Latest News
Woolworths' CSO is Optus-bound
Build once. Build right. The enduring power of Azure Landing Zones.
Lion builds an app to detect its beers on tap in venues
Tech giants' indirect emissions rose 150 percent in three years
icare signs $29m cloud renewal with AWS
LOG IN
SUBSCRIBE
NEWS
GOVERNMENT
SECURITY
AI
DIGITAL NATION
RESOURCES
PODCAST
EVENTS
ADVERTISE
Search
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
SECURITY AWARDS
DIGITAL NATION AWARDS
BENCHMARK AWARDS
Digital As Usual
NEWS
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
GOVERNMENT
SECURITY
AI
DIGITAL NATION
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
RESOURCES
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
PODCAST
EVENTS
SECURITY AWARDS
DIGITAL NATION AWARDS
BENCHMARK AWARDS
Digital As Usual
ADVERTISE
Log In
Email:
Password:
Remember me
|
Forgot password?
Don't have an account? Register now!
Home
what
what
Control what you let in
Neglecting to watch what you allow into your network can create unnecessary threats, says Lance Braunstein
Lance Braunstein
Dec 2 2004 5:31PM
Security
Make endpoint security do what it claims it can do
Staff Writers
Nov 12 2004 5:03PM
Security
Oracle issues what it calls final offer for PeopleSoft
Enough may be enough for Oracle. Early this week, the database giant upped its cash bid for PeopleSoft for, what it says is the final time, to US$24 per share up from US$21.
Barbara Darrow
Nov 2 2004 12:00AM
Software
Beating the social engineering scams: what employees must do to protect company data
While technology can dramatically reduce the risk associated with threats and vulnerabilities in enterprise IT, the human factor is always critical in a comprehensive security strategy.
John Roese
Oct 27 2004 3:27PM
Security
What can software asset management do for me?
‘It is an irony of modern business that directors pay more attention to the control of assets such as company cars than they do to the management of business critical investments such as IT.’ So says George Cox, director of the IOD. An irony that deepens further still when you realize that many organizations spend more each year on software than they do on their vehicle fleets.
Matt Fisher
Sep 29 2004 11:18AM
Security
Smartphones are great tools, but at what risk?
Hands up if you own a smartphone and feel secure. If so, maybe you haven’t been following the upward trends in Bluetooth vulnerabilities, Symbian worms and ordinary theft.
Jon Tullett
Jul 8 2004 4:15PM
Security
What Good Is Foreknowledge?
U.S. Vice President Dick Cheney was recently on NBC's Meet the Press where he said that the inevitability of another terrorist attack on American soil is as sure today as it was September 12.
Illena Armstrong
Jan 16 2004 1:25PM
Security
Is Information Security Crossing the Proverbial You Know What?
Information security is a hot topic these days, something that often gets credited to an increased awareness of terrorism.
Dan Taylor
Jan 16 2004 11:37AM
Security
New Security Perspectives: What U.S. Firms Can Learn From Overseas
In today's climate of increasing security concerns, companies are seeking out new policy and practice concepts in addition to new technology upgrades to address vulnerabilities.
Steve Crutchley
Jan 16 2004 10:44AM
Security
What Happens When Email Goes Wrong?
You may think that sending an email is safe enough.
Steven Jenkins
Jan 15 2004 1:21PM
Security
Dedication is what you need?
In an ideal world, every company would have a dedicated recovery center to ensure information availability 24/7/365. It is the ultimate defense against unforeseen circumstances impacting on critical business functions.
Andrew Waterston
Jan 15 2004 11:14AM
Security
What to Look for in a Web Application Protection System
The number of technology pundits decrying the state of Internet security has reached an unbearable level.
Abishek Chauhan
Jan 14 2004 3:44PM
Security
A Practical and Realistic Approach for Testing the Performance of Firewalls: What Your Security Vendors Don't Want You to Know
While Internet security has always been important, only recently has it emerged as an important issue for almost all who use the Internet.
Johnson Wu,
Jan 14 2004 3:01PM
Security
Digital Signatures: What Can Businesses and Consumers Expect?
Laws giving digital signatures legal legitimacy have been enacted around the world.
Rett Summerville
Jan 14 2004 2:47PM
Security
Blackout blues ...and what you can do to avoid them
The recent power outage was a powerful reminder of the value of business continuity provisions. Ron Mobed reports.
Ron Mobed
Jan 13 2004 4:58PM
Security
Change Management: What If it All Goes Wrong?
The U.K.’s Swanwick Air Traffic Control center is an unfortunate example of the problems that can occur with the continuity of a business while undergoing a period of change.
Staff Writers
Jan 12 2004 1:54PM
Security
Selecting the Right PKI - Know What to Ask For
When companies search for a public key infrastructure (PKI) solution, most develop and distribute a ‘request for proposal’ to evaluate and select a particular vendor and product.
Kevin LeBlanc
Jan 12 2004 10:23AM
Security
Hot IT jobs: what are they?
Vivienne Fisher
Dec 1 2003 12:00AM
Training & Development
Phishing, spam, viruses: what next?
There are an increasing number of warnings being issued to users about the threats associated with spam, such as viruses and 'phishing' scams.
Vivienne Fisher
Nov 19 2003 12:00AM
Security
Previous
Most popular tech stories
Coles merges digital and customer leadership
Digital Nation announces finalists for its inaugural Digital Nation Awards
Orica to set new workforce systems live in Australia in July
Westpac pilots AI to analyse inbound call content
Westpac hires CBA's data chief to lead AI, data and digital
Australian MSP Index launched
Ingram Micro Ushers in the Age of Ultra
Announcing Pipeline 2025 tickets, theme & initial speakers
Vic gov to spend $100m on cyber security
"Waiting until an incident is in progress is too late": MSPs urged to review ransomware response as new reporting rules commence
Blackberry celebrates "giant step forward"
The three steps to industrial IoT success
Axis Communications opens experience centre in Sydney tech hub
Perth IoT vendor Digital Matter names new chief executive
How the University of Melbourne used LoRaWAN and IoT in ‘COVIDSafe’ strategy
Log In
Don't have an account? Register now!
Email:
Password:
Remember me
|
Forgot your password?