Latest News
CBA builds Lumos, an AI-driven accelerator to prepare applications for cloud
Oracle names insiders as co-CEOs
Nvidia to invest US$100 billion in OpenAI
NSW Education AI tool set to launch for students from October
Optus accused of low-effort, "inaccurate" outage notifications
LOG IN
SUBSCRIBE
NEWS
GOVERNMENT
SECURITY
AI
DIGITAL NATION
RESOURCES
PODCAST
EVENTS
ADVERTISE
Search
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
Data&AI Breakfast
SECURITY AWARDS
DIGITAL NATION AWARDS
BENCHMARK AWARDS
Digital As Usual
NEWS
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
GOVERNMENT
SECURITY
AI
DIGITAL NATION
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
RESOURCES
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
PODCAST
EVENTS
Data&AI Breakfast
SECURITY AWARDS
DIGITAL NATION AWARDS
BENCHMARK AWARDS
Digital As Usual
ADVERTISE
Log In
Email:
Password:
Remember me
|
Forgot password?
Don't have an account? Register now!
Home
of
of
The masters of disguise: Do you know who your users are?
Illena Armstrong looks at the complex and challenging task of managing identities over today’s distributed company systems.
Illena Armstrong
Jan 13 2004 3:57PM
Security
Policy that lives: Enforcing security in spite of the users
Creating a security policy may be hard, says Illena Armstrong, but making sure that users comply is always the biggest problem
Illena Armstrong
Jan 13 2004 3:22PM
Security
Sinking in a sea of spam
Tired of email porn and body enhancement offers? John Young suggests using secure content management to halt the tidal wave.
John Young
Jan 13 2004 3:19PM
Security
Reducing the stream of false positives
Ray Zadjmool explores a solution to the number of false positives specifically created by the use of Windows Media Player
Ray Zadjmool
Jan 13 2004 2:40PM
Security
The language of the market
Customers and partners need access to your systems. Roger Sullivan says XML can provide the security to make it happen.
Roger Sullivan
Jan 13 2004 2:36PM
Security
Danger money: The challenge of risk management
There is always a trade-off between security needs and economics. Richard Starnes asks how businesses can strike the right balance.
Richard Starnes
Jan 13 2004 12:46PM
Security
Witches’ brew of concerns
The next 12 months could be a crunch time for infosecurity. So Illena Armstrong asked some experts how the cookie might crumble
Illena Armstrong
Jan 13 2004 11:52AM
Security
Get qualified: Certification - that’s the name of the game
There is an increasing range of valuable qualifications that an information security expert can gain, says Marcia Savage
Marcia Savage
Jan 13 2004 11:28AM
Security
Real risk or shadow? The threat of cyberterrorism
Digital attacks often mirror attacks in the real world. Illena Armstrong asks if they are inevitable and how to respond.
Illena Armstrong
Jan 13 2004 10:38AM
Security
A Healthy Dose of Security Skepticism
No security system is perfect. Never believe that you have solved your security problems or eliminated a specific security threat.
Landon Curt
Jan 12 2004 3:48PM
Security
New Blends of Email Threats
Email-borne threats continue to evolve and have started to combine in new and dangerous ways.
Pete Simpson
Jan 12 2004 3:25PM
Security
Communicating the Language of Information Security
“When I use a word,” Humpty Dumpty said, in a rather scornful tone, “it means just what I choose it to mean - neither more nor less.” Lewis Carroll, Through the Looking Glass
Dan Houser
Jan 12 2004 2:43PM
Security
Microsoft and the Return of PKI
Many businesses have written off public key infrastructure (PKI) as a dead technology.
Robert Lonadier
Jan 12 2004 2:21PM
Security
The Five Critical Stages of Policy Management
A series of recent bloody court battles, well-documented in the press, have highlighted the importance of clear policies governing the use of an organization’s information systems.
Nathan Millard
Jan 12 2004 1:43PM
Security
Preventing Fraud Online: Digital Fingerprinting of PCs
Fraud is a serious problem in today’s online world.
Diana Kelley
Jan 12 2004 1:33PM
Security
The Economic Return of Security
Security, physical, cyber, and otherwise, is on everyone’s mind these days.
Robert Lonadier
Jan 12 2004 1:06PM
Security
Patch Management - The Foundation of IT Security
The widespread impact of the SQL Slammer worm in January 2003 highlighted an issue that most security professionals see as a basic fact - IT system security is not based on a single installation, but on an ongoing management of risks and vulnerabilities.
Paul Collins
Jan 12 2004 12:48PM
Security
Meeting the Challenge of Identity Management: The Role of VPNs and Biometric Authentication
Organizations are increasingly being asked to provide staff with remote access to corporate systems.
Ken Douglas
Jan 12 2004 12:25PM
Security
Jurassic Park, the Insurance Model and the Economic Return of Security
Remember Jurassic Park? In both the novel and the movie versions, the dinosaurs quickly adapted to their new surroundings, thwarting all attempts by the humans at controlling their evolutionary destiny.
Robert Lonadier
Jan 12 2004 11:45AM
Security
Business Leaders and IT Security – Will the Two Ever Have a Meeting of Minds?
Those responsible for IT security are constantly complaining that they can’t get the budget they need, but are they going about it the wrong way?
Andre Armstrong
Jan 12 2004 11:30AM
Security
Previous
Next
Most popular tech stories
UNSW to offer ChatGPT Edu to 10,000 staff
Medibank targets central system to handle people queries
EPA Victoria hones its strategic workforce planning
Lendi Group unveils agentic AI-powered home loan 'guardian'
Cyber Security Roadshow: Digital As Usual 2025
HamiltonJet partners with digital services provider Fortude
SentinelOne signs distribution agreement with Sektor
Rapid7’s new SIEM combines exposure management with threat detection
The techpartner.news podcast, episode 3: Why security consultancy founder Kat McCrabb started with the hard stuff
Bluechip Infotech enters final stage of Goodson Imports acquisition
Blackberry celebrates "giant step forward"
Sydney and Melbourne rank highly for "citizen experience"
Govt launches consumer tech label program for smart devices
Photos: Australian industry comes together to explore IoT opportunities
Australian firm wins global Cisco AI award for rail safety solution
Log In
Don't have an account? Register now!
Email:
Password:
Remember me
|
Forgot your password?