Latest News
Accenture to buy Australian cyber security firm CyberCX
Hack at UnitedHealth's tech unit impacted 192.7 million people
ATO considers AI coding assistance for 800 core developers
Suncorp deploys Duck Creek at AAMI
"BitUnlocker" full-volume encryption bypass found by Microsoft researchers
LOG IN
SUBSCRIBE
NEWS
GOVERNMENT
SECURITY
AI
DIGITAL NATION
RESOURCES
PODCAST
EVENTS
ADVERTISE
Search
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
Data&AI Breakfast
SECURITY AWARDS
DIGITAL NATION AWARDS
BENCHMARK AWARDS
Digital As Usual
NEWS
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
GOVERNMENT
SECURITY
AI
DIGITAL NATION
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
RESOURCES
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
PODCAST
EVENTS
Data&AI Breakfast
SECURITY AWARDS
DIGITAL NATION AWARDS
BENCHMARK AWARDS
Digital As Usual
ADVERTISE
Log In
Email:
Password:
Remember me
|
Forgot password?
Don't have an account? Register now!
Home
waf
waf
Partner Content
Digital transformation and the rise of business logic attacks
Australia’s IT leaders are tasked with spearheading digital transformation programs, bringing many efficiency benefits to organisations.
Staff Writer
Dec 14 2023 10:02AM
Partner Content
Melbourne Airport upgrades web security, DDoS protections
Engages Cloudflare.
Jeremy Nadel
Aug 7 2023 12:59PM
Security
Promoted Content
Why CIOs must now think differently about application security
Frictionless, automated security counters cloud threats the network can’t see.
Radware
Dec 3 2021 12:48PM
Promoted Content
New critical vulnerabilities found in F5 devices
Can be used to remotely commandeer BIG-IP and BIG-IQ systems.
Juha Saarinen
Mar 11 2021 8:33AM
Security
Analysis: Why do SQL injection attacks still succeed?
Databases, web servers, middleware and WAFs are not properly secured.
Josh Shaul, chief technology officer, Application Secur
May 25 2011 6:33AM
Security
Barracuda hack shows importance of defence-in-depth
Everyone is vulnerable.
Angela Moscaritolo
Apr 15 2011 9:53AM
Security
Most popular tech stories
CBA's leaders are keeping a close watch on AI metrics
Coles Group to test agentic AI on staff leave booking
NBN Co weaves AI and automation into its operational "fabric"
OVIC sets limits on GenAI tool use in external meetings
Bunnings pilots AI for its 55,000-strong workforce
HamiltonJet partners with digital services provider Fortude
SentinelOne signs distribution agreement with Sektor
Rapid7’s new SIEM combines exposure management with threat detection
The techpartner.news podcast, episode 3: Why security consultancy founder Kat McCrabb started with the hard stuff
Bluechip Infotech enters final stage of Goodson Imports acquisition
ParKam's smart parking project at Curtin University will be a world-first
Blackberry celebrates "giant step forward"
How Jemena uses IoT to push the boundaries of customer innovation in the gas sector
Photos: Australian industry explores data for net zero
Govt launches consumer tech label program for smart devices
Log In
Don't have an account? Register now!
Email:
Password:
Remember me
|
Forgot your password?