Latest News
In Pictures: iTnews Executive Retreat - Security leaders edition
US arrests Super Micro co-founder for allegedly smuggling GPUs into China
Gov to explore "future connectivity between identity exchanges"
OpenAI to buy Python toolmaker Astral
Hacker says they compromised millions of confidential police tips
LOG IN
SUBSCRIBE
NEWS
GOVERNMENT
SECURITY
AI
DIGITAL NATION
RESOURCES
PODCAST
EVENTS
ADVERTISE
Search
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
Tech Partner Views
Cloud Covered
Executive Retreat
BENCHMARK AWARDS
NEWS
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
GOVERNMENT
SECURITY
AI
DIGITAL NATION
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
RESOURCES
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
Tech Partner Views
PODCAST
EVENTS
Cloud Covered
Executive Retreat
BENCHMARK AWARDS
ADVERTISE
Log In
Email:
Password:
Remember me
|
Forgot password?
Don't have an account? Register now!
Home
of
of
The Privacy of Data in Motion
The recent draft on employee monitoring, released earlier this year by the U.K. Information Commissioner, has caused a stir among employees and employers.
Staff Writers
Jan 16 2004 10:00AM
Security
The Art of War
It’s not uncommon to hear wisdom such as “if an attacker has physical access to a PC, you’ve lost the battle,” or, “if a Trojan makes it past the defenses, it’s all over.”
Jon Tullett
Jan 16 2004 9:44AM
Security
Lessons of the Honeypot II: Expect the Unexpected
Observation and monitoring of computer intruders have long been performed in a haphazard fashion, if at all.
Anton Chuvakin
Jan 15 2004 2:31PM
Security
The Anatomy of a Security Incident Response Team
As organizations continue to invest in dedicated information security resources, it is imperative that they also develop the capability to respond to security incidents.
Tom Scholtz
Jan 15 2004 1:20PM
Security
A Proper Diet of Information Security
Earlier this year, researchers in Sweden announced that during a research study, they discovered that bread, potato chips, French fries and even cereal contain high levels of the carcinogen acrylamide.
Dan Taylor
Jan 15 2004 12:05PM
Security
Of Votes and Cyberspace
With the mid-term elections come and gone, it’s time for the Bush Administration to re-focus its attention on protecting cyberspace.
Bob Lonadier
Jan 15 2004 11:41AM
Security
Making Sense of “Homeland Security”
As the Homeland Security Act makes its way through the United States Congress, the topic of homeland security has become a relevant discussion in the information security marketplace.
Dan Taylor
Jan 15 2004 11:27AM
Security
Real-World IT Security - The Social Engineering Perils of Commuting
The morning commute from my suburban town of residence to London, where I presently work, and back is an opportunity to catch up on some reading and the news.
Stuart King
Jan 15 2004 11:16AM
Security
Securing the Last Unprotected Area of the Network
Just how secure is your network?
James Teel
Jan 15 2004 9:57AM
Security
Do Firewalls and IDS Create a False Sense of Internal Security?
In an effort to boost sales and generate revenue, one U.S. multinational energy company recently embraced the Internet to bolster external communication and internal collaboration.
Abishek Chauhan
Jan 14 2004 4:36PM
Security
The Secret of Agents
A generation ago, the world of espionage and counter-intelligence was populated by agents who operated in the shadows of eavesdropping, codes and hollowed-out books to collect and transmit important information.
Larry Lunetta
Jan 14 2004 4:31PM
Security
The Six Honest Men of Business Continuity Planning
"I keep six honest serving men (They taught me all I knew); Their names are What and Why and When And How and Where and Who" (Rudyard Kipling, from ‘The Elephant’s Child’ in Just So Stories).
Keith Tilley
Jan 14 2004 3:53PM
Security
The Threat of Internet Worms
2001 was without any doubt the year of vulnerabilities.
Yona Hollander
Jan 14 2004 3:47PM
Security
A Practical and Realistic Approach for Testing the Performance of Firewalls: What Your Security Vendors Don't Want You to Know
While Internet security has always been important, only recently has it emerged as an important issue for almost all who use the Internet.
Johnson Wu,
Jan 14 2004 3:01PM
Security
The Politics of Vulnerabilities
In the last few months, debate over the ethics of disclosing details of vulnerabilities has been rekindled.
Scott S.
Jan 14 2004 2:52PM
Security
e-Security Threats aren't Just the Enemy of the Corporate
They may not have as many employees, generate the same size revenues or have the million-plus customer base of the large enterprises, but when it comes to Internet security, small and medium-sized businesses (SMEs) face exactly the same risks as larger organizations when they incorporate e-business and e-commerce into their traditional business models.
Ralph Shaw
Jan 14 2004 2:48PM
Security
Distributed Denial-of-Service Attacks - Hacker Tools of the Trade
The denial-of-service (DoS) attack is a common, recurring problem in networking, and recently, more and more companies are being caught out because of holes in their security infrastructure.
Paul Lawrence
Jan 14 2004 2:45PM
Security
Infosec is news in the year of the worm
This has been a very good year - especially for the hackers. Ben Rothke wonders if we have learned anything from the experience
Ben Rothke
Jan 13 2004 5:13PM
Security
Out of patience with exposed Windows
How are CSOs coping with the growing burden of software patches? Julie Jervus sought the opinions of four practitioners with strong views on the matter
Julie Jervus
Jan 13 2004 5:00PM
Security
The fine art of deception
Attacks using social engineering techniques can be difficult to defend against, as Gunter Ollmann discovers.
Gunter Ollmann
Jan 13 2004 4:10PM
Security
Previous
Next
Most popular tech stories
NAB readies to scale AI-based customer interaction
Griffith University takes control of its student recruitment
RACV sets data foundations to underpin AI in customer channels
ABC drops Salesforce for Braze
Metcash brings AI search to its B2B marketplace
HamiltonJet partners with digital services provider Fortude
SentinelOne signs distribution agreement with Sektor
Rapid7’s new SIEM combines exposure management with threat detection
The techpartner.news podcast, episode 3: Why security consultancy founder Kat McCrabb started with the hard stuff
Bluechip Infotech enters final stage of Goodson Imports acquisition
'Touch-free' smartphone controlled with head movements
Blackberry celebrates "giant step forward"
Govt launches consumer tech label program for smart devices
Photos: Australian industry explores data for net zero
Telstra Purple acquires IoT specialists Alliance Automation, Aqura Technologies
Log In
Don't have an account? Register now!
Email:
Password:
Remember me
|
Forgot your password?