Latest News
Optus accused of low-effort, "inaccurate" outage notifications
H-1B visa crackdown upends Indian IT industry's playbook
Optus initiates change freeze on "network system"
Optus' Triple Zero failure "unlikely" to have contributed to baby's death
European airports snarled by cyberattack
LOG IN
SUBSCRIBE
NEWS
GOVERNMENT
SECURITY
AI
DIGITAL NATION
RESOURCES
PODCAST
EVENTS
ADVERTISE
Search
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
Data&AI Breakfast
SECURITY AWARDS
DIGITAL NATION AWARDS
BENCHMARK AWARDS
Digital As Usual
NEWS
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
GOVERNMENT
SECURITY
AI
DIGITAL NATION
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
RESOURCES
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
PODCAST
EVENTS
Data&AI Breakfast
SECURITY AWARDS
DIGITAL NATION AWARDS
BENCHMARK AWARDS
Digital As Usual
ADVERTISE
Log In
Email:
Password:
Remember me
|
Forgot password?
Don't have an account? Register now!
Home
of
of
The Privacy of Data in Motion
The recent draft on employee monitoring, released earlier this year by the U.K. Information Commissioner, has caused a stir among employees and employers.
Staff Writers
Jan 16 2004 10:00AM
Security
The Art of War
It’s not uncommon to hear wisdom such as “if an attacker has physical access to a PC, you’ve lost the battle,” or, “if a Trojan makes it past the defenses, it’s all over.”
Jon Tullett
Jan 16 2004 9:44AM
Security
Lessons of the Honeypot II: Expect the Unexpected
Observation and monitoring of computer intruders have long been performed in a haphazard fashion, if at all.
Anton Chuvakin
Jan 15 2004 2:31PM
Security
The Anatomy of a Security Incident Response Team
As organizations continue to invest in dedicated information security resources, it is imperative that they also develop the capability to respond to security incidents.
Tom Scholtz
Jan 15 2004 1:20PM
Security
A Proper Diet of Information Security
Earlier this year, researchers in Sweden announced that during a research study, they discovered that bread, potato chips, French fries and even cereal contain high levels of the carcinogen acrylamide.
Dan Taylor
Jan 15 2004 12:05PM
Security
Of Votes and Cyberspace
With the mid-term elections come and gone, it’s time for the Bush Administration to re-focus its attention on protecting cyberspace.
Bob Lonadier
Jan 15 2004 11:41AM
Security
Making Sense of “Homeland Security”
As the Homeland Security Act makes its way through the United States Congress, the topic of homeland security has become a relevant discussion in the information security marketplace.
Dan Taylor
Jan 15 2004 11:27AM
Security
Real-World IT Security - The Social Engineering Perils of Commuting
The morning commute from my suburban town of residence to London, where I presently work, and back is an opportunity to catch up on some reading and the news.
Stuart King
Jan 15 2004 11:16AM
Security
Securing the Last Unprotected Area of the Network
Just how secure is your network?
James Teel
Jan 15 2004 9:57AM
Security
Do Firewalls and IDS Create a False Sense of Internal Security?
In an effort to boost sales and generate revenue, one U.S. multinational energy company recently embraced the Internet to bolster external communication and internal collaboration.
Abishek Chauhan
Jan 14 2004 4:36PM
Security
The Secret of Agents
A generation ago, the world of espionage and counter-intelligence was populated by agents who operated in the shadows of eavesdropping, codes and hollowed-out books to collect and transmit important information.
Larry Lunetta
Jan 14 2004 4:31PM
Security
The Six Honest Men of Business Continuity Planning
"I keep six honest serving men (They taught me all I knew); Their names are What and Why and When And How and Where and Who" (Rudyard Kipling, from ‘The Elephant’s Child’ in Just So Stories).
Keith Tilley
Jan 14 2004 3:53PM
Security
The Threat of Internet Worms
2001 was without any doubt the year of vulnerabilities.
Yona Hollander
Jan 14 2004 3:47PM
Security
A Practical and Realistic Approach for Testing the Performance of Firewalls: What Your Security Vendors Don't Want You to Know
While Internet security has always been important, only recently has it emerged as an important issue for almost all who use the Internet.
Johnson Wu,
Jan 14 2004 3:01PM
Security
The Politics of Vulnerabilities
In the last few months, debate over the ethics of disclosing details of vulnerabilities has been rekindled.
Scott S.
Jan 14 2004 2:52PM
Security
e-Security Threats aren't Just the Enemy of the Corporate
They may not have as many employees, generate the same size revenues or have the million-plus customer base of the large enterprises, but when it comes to Internet security, small and medium-sized businesses (SMEs) face exactly the same risks as larger organizations when they incorporate e-business and e-commerce into their traditional business models.
Ralph Shaw
Jan 14 2004 2:48PM
Security
Distributed Denial-of-Service Attacks - Hacker Tools of the Trade
The denial-of-service (DoS) attack is a common, recurring problem in networking, and recently, more and more companies are being caught out because of holes in their security infrastructure.
Paul Lawrence
Jan 14 2004 2:45PM
Security
Infosec is news in the year of the worm
This has been a very good year - especially for the hackers. Ben Rothke wonders if we have learned anything from the experience
Ben Rothke
Jan 13 2004 5:13PM
Security
Out of patience with exposed Windows
How are CSOs coping with the growing burden of software patches? Julie Jervus sought the opinions of four practitioners with strong views on the matter
Julie Jervus
Jan 13 2004 5:00PM
Security
The fine art of deception
Attacks using social engineering techniques can be difficult to defend against, as Gunter Ollmann discovers.
Gunter Ollmann
Jan 13 2004 4:10PM
Security
Previous
Next
Most popular tech stories
UNSW to offer ChatGPT Edu to 10,000 staff
Medibank targets central system to handle people queries
EPA Victoria hones its strategic workforce planning
Lendi Group unveils agentic AI-powered home loan 'guardian'
Cyber Security Roadshow: Digital As Usual 2025
HamiltonJet partners with digital services provider Fortude
SentinelOne signs distribution agreement with Sektor
Rapid7’s new SIEM combines exposure management with threat detection
The techpartner.news podcast, episode 3: Why security consultancy founder Kat McCrabb started with the hard stuff
Bluechip Infotech enters final stage of Goodson Imports acquisition
Blackberry celebrates "giant step forward"
Sydney and Melbourne rank highly for "citizen experience"
Govt launches consumer tech label program for smart devices
Photos: Australian industry comes together to explore IoT opportunities
Australian firm wins global Cisco AI award for rail safety solution
Log In
Don't have an account? Register now!
Email:
Password:
Remember me
|
Forgot your password?