Latest News
Eightfold sued for helping companies secretly score job seekers
Bezos' Blue Origin to deploy enterprise-grade LEOsat network
APRA to modernise data stack with Databricks on Azure
OAIC calls on federal agencies to be transparent on ADM use
AI to streamline ATO contact centre operations
LOG IN
SUBSCRIBE
NEWS
GOVERNMENT
SECURITY
AI
DIGITAL NATION
RESOURCES
PODCAST
EVENTS
ADVERTISE
Search
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
Tech Partner Views
Executive Retreat
BENCHMARK AWARDS
NEWS
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
GOVERNMENT
SECURITY
AI
DIGITAL NATION
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
RESOURCES
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
Tech Partner Views
PODCAST
EVENTS
Executive Retreat
BENCHMARK AWARDS
ADVERTISE
Log In
Email:
Password:
Remember me
|
Forgot password?
Don't have an account? Register now!
Home
weapon
weapon
EU to assess risks of critical technologies being weaponised -official
Including semiconductors and artificial intelligence.
Foo Yun Chee
Oct 3 2023 12:19PM
Software
CrimTrac ballistics ID system gets 3D HD upgrade
More funding ahead of July go-live.
Allie Coyne
May 21 2014 11:04AM
Software
Information is our only security weapon: Bruce Schneier
Computer security expert Bruce Schneier took a swipe at a number of sacred cows of security including RFID tags, national ID cards and public CCTV security cameras in his keynote address to Linux.conf.au this morning.
Sarah Stokely
Jan 30 2008 12:44PM
Security
Keyloggers: Weapon of choice for hackers
Keylogging is quickly becoming the favorite technique of hackers looking for financial gain, data released this week claimed.
Frank Washkuch
Nov 15 2005 10:33PM
Security
Most popular tech stories
Dept of Industry reviews its extended ERP stack
Macquarie Bank unveils customer-facing 'Q' AI agent
Woolworths to incorporate agentic AI into its Olive chatbot
State of HR Tech
eBay offers automated seller protections after Sendle service stalls
HamiltonJet partners with digital services provider Fortude
SentinelOne signs distribution agreement with Sektor
Rapid7’s new SIEM combines exposure management with threat detection
The techpartner.news podcast, episode 3: Why security consultancy founder Kat McCrabb started with the hard stuff
Bluechip Infotech enters final stage of Goodson Imports acquisition
IoT Awards: Wattwatchers measures electricity consumption one appliance at a time
Photos: Australian industry explores data for net zero
How Meshed used IoT to help NSW Parks & Wildlife Service improve bushfire risk mitigation
Minidocumentary: Operationalising net zero using IoT
Blackberry celebrates "giant step forward"
Log In
Don't have an account? Register now!
Email:
Password:
Remember me
|
Forgot your password?