Latest News
AGD sets end-of-year deadline for Microsoft 365 rollout
Supply chain attack with malware hits Gravity Forms for WordPress
Google Gemini for Workspace vulnerable to prompt injection attacks
Vic Police uses AI to reformat community-submitted crime reports
NSW Police seeks lead for 'critical' network uplift
LOG IN
SUBSCRIBE
NEWS
GOVERNMENT
SECURITY
AI
DIGITAL NATION
RESOURCES
PODCAST
EVENTS
ADVERTISE
Search
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
Data&AI Breakfast
SECURITY AWARDS
DIGITAL NATION AWARDS
BENCHMARK AWARDS
Digital As Usual
NEWS
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
GOVERNMENT
SECURITY
AI
DIGITAL NATION
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
RESOURCES
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
PODCAST
EVENTS
Data&AI Breakfast
SECURITY AWARDS
DIGITAL NATION AWARDS
BENCHMARK AWARDS
Digital As Usual
ADVERTISE
Log In
Email:
Password:
Remember me
|
Forgot password?
Don't have an account? Register now!
Home
ietf
ietf
UK cyber agency signs its first IETF RFC
Documenting indicators of compromise for the internet’s designers.
Richard Chirgwin
Nov 21 2023 11:38AM
Security
HTTP/3 becomes a standard, at last
Faster traffic, more encryption.
Richard Chirgwin
Jun 9 2022 6:52AM
Networking
Security.txt standard may help researchers report flaws
Follows example of robots.txt.
Juha Saarinen
Sep 18 2017 11:07AM
Security
That's it for IPv4, go all IPv6: Internet Architecture Board
Pool of original internet protocol addresses exhausted.
Juha Saarinen
Nov 9 2016 11:30AM
Networking
Internet standards body plans to foil mass surveillance
Restoring faith in encryption.
Juha Saarinen
Sep 10 2013 11:52AM
Networking
NSA hacks iPhones, Android, Blackberrys: report
Is IPsec standard safe?
Juha Saarinen
Sep 9 2013 11:00AM
Security
Smartphone data can be intercepted by NSA: report
Is IPsec standard safe?
Juha Saarinen
Sep 9 2013 6:05AM
Security
Most popular tech stories
NSW gov employers 'should not' use AI for hiring decisions
Woolworths Group consolidates 30,000 marketing assets into Adobe platform
Viva Energy completes greenfield HR setup in time for Coles cutover
Powercor to tap into agentic AI across the organisation
El Jannah backs Salesforce martech stack to support store expansion
NEXTGEN "realigns" structure, announces senior promotions, plans vendor consolidation
The techpartner.news podcast, episode 1: Why OxygenIT dropped 80 percent of its customers
Ingram Micro "grateful" for customers' support during cybersecurity incident
Ingram Micro hit by ransomware
Announcing the 2025 Impact Awards Partner Leadership finalists
Blackberry celebrates "giant step forward"
Laing O'Rourke brings IoT to hard hats
Water, energy sector sustainability to take centre stage at IoT Impact
Co-founder of IoT telco Thinxtra Loïc Barancourt departs
Telstra to host IoT State of the Nation event on November 14
Log In
Don't have an account? Register now!
Email:
Password:
Remember me
|
Forgot your password?