Latest News
UK's Companies House apologises for access and data breach
SUBCO to split Syd-Melb leg of east-west cable between sea and land
Encyclopedia Britannica sues OpenAI over AI training
Optus appoints new OSS chief
Exploited Google Chrome zero-days added to US must-patch list
LOG IN
SUBSCRIBE
NEWS
GOVERNMENT
SECURITY
AI
DIGITAL NATION
RESOURCES
PODCAST
EVENTS
ADVERTISE
Search
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
Tech Partner Views
Cloud Covered
Executive Retreat
BENCHMARK AWARDS
NEWS
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
GOVERNMENT
SECURITY
AI
DIGITAL NATION
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
RESOURCES
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
Tech Partner Views
PODCAST
EVENTS
Cloud Covered
Executive Retreat
BENCHMARK AWARDS
ADVERTISE
Log In
Email:
Password:
Remember me
|
Forgot password?
Don't have an account? Register now!
Home
tpm
tpm
Researcher shows physical attack bypassing BitLocker
Elaborate hardware and software attack chain defeats PC security measures.
Juha Saarinen
Feb 24 2026 11:58AM
Security
Chrome OS adds enterprise identity verification
Uses Trusted Platform Module to confirm identity.
Juha Saarinen
Sep 16 2016 7:53AM
Strategy
Microsoft offers two-factor authentication in Windows 10
Single passwords not secure enough.
Allie Coyne
Oct 23 2014 5:45PM
Software
Researchers, schools call for flexible copyright rules
Scope for removal of IP blocks?
James Hutchinson
Sep 12 2012 12:28PM
Software
Government eyes more copyright exceptions
Establishes new review for digital use.
John Hilvert
Jul 3 2012 10:00AM
Networking
Crypto chip: How the TPM bolsters enterprise security
Want to make your endpoints and servers more secure, and easier to manage?
Brian Berger, Wave Systems Corp
Jun 30 2008 3:04PM
Security
Most popular tech stories
Premier's Department NSW CDIO of four-and-a-half years leaves
Meta acquires AI agent social network Moltbook
ABC drops Salesforce for Braze
Craveable Brands has one eye on AI, and the other on the project failure rate
Griffith University takes control of its student recruitment
HamiltonJet partners with digital services provider Fortude
SentinelOne signs distribution agreement with Sektor
Rapid7’s new SIEM combines exposure management with threat detection
The techpartner.news podcast, episode 3: Why security consultancy founder Kat McCrabb started with the hard stuff
Bluechip Infotech enters final stage of Goodson Imports acquisition
'Touch-free' smartphone controlled with head movements
Blackberry celebrates "giant step forward"
Govt launches consumer tech label program for smart devices
Photos: Australian industry explores data for net zero
Telstra Purple acquires IoT specialists Alliance Automation, Aqura Technologies
Log In
Don't have an account? Register now!
Email:
Password:
Remember me
|
Forgot your password?