Latest News
Telcos argue ACMA's $2.3bn spectrum fee-hike will crush investment
Telcos, NBN Co face collective $7.3bn bill to renew wireless spectrum
Defence CTO retires from the public service
OpenAI gets edge over Microsoft Copilot at La Trobe
Business leaders agree AI is the future. They just wish it worked right now
LOG IN
SUBSCRIBE
NEWS
GOVERNMENT
SECURITY
AI
DIGITAL NATION
RESOURCES
PODCAST
EVENTS
ADVERTISE
Search
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
Tech Partner Views
Executive Retreat
BENCHMARK AWARDS
NEWS
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
GOVERNMENT
SECURITY
AI
DIGITAL NATION
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
RESOURCES
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
Tech Partner Views
PODCAST
EVENTS
Executive Retreat
BENCHMARK AWARDS
ADVERTISE
Log In
Email:
Password:
Remember me
|
Forgot password?
Don't have an account? Register now!
Home
management
management
BAA buys application management tools
Airport operator BAA is buying 10,000 licences for application and network performance management solutions to be used over seven airports in the UK.
Dan Ilett
Feb 16 2004 4:31PM
Security
Information Assurance and Corporate Governance: Engaging Senior Management
Information assurance (IA) is key to the effective management of any organization in today's economy.
Aarti Anhal
Jan 19 2004 11:08AM
Security
Identity Management - Delivering Security and Value
Ensuring information security has never been more important.
Peter Shillito
Jan 16 2004 1:00PM
Security
Business Continuity Management is Not a Luxury
The Internet has been the catalyst for incredible change in our economy.
Steven J.
Jan 16 2004 10:30AM
Security
Novell updates identity management software
Novell released the latest version of its identity management product, Nsure Identity Manager 2 heralding tighter integration between its web services and identity management software.
Rene Millman
Jan 14 2004 5:09PM
Security
Danger money: The challenge of risk management
There is always a trade-off between security needs and economics. Richard Starnes asks how businesses can strike the right balance.
Richard Starnes
Jan 13 2004 12:46PM
Security
Change Management: What If it All Goes Wrong?
The U.K.’s Swanwick Air Traffic Control center is an unfortunate example of the problems that can occur with the continuity of a business while undergoing a period of change.
Staff Writers
Jan 12 2004 1:54PM
Security
The Five Critical Stages of Policy Management
A series of recent bloody court battles, well-documented in the press, have highlighted the importance of clear policies governing the use of an organization’s information systems.
Nathan Millard
Jan 12 2004 1:43PM
Security
Patch Management - The Foundation of IT Security
The widespread impact of the SQL Slammer worm in January 2003 highlighted an issue that most security professionals see as a basic fact - IT system security is not based on a single installation, but on an ongoing management of risks and vulnerabilities.
Paul Collins
Jan 12 2004 12:48PM
Security
Security Policy Management: Email Risk Controls
E-policy is a corporate statement and set of rules to protect the organization from casual or intentional abuse that could result in the release of sensitive information, IT system failures or litigation against the organization by employees or other parties.
Ann James
Jan 12 2004 12:32PM
Security
Meeting the Challenge of Identity Management: The Role of VPNs and Biometric Authentication
Organizations are increasingly being asked to provide staff with remote access to corporate systems.
Ken Douglas
Jan 12 2004 12:25PM
Security
Identity Management Case Example
A large food and general merchandise wholesaler in the United States had a strategic vision based on strengthening its relationships with the market’s largest retailers, and increasing its vertical penetration through the acquisition of niche channel wholesalers.
Jim Burns
Jan 12 2004 11:10AM
Security
Time to Own Up to Email Management
Here’s a question: how many non-work related emails do you send and receive every day from your office email address?
Staff Writers
Jan 12 2004 10:41AM
Security
Business Continuity and Risk Management: Distant Cousins or Partners in Crime?
In a post 9/11 environment, the terms business continuity and risk management are becoming common parlance within a wide range organizations.
Dave Birch
Jan 12 2004 10:13AM
Security
Out-of-Band Management for Windows Server 2003
Many networked devices, such as UNIX servers, routers and switches, are accessible through local serial console ports, for initial configuration and emergency management.
Burk Murray
Jan 9 2004 4:40PM
Security
Is Patch Management a Failing Strategy?
If recent headlines about the Blaster worm sounded familiar, it was with good reason. Earlier this year, another worm was wreaking havoc on the internet, targeting a well-known Microsoft vulnerability.
Phil Hollows
Jan 9 2004 3:46PM
Security
The challenge of making enterprise management secure
There is a computer security mantra which says that the basic issues to manage are “ports, passwords and patches”.
John Alcock
Jan 9 2004 2:00PM
Security
The Need for Secure Project Management
Secure project management is a concept that blends the needs of project management and security.
Dan Emory
Jan 9 2004 1:52PM
Security
PeopleSoft sharpens management team
Under the shadow of Oracle’s hostile bid, PeopleSoft has outlined its local integration strategy after its merger with JD Edwards, including a new management team, cuts to back-office staff and a product roadmap.
Siobhan Chapman
Nov 4 2003 12:00AM
Software
StorageTek talks up information lifecycle management
Vivienne Fisher
Sep 30 2003 12:00AM
Storage
Previous
Next
Most popular tech stories
Cochlear pilots voice-to-text Salesforce integration for lead management
Audit Office of NSW and Data61 explore AI for gov auditing
Accenture to train 30,000 staff on Anthropic's Claude
CBA finds its first chief AI officer
Chemist Warehouse's AI tool for HR becoming a "standard pattern"
HamiltonJet partners with digital services provider Fortude
SentinelOne signs distribution agreement with Sektor
Rapid7’s new SIEM combines exposure management with threat detection
The techpartner.news podcast, episode 3: Why security consultancy founder Kat McCrabb started with the hard stuff
Bluechip Infotech enters final stage of Goodson Imports acquisition
Blackberry celebrates "giant step forward"
Photos: Australian industry explores data for net zero
Axis Communications opens experience centre in Sydney tech hub
AI-driven robot makes ‘perfect’ flatbread
NSW Govt to trial IoT tech to monitor sharks
Log In
Don't have an account? Register now!
Email:
Password:
Remember me
|
Forgot your password?