Security policy and user awareness
- 
				Opinion
					23 Sep 2025
					
									
										  How to fend off identity-based cyber attacksAttackers are using legitimate credentials to walk through the front door and “live off the land”. True cyber resilience now depends on protecting identity, not just the perimeter Continue Reading 
- 
				News
					16 Sep 2025
					
									
										  Exabeam: Treat AI agents as the new insider threatAs artificial intelligence agents are given more power inside organisations, Exabeam’s chief AI officer, Steve Wilson, argues they must be monitored for rogue behaviour just like their human counterparts Continue Reading 
- 
                News
                03 Aug 2011
                  Hotmail makes sign-in changes, can't please everyoneThe Hotmail sign-in page is in the news this week, with subtle changes to browser auto-complete behaviour to provide wider browser compatibility. Continue Reading By- Stephen Gillies, editor
 
- 
                News
                22 Jun 2011
                  Security awareness tips: Making programmes more effectiveSeveral information security pros, via LinkedIn, share their best security awareness tips with SearchSecurity.co.UK. Continue Reading By
- 
                News
                29 Apr 2011
                  Store dealing with dishonest employees uses internal theft prevention softwareA London-based sushi chain expects to save almost £1 million this year with the help of new fraud-detection software. Continue Reading By
- 
                News
                30 Mar 2011
                  Two-factor authentication alternativesWorried by the breach at RSA? Here are some two-factor authentication alternatives to consider. Continue Reading By- Simon Sharwood
 
- 
                News
                17 Feb 2011
                  Optus email rejects shortened URLsOptus has adjusted its email security regime to repel incoming emails that use URLs shortened by services like bit.ly or TinyURL. Continue Reading By- Simon Sharwood
 
- 
                Tip
                05 Apr 2010
                  Using resource allocation management to prevent DoS and other attacksResource allocation management is an effective way to prevent denial-of-service (DoS) and other attacks. Find out how to allocate resources in order to increase the security of your organisation. Continue Reading By
- 
                Tip
                05 May 2009
                  How to find credit card numbers and other sensitive data on your users' computersIf you worry that important and sensitive data like credit card numbers is lurking on your users' hard drives, read on to learn how to search for and corral this information. Continue Reading By- Mike Chapple, University of Notre Dame
 
- 
                News
                24 Dec 2008
                  Ian Yates' quite literal year in reviewIan Yates product reviews are unique and make ideal holiday reading. Continue Reading By- Ian Yates
 
- 
                Tip
                01 Oct 2008
                  How to manage Hyper-V's security permissionsLearn how to operate Hyper-V's Authorization Manager (Azman) in this How-To guide. Continue Reading By
- 
                News
                27 Sep 2007
                  Pacific Hydro finds UTM improves its environmentRenewable energy company Pacific Hydro has found Watchguard's unified threat management devices make a valuable contribution to its defence in depth strategy. Continue Reading By- Simon Sharwood
 
- 
                News
                02 Sep 2007
                  Now the dust has settled on pornography filtering...Andrew Collins looks at the controversial topic of Internet porn filtering in Australia, now that the federal government has enacted its hotly debated plans. Continue Reading By- Andrew Collins
 
- 
                News
                21 Aug 2007
                  Nigel Phair, author of 'Cybercrime: The Reality of the Threat', on Australia's responseIn the first instalment of a three part interview, TechTarget Australia's Patrick Gray interviews Australian Federal Police Agent Nigel Phair about his new book: Cybercrime: The Reality of the Threat. Until recently, Phair was the Team Leader of Investigations at the Australian High Tech Crime Centre (AHTCC) in Canberra. Continue Reading By- Patrick Gray
 
- 
                News
                14 Aug 2007
                  Telstra network build spurs new security planTelstra's experience constructing the Next G and Next IP networks has seen the telco evolve a new security strategy. Continue Reading By- Simon Sharwood
 
- 
                News
                19 Nov 2006
                  Virtualisation: friend or foe? [Day Two: The virtual appliance]Virtualisation slashes costs, makes management easier, unshackles software configurations from hardware. And it is being embraced around the world. But is it secure? In this three-part series, Patrick Gray explores the security implications of this important new technology. Continue Reading By- Patrick Gray
 

 
		