Latest News
From records to real-time: why systems of engagement matter
Rolling Stone, Billboard owner Penske sues Google over AI overviews
Westpac stands up Copilot Studio for Gen AI agent development
Parent company of Gucci, Balenciaga hit by cyber attack
Domain Group builds 'listing assistant' to help staff find property metrics
LOG IN
SUBSCRIBE
NEWS
GOVERNMENT
SECURITY
AI
DIGITAL NATION
RESOURCES
PODCAST
EVENTS
ADVERTISE
Search
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
Data&AI Breakfast
SECURITY AWARDS
DIGITAL NATION AWARDS
BENCHMARK AWARDS
Digital As Usual
NEWS
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
GOVERNMENT
SECURITY
AI
DIGITAL NATION
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
RESOURCES
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
PODCAST
EVENTS
Data&AI Breakfast
SECURITY AWARDS
DIGITAL NATION AWARDS
BENCHMARK AWARDS
Digital As Usual
ADVERTISE
Log In
Email:
Password:
Remember me
|
Forgot password?
Don't have an account? Register now!
Home
what
what
Control what you let in
Neglecting to watch what you allow into your network can create unnecessary threats, says Lance Braunstein
Lance Braunstein
Dec 2 2004 5:31PM
Security
Make endpoint security do what it claims it can do
Staff Writers
Nov 12 2004 5:03PM
Security
Oracle issues what it calls final offer for PeopleSoft
Enough may be enough for Oracle. Early this week, the database giant upped its cash bid for PeopleSoft for, what it says is the final time, to US$24 per share up from US$21.
Barbara Darrow
Nov 2 2004 12:00AM
Software
Beating the social engineering scams: what employees must do to protect company data
While technology can dramatically reduce the risk associated with threats and vulnerabilities in enterprise IT, the human factor is always critical in a comprehensive security strategy.
John Roese
Oct 27 2004 3:27PM
Security
What can software asset management do for me?
‘It is an irony of modern business that directors pay more attention to the control of assets such as company cars than they do to the management of business critical investments such as IT.’ So says George Cox, director of the IOD. An irony that deepens further still when you realize that many organizations spend more each year on software than they do on their vehicle fleets.
Matt Fisher
Sep 29 2004 11:18AM
Security
Smartphones are great tools, but at what risk?
Hands up if you own a smartphone and feel secure. If so, maybe you haven’t been following the upward trends in Bluetooth vulnerabilities, Symbian worms and ordinary theft.
Jon Tullett
Jul 8 2004 4:15PM
Security
What Good Is Foreknowledge?
U.S. Vice President Dick Cheney was recently on NBC's Meet the Press where he said that the inevitability of another terrorist attack on American soil is as sure today as it was September 12.
Illena Armstrong
Jan 16 2004 1:25PM
Security
Is Information Security Crossing the Proverbial You Know What?
Information security is a hot topic these days, something that often gets credited to an increased awareness of terrorism.
Dan Taylor
Jan 16 2004 11:37AM
Security
New Security Perspectives: What U.S. Firms Can Learn From Overseas
In today's climate of increasing security concerns, companies are seeking out new policy and practice concepts in addition to new technology upgrades to address vulnerabilities.
Steve Crutchley
Jan 16 2004 10:44AM
Security
What Happens When Email Goes Wrong?
You may think that sending an email is safe enough.
Steven Jenkins
Jan 15 2004 1:21PM
Security
Dedication is what you need?
In an ideal world, every company would have a dedicated recovery center to ensure information availability 24/7/365. It is the ultimate defense against unforeseen circumstances impacting on critical business functions.
Andrew Waterston
Jan 15 2004 11:14AM
Security
What to Look for in a Web Application Protection System
The number of technology pundits decrying the state of Internet security has reached an unbearable level.
Abishek Chauhan
Jan 14 2004 3:44PM
Security
A Practical and Realistic Approach for Testing the Performance of Firewalls: What Your Security Vendors Don't Want You to Know
While Internet security has always been important, only recently has it emerged as an important issue for almost all who use the Internet.
Johnson Wu,
Jan 14 2004 3:01PM
Security
Digital Signatures: What Can Businesses and Consumers Expect?
Laws giving digital signatures legal legitimacy have been enacted around the world.
Rett Summerville
Jan 14 2004 2:47PM
Security
Blackout blues ...and what you can do to avoid them
The recent power outage was a powerful reminder of the value of business continuity provisions. Ron Mobed reports.
Ron Mobed
Jan 13 2004 4:58PM
Security
Change Management: What If it All Goes Wrong?
The U.K.’s Swanwick Air Traffic Control center is an unfortunate example of the problems that can occur with the continuity of a business while undergoing a period of change.
Staff Writers
Jan 12 2004 1:54PM
Security
Selecting the Right PKI - Know What to Ask For
When companies search for a public key infrastructure (PKI) solution, most develop and distribute a ‘request for proposal’ to evaluate and select a particular vendor and product.
Kevin LeBlanc
Jan 12 2004 10:23AM
Security
Hot IT jobs: what are they?
Vivienne Fisher
Dec 1 2003 12:00AM
Training & Development
Phishing, spam, viruses: what next?
There are an increasing number of warnings being issued to users about the threats associated with spam, such as viruses and 'phishing' scams.
Vivienne Fisher
Nov 19 2003 12:00AM
Security
Previous
Most popular tech stories
Lendi Group unveils agentic AI-powered home loan 'guardian'
State of MarTech
Queensland Rail uses SuccessFactors to "put learning back on the map"
mecwacare sizes its digital transformation
Cyber Security Roadshow: Digital As Usual 2025
HamiltonJet partners with digital services provider Fortude
SentinelOne signs distribution agreement with Sektor
Rapid7’s new SIEM combines exposure management with threat detection
The techpartner.news podcast, episode 3: Why security consultancy founder Kat McCrabb started with the hard stuff
Bluechip Infotech enters final stage of Goodson Imports acquisition
Blackberry celebrates "giant step forward"
Photos: Australian industry comes together to explore IoT opportunities
Govt launches consumer tech label program for smart devices
Australian firm wins global Cisco AI award for rail safety solution
Sydney and Melbourne rank highly for "citizen experience"
Log In
Don't have an account? Register now!
Email:
Password:
Remember me
|
Forgot your password?