Latest News
ESET spots "PromptLock" AI-powered ransomware
Coles eyes AI to keep shelves stocked in next viral recipe trend
Home Affairs adds SecOps to new cyber risk overhaul
TCS forms AI-focused unit
Exetel fined $694k over system 'vulnerability' for mobile number porting
LOG IN
SUBSCRIBE
NEWS
GOVERNMENT
SECURITY
AI
DIGITAL NATION
RESOURCES
PODCAST
EVENTS
ADVERTISE
Search
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
Data&AI Breakfast
SECURITY AWARDS
DIGITAL NATION AWARDS
BENCHMARK AWARDS
Digital As Usual
NEWS
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
GOVERNMENT
SECURITY
AI
DIGITAL NATION
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
RESOURCES
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
PODCAST
EVENTS
Data&AI Breakfast
SECURITY AWARDS
DIGITAL NATION AWARDS
BENCHMARK AWARDS
Digital As Usual
ADVERTISE
Log In
Email:
Password:
Remember me
|
Forgot password?
Don't have an account? Register now!
Home
information
information
Information Anarchy? One Simple Solution
Microsoft calls it "information anarchy."
Bryan Davies
Jan 19 2004 10:12AM
Security
Regulating Security: Telecoms Regulation and Information Security
With the recent submission to Parliament of the Communications Bill that will give rise to the new Office of Communications (OFCOM), the U.K. is undergoing a dramatic change in the regulation of its communications industries.
Andrew Rathmell
Jan 16 2004 1:55PM
Security
Playing Defense in Information Warfare
The September 11 attacks on the World Trade Center illustrate that in a free market economy, attacks against privately owned facilities can be even more damaging than those against government targets such as the Pentagon.
Edward Hearst
Jan 16 2004 1:27PM
Security
Information Security: Addressing the Human Factor
Interest in information security is at unprecedented levels.
Steve Crutchley
Jan 16 2004 12:47PM
Security
Is Information Security Crossing the Proverbial You Know What?
Information security is a hot topic these days, something that often gets credited to an increased awareness of terrorism.
Dan Taylor
Jan 16 2004 11:37AM
Security
Information Availability - the Future of Business Continuity
It’s on a “need to know” basis, and I need to know!
Keith Tilley
Jan 16 2004 11:36AM
Security
When Worlds Collide: Physical and Information Security
Information security and physical security are frequently viewed as either conflicting or as far removed from one another as the sun is from the moon.
Thresa Lang
Jan 16 2004 11:34AM
Security
Information Insecurity
What is information security?
Bob Lonadier
Jan 16 2004 11:10AM
Security
Economic Models for Information Security
Security managers are under increasing pressure from corporate management to justify investments in information security technologies.
Dan Taylor
Jan 16 2004 10:23AM
Security
Interpol Tracks Information and Communication Technology Crime
“IT crime constitutes an ‘enormous’ threat to our society!”
Interpol European
Jan 15 2004 2:42PM
Security
A Proper Diet of Information Security
Earlier this year, researchers in Sweden announced that during a research study, they discovered that bread, potato chips, French fries and even cereal contain high levels of the carcinogen acrylamide.
Dan Taylor
Jan 15 2004 12:05PM
Security
Trusted Information Awareness - Another Name for Domestic Spying?
Co-incident with the news about the formation of the U.S. Department of Homeland Defense is the breaking of a story about a Defense Advanced Research Projects Agency (DARPA) ‘research project’ exploring the viability of sifting through huge amounts of transaction data looking for possible terrorist activities.
Bob Lonadier
Jan 15 2004 10:57AM
Security
Information Security on The Internet
In the aftermath of the September 11 terrorist events in the United States, the fear that malevolent hackers and other criminal perpetrators might unleash a cyberattack on the Internet is becoming an increasing concern.
Jason B.
Jan 14 2004 2:49PM
Security
Putting Information Security into Focus
In the past several months, it has become painfully clear that C-level executives are getting tired of buying information security for its own purposes.
Dan Taylor
Jan 12 2004 3:54PM
Security
Database security: protecting sensitive and critical information
Bankers would be considered negligent if they locked a bank’s outer doors and left the vault’s doors open at night.
Scott C.
Jan 12 2004 3:03PM
Security
Communicating the Language of Information Security
“When I use a word,” Humpty Dumpty said, in a rather scornful tone, “it means just what I choose it to mean - neither more nor less.” Lewis Carroll, Through the Looking Glass
Dan Houser
Jan 12 2004 2:43PM
Security
Information Security: Regulation and Legislation
It’s not so many years ago that organizations (misguidedly) held the view that security was the province of the IT department.
Alan Lycett
Jan 12 2004 1:23PM
Security
The Role of the Corporate Information Security Steering Committee
Organizations are becoming increasingly aware that if they fail to implement successful security management processes, it could expose them to untenable risk.
Tom Scholtz
Jan 12 2004 11:27AM
Security
The Myth of Information Security ROI: Not Every Expense Is an "Investment"
Information security teams are under increasing pressure to demonstrate financial return on investment (ROI) for security projects.
Tom Scholtz
Jan 9 2004 2:46PM
Security
“Cradle-to-Grave”: Career Path Support Needed for Information Security Professionals
Over the past few years, Information Security has emerged as a separate and distinct profession from traditional systems and physical security career fields.
Dow A.
Jan 9 2004 1:30PM
Security
Previous
Next
Most popular tech stories
CBA keeps pushing limits of its Workday environment
Chemist Warehouse runs AI on HR shared inbox
CBA to keep roles it had reviewed after installing AI bot
Serco connects dispersed workforce through ServiceNow-backed platform
CBA's leaders are keeping a close watch on AI metrics
HamiltonJet partners with digital services provider Fortude
SentinelOne signs distribution agreement with Sektor
Rapid7’s new SIEM combines exposure management with threat detection
The techpartner.news podcast, episode 3: Why security consultancy founder Kat McCrabb started with the hard stuff
Bluechip Infotech enters final stage of Goodson Imports acquisition
Blackberry celebrates "giant step forward"
Govt launches consumer tech label program for smart devices
Rail operator Aurizon uses IoT to help save $380m
Photos: IoT Impact 2023 brings together data-enabled productivity, sustainability and trust opportunities
Honeywell touts role in Sydney Opera House achieving 6 Star Green Star rating
Log In
Don't have an account? Register now!
Email:
Password:
Remember me
|
Forgot your password?