Latest News
The University of Sydney makes its interim CISO permanent
James Cook University augments ServiceNow platform with AI
ServiceNow nears deal to buy cyber security startup
Google to build subsea cables in PNG under Australia defence treaty
ACMA secures pledges from major online retailers to block "dodgy" mobile sales
LOG IN
SUBSCRIBE
NEWS
GOVERNMENT
SECURITY
AI
DIGITAL NATION
RESOURCES
PODCAST
EVENTS
ADVERTISE
Search
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
Tech Partner Views
BENCHMARK AWARDS
NEWS
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
GOVERNMENT
SECURITY
AI
DIGITAL NATION
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
RESOURCES
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
Tech Partner Views
PODCAST
EVENTS
BENCHMARK AWARDS
ADVERTISE
Log In
Email:
Password:
Remember me
|
Forgot password?
Don't have an account? Register now!
Home
of
of
Opinion: The five pitfalls of outsourcing
Contract negotiator discusses novice outsourcers fail.
Julian S
Mar 4 2010 6:14AM
Strategy
Feds to establish cyber-safety committee
Filtering, regulation and enforcement to be reviewed.
Liz Tay
Feb 25 2010 12:15PM
Security
Cyberoam introduces virtual integration of its SSL VPN solution
Cyberoam has announced the integration of its SSL VPN solution on a virtual platform.
SC Australia Staff
Feb 22 2010 1:55PM
Security
Server flaw to be revealed at Black Hat
View state feature could reveal sensitive information.
SC Australia Staff
Feb 1 2010 1:42PM
Security
First impressions of Office 2010 Professional Beta
IT manager so far likes what he sees.
Jason Slater
Jan 23 2010 7:22AM
Software
Q&A: Large Hadron Collider's IT environment revealed
How CERN is processing data in a virtual environment.
Martin Courtney
Jan 18 2010 6:31AM
Hardware
Bank of Queensland hit by “Y2.01k” glitch
Terminal clocks tick over to January 2016.
Staff Writers
Jan 4 2010 11:51AM
Software
Number of new offshore IT facilities plummets
Top 50 providers open 16 fewer sites this year.
Tom Young
Nov 28 2009 7:19AM
Strategy
Day 22: IIA attempt to intervene in iiNet copyright case dismissed
Nothing new to add.
Ry Crozier
Nov 26 2009 12:07PM
Telco/ISP
Day 21: IIA chief Peter Coroneos grilled on the stand in iiNet case
Film studios claim IIA adds nothing to iiNet copyright case.
Ry Crozier
Nov 24 2009 5:41PM
Telco/ISP
Microsoft announces availability of Exchange 2010
Marks beginning of efficiency drive.
Dave Bailey
Nov 11 2009 6:19AM
Software
Day 15: Internet industry application deferred to next week
Can association add more than ‘hear, hear'?
Ry Crozier
Nov 6 2009 2:31PM
Telco/ISP
UK Government to simulate "total collapse" of phone network
Cyber security exercise next week.
Nicola Brittain
Nov 6 2009 12:16AM
Networking
Virtualisation and security: Enterprise solutions in reach of SMBs
SMBs that have considered virtualisation but decided that it is too expensive or simply not viable, especially in terms of security, should think again.
Ronan Kavanagh, CEO, SpamTitan
Oct 30 2009 12:05PM
Security
Twitter warns of new phishing attack
Latest scam designed to harvest login credentials.
Phil Muncaster
Oct 30 2009 9:59AM
Security
Avalanche the most prolific phishing group of 2009
A criminal phishing group called Avalanche was responsible for nearly a quarter of all phishing attacks identified during the first half of this year, according to a recently released Anti-Phishing Working Group (APWG) report.
Angela Moscsaritolo
Oct 27 2009 9:21AM
Security
Web browsers should be secured as use of netbooks increases
Netbooks which focus on the web browser could be a prime target for attackers.
Dan Raywood
Oct 26 2009 9:27AM
Security
Zurich loses financial details of 51,000 UK customers
No evidence data has been misused.
Tom Young
Oct 24 2009 12:30AM
Security
Department of homeland security calls for employment of ethical hackers
International collaboration and recruitment of experienced people is needed to win the battle against cybercrime.
Oct 23 2009 1:25PM
Security
Federal Government to revamp tech buying
Plans to set up whole-of-government panels and contracts.
Staff Writers
Oct 9 2009 12:13PM
Hardware
Previous
Next
Most popular tech stories
Audit Office of NSW and Data61 explore AI for gov auditing
Cochlear pilots voice-to-text Salesforce integration for lead management
Accenture to train 30,000 staff on Anthropic's Claude
CBA finds its first chief AI officer
Virgin Australia, Wesfarmers strike OpenAI agreements
HamiltonJet partners with digital services provider Fortude
SentinelOne signs distribution agreement with Sektor
Rapid7’s new SIEM combines exposure management with threat detection
The techpartner.news podcast, episode 3: Why security consultancy founder Kat McCrabb started with the hard stuff
Bluechip Infotech enters final stage of Goodson Imports acquisition
Blackberry celebrates "giant step forward"
Photos: Australian industry explores data for net zero
'Touch-free' smartphone controlled with head movements
Axis Communications opens experience centre in Sydney tech hub
Photos: The 2024 IoT Awards winners
Log In
Don't have an account? Register now!
Email:
Password:
Remember me
|
Forgot your password?