Digital As Usual 2025
Medibank targets central system to handle people queries
mecwacare sizes its digital transformation
HamiltonJet partners with digital services provider Fortude
SentinelOne signs distribution agreement with Sektor
Rapid7’s new SIEM combines exposure management with threat detection
The techpartner.news podcast, episode 3: Why security consultancy founder Kat McCrabb started with the hard stuff
Bluechip Infotech enters final stage of Goodson Imports acquisition
Blackberry celebrates "giant step forward"
Photos: Australian industry comes together to explore IoT opportunities
Australian firm wins global Cisco AI award for rail safety solution
Govt launches consumer tech label program for smart devices
Sydney and Melbourne rank highly for "citizen experience"
Log In
Don't have an account? Register now!
Email:
Password:
Remember me
|
Forgot your password?